首页 | 官方网站   微博 | 高级检索  
     


Secure Data Access and Sharing Scheme for Cloud Storage
Authors:Li  Xiong  Kumari  Saru  Shen  Jian  Wu  Fan  Chen  Caisen  Islam  SK Hafizul
Affiliation:1.School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China
;2.School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China
;3.State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
;4.Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, India
;5.Department of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen, 361021, China
;6.Ministry of Science Research, The Academy of Armored Forces Engineering, Beijing, 100072, China
;7.Department of Computer Science and Engineering, Indian Institute of Information Technology, Kalyani, Kalyani, West Bengal, 741235, India
;
Abstract:

Cloud storage is a new storage mode emerged along with the development of cloud computing paradigm. By migrating the data to cloud storage, the consumers can be liberated from building and maintaining the private storage infrastructure, and they can enjoy the data storage service at anywhere and anytime with high reliability and a relatively low cost. However, the security and privacy risks, especially the confidentiality and integrity of data seem to be the biggest hurdle to the adoption of the cloud storage applications. In this paper, we consider the secure data access and sharing issues for cloud storage services. Based on the intractability of the discrete logarithm problem, we design a secure data access and data sharing scheme for cloud storage, where we utilize the user authentication scheme to deal with the data access problem. According to our analysis, through our scheme, only valid user with the correct password and biometric can access to the cloud storage provider. Besides, the authorized users can access the rightful resources and verify the validity of the shared data, but cannot transfer the permission to any other party. At the same time, the confidentiality and integrity of data can be guaranteed.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号