期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Key Management for Outsourced Data Security
1
作者 PEI Bei CHEN Changsong WAN Changsheng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期449-454,共6页
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ... This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users' data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme. 展开更多
关键词 cloud computing malicious cloud server key management
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部