2010 Ninth International Conference on Grid and Cloud Computing 2010
DOI: 10.1109/gcc.2010.36
|View full text |Cite
|
Sign up to set email alerts
|

Design of Privacy-Preserving Cloud Storage Framework

Abstract: Privacy security is a key issue for cloud storage. To solve this problem, the paper 1 proposes a privacy-preserving cloud storage framework, which includes the design of data organization structure, the generation and management of keys, the treatment of change of users' access right and dynamic operations of data, and the interaction between participants. We design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, multi-tree structure and symme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Huang et al . concentrated on symmetric key encryption algorithm clustered with lazy revocation, multi‐tree structure, and extirpation based key derivation algorithm. Li et al .…”
Section: Empirical Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…Huang et al . concentrated on symmetric key encryption algorithm clustered with lazy revocation, multi‐tree structure, and extirpation based key derivation algorithm. Li et al .…”
Section: Empirical Analysismentioning
confidence: 99%
“…Qian et al [8] studied the problem of ensuring the integrity of data storage in cloud storage services. Moreover, data access control mechanisms may be mitigated by handling the private data using monitoring mechanisms in the cloud as discussed by Huang (2010), Udeda (2007) and Knorr (2000). Similarly, Zhang et al [9] checked that the customers need to take certain actions to protect their privacy with noise injection.…”
Section: Related and Background Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The privacy leakage problem on the untrusted servers has become a serious hazard problem in information security field. For example, the security of the cloud computing platform depends on the situation of solving the privacy leakage problem [1], and meanwhile its solution is also impacts the popularity in the industry. To solve the privacy leakage problem, people mainly use traditional cryptographic methods to encrypt user's privacy data stored on the cloud computing platform, such as the proxy re-encryption algorithm, the property encryption algorithm and so on.…”
Section: Introductionmentioning
confidence: 99%