2012
DOI: 10.1016/j.jnca.2012.01.022
|View full text |Cite
|
Sign up to set email alerts
|

Privacy enhanced data outsourcing in the cloud

Abstract: How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…However, the detailed design and validation of the proposed method has not been presented. A method for improved key management for preserving privacy is presented in Zhou et al (2012). This scheme ensures that the database remains secure while few selected data sources can be securely shared between authorised parties.…”
Section: Related Workmentioning
confidence: 99%
“…However, the detailed design and validation of the proposed method has not been presented. A method for improved key management for preserving privacy is presented in Zhou et al (2012). This scheme ensures that the database remains secure while few selected data sources can be securely shared between authorised parties.…”
Section: Related Workmentioning
confidence: 99%
“…He encrypted heavy duty of data by using the data processing servers as a quantum computer, which hides input, processing and output data from malicious and attacks. Miao Zhou [16] present the tree-based key management in cloud computing. The fundamental idea of this work is to design a secure and flexible key management mechanism for the outsourced data in cloud computing.…”
Section: Existing Studymentioning
confidence: 99%
“…This makes critical data to be uncovered at the time of attack [10]. It depends on the form of cloud computing, policies, and management.…”
Section: Data Security In Cloudmentioning
confidence: 99%