首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Ensuring Cloud Security Using Hybrid Encryption Scheme and Disaster Recovery Mechanism
  • 本地全文:下载
  • 作者:R.Sinduja ; G.Sumathi
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2013
  • 卷号:4
  • 期号:6-3
  • 出版社:Seventh Sense Research Group
  • 摘要:Cloud computing, as a budding computing hypothesis, which provides users ondemand scalable services by allowing them to store their data in remote servers. As this new computing paradigm requires users to delegate their valuable data to cloud providers, it increases security and isolation concerns on outsourced data. Conversely, allowing cloud service providers (CSPs), which are not in the same trustworthy domains as endeavour users, to take care of confidential data, may increase latent security and confidentiality issues. Several schemes employing hierarchical attribute based encryption (HASBE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from rigidity in implementing complex access control policies, To keep the sensitive user data confidential against untrusted CSPs and disasters, a natural way is to apply cryptographic approaches to enhance the security of cloud database using hybrid encryption scheme and disaster recovery mechanism. The proposed scheme not only achieves scalability due to its hierarchical structure, but also provides flexible multilevel and hybrid security. It uses RSA, DES and AES algorithms as an encrypting tool. In addition, enhanced HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes and also it recovers the data in case of any natural or manmade disasters. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
  • 关键词:Cloud Computing; Data Security; Hybrid Encryption Scheme; Hierarchical attribute based encryption; Access control
国家哲学社会科学文献中心版权所有