Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud Computing

  title={Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud Computing},
  author={Cheng-Ying Yang and Cheng-Chi Lee and Tsuei-Hung Sun and Min-Shiang Hwang},
  journal={IOP Conference Series: Materials Science and Engineering},
One of major applications in cloud computing is cloud storage service. It’s an important research issue to protect the stored data from illegal access by the system manager in the Cloud. To encrypt entire file by using data owner’s secret keys is the simple solution. However it will raise a key management problem. To solve this problem, Hwang and Sun proposed a hierarchical key management scheme. In their scheme, the data owner could change the encryption key more easily, and not to affect… 
1 Citations

Cost-Effective Solutions in Cloud Computing Security

  • Lumbardha Hasimi
  • Computer Science
    Developments in Information & Knowledge Management for Business Applications
  • 2021
This work aims to present some of the most efficient existing solutions for security in cloud computing, present a short overview of the progress in literature and research that tackle such issues, and investigate the models and methods of calculating the costs of security incloud computing.



A Survey of Public Auditing for Secure Data Storage in Cloud Computing

This paper surveys the previous researches of data integrity based on public auditability which includes collecting the basic requirements and evaluation metrics, providing the representative with approaches to analyze security and efficiency, and proposes some future developments.

SecureDropbox: a file encryption system suitable for cloud storage services

The SecureDropbox system is proposed and implemented which constructs a secure architecture including key generation, key management, file encryption, and synchronization modules to prevent risks of data disclosure.

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage

This paper surveys related studies in cloud data storage with revocation and defines their requirements, and explains and analyzes four representative approaches.

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

This paper develops an outsourced policy updating method that enabling efficient access control with dynamic policy updating for big data in the cloud and proposes an efficient and secure method that allows data owner to check whether the cloud server has updated the ciphertexts correctly.

Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

It is remarked that Yu et al.'s scheme for cloud storage auditing with verifiable outsourcing of key updates has two inherent weaknesses: 1) it does not truly mitigate the client's computational burden for key updates; 2) itdoes not ensure confidentiality since the files uploaded to the cloud by the client are eventually not encrypted at all.

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage

The Securing Portable Document Format file Using Extended Visual Cryptography (SPDFUEVC) technique proposes efficient storage to achieve data confidentiality and integrity verification with minimal computation, time complexity and storage space.

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation

Compared with the existing MA-CP-ABE schemes, the proposed scheme is the most suitable one to enable data access control for collaborative cloud storage systems and the security and performance analysis indicates that the scheme is more secure and reasonably efficient to be applied to practical scenarios as collaborative cloudstorage systems.

Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage

A role-based access control scheme (RACS) used in the cloud that can resist the ciphertext attack and superior to others in the storage space and computation overhead is designed.

A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

This paper surveys two various access policy attribute-based proxy re-encryption schemes and analyzes these schemes and lists the comparisons of them by some criteria.

Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service

A dynamic data guarantee and data confidentiality scheme for public auditing in cloud storage service is proposed and bilinear pairing can achieve the most efficient way to verify data correctness and batch auditing.