uCloud: a user-centric key management scheme for cloud data protection

@article{Kao2013uCloudAU,
  title={uCloud: a user-centric key management scheme for cloud data protection},
  author={Yung-Wei Kao and Kuan-Ying Huang and Hui-Zhen Gu and Shyan-Ming Yuan},
  journal={IET Information Security},
  year={2013},
  volume={7}
}
One of the most challenging problems of cloud service solicitation is to persuade users to trust the security of cloud service and upload their sensitive data. Although cloud service providers can claim that their services are well-protected by elaborate encryption mechanisms, traditional cloud systems still cannot persuade the users that even if the cloud servers are compromised, the data are still securely protected. This study proposes uCloud, a user-centric key management scheme for cloud… CONTINUE READING
Highly Cited
This paper has 35 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

A Dynamic Key Aggregate Cryptosystem in Cloud Environment

2015 IIAI 4th International Congress on Advanced Applied Informatics • 2015
View 1 Excerpt

A Cloud Trust Authority Framework for Mobile Enterprise Information System

2014 IEEE 8th International Symposium on Service Oriented System Engineering • 2014
View 1 Excerpt

Key Management for Cloud Data Storage: Methods and Comparisons

2014 Fourth International Conference on Advanced Computing & Communication Technologies • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 23 references

A PKI-based mechanism for secure and efficient access to outsourced data

2010 International Conference on Networking and Digital Society • 2010

Assessing the security risks of cloud computing

J. Heiser, M. Nicolett
Gartner, Incorporated, • 2010

Secure data access in cloud computing

2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application • 2010

contactless smart cards, radio frequency identification and near-field communication

E. Haselsteiner, K. Breitfuss
(Wiley & Sons LTD, • 2010

Intensive home-care

R. Kornowski, D. Zeeli, M. Averbuch
workshop on Cloud Computing Security, • 2009

Cloud computing — Issues, research and implementations

ITI 2008 - 30th International Conference on Information Technology Interfaces • 2008