z-logo
open-access-imgOpen Access
A User‐Centric Data Secure Creation Scheme in Cloud Computing
Author(s) -
Su Mang,
Li Fenghua,
Shi Guozhen,
Geng Kui,
Xiong Jinbo
Publication year - 2016
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2016.07.017
Subject(s) - computer science , cloud computing , scheme (mathematics) , distributed computing , operating system , mathematics , mathematical analysis
Due to the use of the cloud computing technology, the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User‐centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing policies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access control conditions proxy re‐encryption (ACC‐PRE), which is proved to be master secret secure and Chosen‐ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here