Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 20
Page No. 3973 - 3979

Cryptographic Tree and Log File Based Secret Sharing Key Management Scheme for Securing Outsourced Data in Cloud

Authors : S. Ahamed Ali and M. Ramakrishnan

References

Atallah, M.J., K.B. Frikken, M. Blanton, 2005. Dynamic and efficient key management for access hierarchies. Proceedings of the 12th ACM Conference on Computer and Communications Security, November 07-10, 2005, ACM, New York, USA., pp: 190-202.

Atallah, M.J., M. Blanton, N. Fazio and K.B. Frikken, 2009. Dynamic and efficient key management for access hierarchies. ACM. Trans. Inf. Syst. Secur. TISSEC., 12: 1-14.
CrossRef  |  Direct Link  |  

Blundo, C., C. Stelvio, C.D.V. De, Sabrina, A. De Santis and S. Foresti et al., 2009. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. In: Emerging Challenges for Security, Privacy and Trust, IFIP Advances in Information and Communication Technology. Gritzalis, D. and J. Lopez (Eds.). Springer, Boston, Massachusetts, ISBN:978-3-642-01243-3, pp: 364-375.

Buchmann, J., E. Dahmen, E. Klintsevich, K. Okeya and C. Vuillaume, 2007. Merkle Signatures with Virtually Unlimited Signature Capacity. In: Applied Cryptography and Network Security. Katz, J. and M. Yung (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-72737-8, pp: 31-45.

Damiani, E., S. DeVimercati, S. Foresti, S. Jajodia and S. Paraboschi et al., 2007. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. In: IFIP International Information Security Conference. Venter, H., M. Eloff, L. Labuschagne, J. Eloff and R.V. Solms (Eds.). Springer, New York, USA., ISBN: 978-0-387-72366-2, pp: 385-396.

Damiani, E., S. DiVimercati, S. Foresti, S. Jajodia and S. Paraboschi et al., 2005. Key management for multi-user encrypted databases. Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, November 7-10, 2005, ACM, Alexandria, Virginia, ISBN: 1-59593-233-X, pp: 74-83.

DiVimercati, S.D.C., S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, 2007. Over-encryption: Management of access control evolution on outsourced data. Proceedings of the 33rd International Conference on Very large Data Bases, September 23-28, 2007, VLDB Endowment Inc., Austria, ISBN: 978-1-59593-649-3, pp: 123-134.

Huang, M.C. and J. Li, 2007. Pyramid codes flexible schemes to trade space for access efficiency in reliable data storage systems. Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA 2007), July 12-14, 2007, IEEE, Cambridge, Massachusetts, ISBN: 0-7695-2922-4, pp: 79-86.

Vimercati, S.D.C.D., S. Foresti, S. Jajodia, S. Paraboschi and G. Pelosi et al., 2008. Preserving confidentiality of security policies in data outsourcing. Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, October 27-31, 2008, ACM, New York, USA., ISBN: 978-1-60558-289-4, pp: 75-84.

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the IEEE INFOCOM, March 14-19, 2010, San Diego, CA., USA., pp: 1-9.

Wang, W., Z. Li, R. Owens and B. Bhargava, 2009. Secure and efficient access to outsourced data. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, November 9-13, 2009, ACM, Chicago, Illinois, ISBN: 978-1-60558-784-4, pp: 55-66.

Zhou, M., Y. Mu, W. Susilo, J. Yan and L. Dong, 2012. Privacy enhanced data outsourcing in the cloud. J. Network Comput. Appl., 35: 1367-1373.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved