Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Department of Computer Software Engineering, Soonchunhyang University, 646, Eupnae-ri, Sinchang-myeon, Asan-si, Chungcheongnam-do 336-745, Korea
*
Author to whom correspondence should be addressed.
Academic Editors: Su-Hyun Kim and Im-Yeong Lee
Symmetry 2015, 7(1), 269-283; https://doi.org/10.3390/sym7010269
Received: 15 January 2015 / Revised: 26 February 2015 / Accepted: 10 March 2015 / Published: 19 March 2015
(This article belongs to the Special Issue Applied Cryptography and Security Concerns based on Symmetry for the Future Cyber World)
In cloud computing environments, user data are encrypted using numerous distributed servers before storing such data. Global Internet service companies, such as Google and Yahoo, recognized the importance of Internet service platforms and conducted self-research and development to create and utilize large cluster-based cloud computing platform technology based on low-priced commercial nodes. As diverse data services become possible in distributed computing environments, high-capacity distributed management is emerging as a major issue. Meanwhile, because of the diverse forms of using high-capacity data, security vulnerability and privacy invasion by malicious attackers or internal users can occur. As such, when various sensitive data are stored in cloud servers and used from there, the problem of data spill might occur because of external attackers or the poor management of internal users. Data can be managed through encryption to prevent such problems. However, existing simple encryption methods involve problems associated with the management of access to data stored in cloud environments. Therefore, in the present paper, a technique for data access management by user authority, based on Attribute-Based Encryption (ABE) and secret distribution techniques, is proposed.
View Full-Text
Keywords:
cloud computing; attribute-based encryption; user authority
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
MDPI and ACS Style
Kim, S.-H.; Lee, I.-Y. Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry 2015, 7, 269-283.
Show more citation formats