Next Article in Journal
Variation in Measurement Error in Asymmetry Studies: A New Model, Simulations and Application
Next Article in Special Issue
The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era
Previous Article in Journal
Fluctuating Asymmetry of Plant Leaves: Batch Processing with LAMINA and Continuous Symmetry Measures
Previous Article in Special Issue
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
Open AccessTechnical Note

Study on User Authority Management for Safe Data Protection in Cloud Computing Environments

Department of Computer Software Engineering, Soonchunhyang University, 646, Eupnae-ri, Sinchang-myeon, Asan-si, Chungcheongnam-do 336-745, Korea
*
Author to whom correspondence should be addressed.
Academic Editors: Su-Hyun Kim and Im-Yeong Lee
Symmetry 2015, 7(1), 269-283; https://doi.org/10.3390/sym7010269
Received: 15 January 2015 / Revised: 26 February 2015 / Accepted: 10 March 2015 / Published: 19 March 2015
In cloud computing environments, user data are encrypted using numerous distributed servers before storing such data. Global Internet service companies, such as Google and Yahoo, recognized the importance of Internet service platforms and conducted self-research and development to create and utilize large cluster-based cloud computing platform technology based on low-priced commercial nodes. As diverse data services become possible in distributed computing environments, high-capacity distributed management is emerging as a major issue. Meanwhile, because of the diverse forms of using high-capacity data, security vulnerability and privacy invasion by malicious attackers or internal users can occur. As such, when various sensitive data are stored in cloud servers and used from there, the problem of data spill might occur because of external attackers or the poor management of internal users. Data can be managed through encryption to prevent such problems. However, existing simple encryption methods involve problems associated with the management of access to data stored in cloud environments. Therefore, in the present paper, a technique for data access management by user authority, based on Attribute-Based Encryption (ABE) and secret distribution techniques, is proposed. View Full-Text
Keywords: cloud computing; attribute-based encryption; user authority cloud computing; attribute-based encryption; user authority
MDPI and ACS Style

Kim, S.-H.; Lee, I.-Y. Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry 2015, 7, 269-283.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Back to TopTop