A Novel Data Access Scheme in Cloud Computing
Xiaowei Gao, Zemin Jiang, Rui Jiang
Available Online May 2014.
- 10.2991/iccia.2012.30How to use a DOI?
- Cloud Computing, Access control, Diffie–Hellman Exchange.
Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered user can intercept another legal user’s file and decipher it. To avoid these attacks, we give an improvement to Hota et al’s scheme and can resist theses attacks. Meantime, to make Hota’s scheme be applicable, we propose a novel data access protocol in cloud computing. Our scheme guarantees data confidentiality and secure data access between User and CSP. Security analysis shows that the scheme can resist various attacks.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xiaowei Gao AU - Zemin Jiang AU - Rui Jiang PY - 2014/05 DA - 2014/05 TI - A Novel Data Access Scheme in Cloud Computing BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 124 EP - 127 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.30 DO - 10.2991/iccia.2012.30 ID - Gao2014/05 ER -