EconPapers    
Economics at your fingertips  
 

Research on key techniques of cryptographic access control and properties optimisation in cloud storage

Shidong Zhu, Liu Jiang and Zhenliu Zhou

International Journal of Information Technology and Management, 2018, vol. 17, issue 4, 257-274

Abstract: With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on ciphertext-policy attribute-based encryption (CP-ABE), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if cloud service provider (CSP), suitable for the multi-user who has hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.

Keywords: cloud storage; storage virtualisation; unstructured data storage; cryptographic access control; key generation; data privacy protection; ciphertext-policy attribute-based encryption; CP-ABE; data migration. (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=95043 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijitma:v:17:y:2018:i:4:p:257-274

Access Statistics for this article

More articles in International Journal of Information Technology and Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijitma:v:17:y:2018:i:4:p:257-274