Computer Science ›› 2013, Vol. 40 ›› Issue (12): 205-207.

Previous Articles     Next Articles

Research on Access Control Policy of Meteorological Cloud Data with Attribute-based Encryption

FANG Zhong-jin,XIA Zhi-hua and ZHOU Shu   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The problems of meteorological cloud data storage and sharing have become increasingly serious with the increasing of meteorological services level.An access control model with multi-authority attribute-based encryption(ABE) was proposed against the problems of authentication and access control of meteorological cloud data storage and sharing.An attribute-based encryption scheme which is suitable for big data cloud environment is applied to solve the fine-grained data access control problems in case of multi-class users in meteorological department.The introduction of global ID and multi-authorization mechanism solves the access problem of different institutional users in different data storage departments.The system has high security and good practical value.

Key words: Attribute-based encryption,Meteorological data,Access control,Fine-grained

[1] Hur J,Noh D K.Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7)
[2] Yang Ming.An Efficient Attribute based Encryption Schemewith Revocation for Outsourced Data Sharing Control[C]∥2011International Conference on Instrumentation,Measurement,Computer,Communication and Control.2011
[3] Jia Hong-yong.Efficient and Scalable Multicast Key Manage-ment Using Attribute Based Encryption[C]∥2010InternationalConference on Information Theory and Information Security.2010
[4] 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,22(6)
[5] Subashini S,Kavitha V.A survey on security issues in service delivery models of cloud computing[J].Journal of Network and Computer Applications,2011,34
[6] 张磊,曹珍富.一个适合分布式网络的属性基加密方案[J].上海交通大学学报,2010,44(11)
[7] 陈勤,党正芹,张金漫,等.一种多认证机构可验证的属性基加密方案[J].计算机应用研究,2012,29(1)
[8] Liu Yu-chao.A Method for Trust Management in Cloud Computing:Data Coloring by Cloud Watermarking[J].International Journal of Automation and Computing,2011,8(3)
[9] Sakr S,Liu A.A Survey of Large Scale Data Management Approaches in Cloud Environments[J].IEEE Communications Surveys & Tutorials,2011,13(3)
[10] Yu Shu-cheng,Wang Cong.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]∥IEEE INFOCOM.2010
[11] Zissis D,Lekkas D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3)
[12] Hay B,Nance K,Bishop M.Storm Clouds Rising:Security Chal-lenges for IaaS Cloud Computing[C]∥Proceedings of the 44th Hawaii International Conference on System Sciences.2011
[13] Rodero-Merino L.Building safe PaaS clouds:A survey on security in multitenant software platforms[J].Computers & Security,2012,31
[14] Blandford R.Information security in the cloud[M].Network Security,April 2011
[15] Walters R.Managing privileged user activity in the datacentre[M].Network Security,November 2010
[16] Zhuo Hao.A Privacy-Preserving Remote Data Integrity Chec-king Protocol with Data Dynamics and Public Verifiability[J].IEEE Transactions on knowledge and data engineering,2011,23(9)
[17] Jia Wei-wei.SDSM:A Secure Data Service Mechanism in Mobile Cloud Computing[C]∥The First International Workshop on Security in Computers,Networking and Communications.2011
[18] Pearson S,Mont M C.Sticky Policies:An Approach for Mana-ging Privacy across Multiple Parties[J]. Computer,2011,44(9):60-68
[19] Garber L.Serious Security Flaws Identified in Cloud Systems[J].Computer,2011,4(12):21-23
[20] Song D,Shi E,Fischer I.Cloud Data Protection for the Masses[J].Computer,2012,5(1):39-45

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!