IDEAS home Printed from https://ideas.repec.org/a/ids/ijitma/v17y2018i4p257-274.html
   My bibliography  Save this article

Research on key techniques of cryptographic access control and properties optimisation in cloud storage

Author

Listed:
  • Shidong Zhu
  • Liu Jiang
  • Zhenliu Zhou

Abstract

With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on ciphertext-policy attribute-based encryption (CP-ABE), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if cloud service provider (CSP), suitable for the multi-user who has hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.

Suggested Citation

  • Shidong Zhu & Liu Jiang & Zhenliu Zhou, 2018. "Research on key techniques of cryptographic access control and properties optimisation in cloud storage," International Journal of Information Technology and Management, Inderscience Enterprises Ltd, vol. 17(4), pages 257-274.
  • Handle: RePEc:ids:ijitma:v:17:y:2018:i:4:p:257-274
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=95043
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijitma:v:17:y:2018:i:4:p:257-274. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=18 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.