A data outsourcing architecture combining cryptography and access control

Outsourced architecture; access control; cryptography 0202 electrical engineering, electronic engineering, information engineering 02 engineering and technology
DOI: 10.1145/1314466.1314477 Publication Date: 2007-11-15T09:30:20Z
ABSTRACT
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some most challenging issues in such scenario are enforcement authorization policies support policy updates. Since common approach protecting outsourced data consists encrypting themselves, promising solving these based on combination access control with cryptography. This idea itself not new, but problem applying it an architecture introduces several challenges. In this paper, we first illustrate basic principles which combining cryptography can be built. We then enforcing supporting dynamic authorizations, allowing changes updates at limited cost terms bandwidth computational power.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (18)
CITATIONS (69)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....