A data outsourcing architecture combining cryptography and access control
Outsourced architecture; access control; cryptography
0202 electrical engineering, electronic engineering, information engineering
02 engineering and technology
DOI:
10.1145/1314466.1314477
Publication Date:
2007-11-15T09:30:20Z
AUTHORS (5)
ABSTRACT
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some most challenging issues in such scenario are enforcement authorization policies support policy updates. Since common approach protecting outsourced data consists encrypting themselves, promising solving these based on combination access control with cryptography. This idea itself not new, but problem applying it an architecture introduces several challenges. In this paper, we first illustrate basic principles which combining cryptography can be built. We then enforcing supporting dynamic authorizations, allowing changes updates at limited cost terms bandwidth computational power.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (18)
CITATIONS (69)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....