Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Su-Hyun | - |
dc.contributor.author | Lee, Im-Yeong | - |
dc.date.accessioned | 2021-08-11T20:26:53Z | - |
dc.date.available | 2021-08-11T20:26:53Z | - |
dc.date.issued | 2015-03 | - |
dc.identifier.issn | 2073-8994 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/10826 | - |
dc.description.abstract | In cloud computing environments, user data are encrypted using numerous distributed servers before storing such data. Global Internet service companies, such as Google and Yahoo, recognized the importance of Internet service platforms and conducted self-research and development to create and utilize large cluster-based cloud computing platform technology based on low-priced commercial nodes. As diverse data services become possible in distributed computing environments, high-capacity distributed management is emerging as a major issue. Meanwhile, because of the diverse forms of using high-capacity data, security vulnerability and privacy invasion by malicious attackers or internal users can occur. As such, when various sensitive data are stored in cloud servers and used from there, the problem of data spill might occur because of external attackers or the poor management of internal users. Data can be managed through encryption to prevent such problems. However, existing simple encryption methods involve problems associated with the management of access to data stored in cloud environments. Therefore, in the present paper, a technique for data access management by user authority, based on Attribute-Based Encryption (ABE) and secret distribution techniques, is proposed. | - |
dc.format.extent | 15 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | - |
dc.title | Study on User Authority Management for Safe Data Protection in Cloud Computing Environments | - |
dc.type | Article | - |
dc.publisher.location | 스위스 | - |
dc.identifier.doi | 10.3390/sym7010269 | - |
dc.identifier.scopusid | 2-s2.0-84970876377 | - |
dc.identifier.wosid | 000352354700015 | - |
dc.identifier.bibliographicCitation | Symmetry, v.7, no.1, pp 269 - 283 | - |
dc.citation.title | Symmetry | - |
dc.citation.volume | 7 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 269 | - |
dc.citation.endPage | 283 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
dc.subject.keywordAuthor | cloud computing | - |
dc.subject.keywordAuthor | attribute-based encryption | - |
dc.subject.keywordAuthor | user authority | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.