期刊文献+

面向云存储的访问控制服务研究 被引量:3

Cloud Storage-oriented Access Control Service
在线阅读 下载PDF
导出
摘要 文章通过研究主要云存储服务中的访问控制机制的共性,设计了一种面向云存储的通用访问控制服务,即将访问控制独立为第三方服务,不仅可兼容多种访问控制策略,还可实现访问控制策略的动态变化以满足不同用户的需求。 By researching access control techniques in the main cloud storage services, this paper designs a cloud storage-oriented access control service as a third party service, which is not only compatible with a variety of access control policies, but also achieves dynamic access control policies to meet the needs of different users.
出处 《信息网络安全》 2013年第10期34-37,共4页 Netinfo Security
关键词 云存储 访问控制策略 访问控制服务 数据容器 cloud storage access control policy access control service data container
  • 相关文献

参考文献10

  • 1Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage. Hey you get off of my cloud: exploring information leakage in third- party compute clouds[C]. In ACM Conference on Computer and Communications Security, pages 199-212, 2009.
  • 2Declan McCulla.ghDropbox confirms security glitch-no password required[EB/OL], http://news.cnet.com/8301-31921 3-20072755-281/ dropbox-confirms-security-glitch-no -password-required, 2011-06-20.
  • 3THOMSON, I. Google docs leaks private user data online[EB/OL]. http://www.v3.co.uk/vnunet/news/2238122/google-docs-leaks- private, 2009.
  • 4V. Goyal, O. Pandey, A. Sahai, B. Waters. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, ACM, 2006.
  • 5B. Waters.Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C] .Public Key Cryptography PKC 2011, pp. 53-70, Springer, 2011.
  • 6S. D. C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati. Over-encryption: management of access control evolution on outsourced data[C]. Proceedings of the 33rd international conference on Very large data bases, pp. 123-134, VLDB endowment, 2007.
  • 7S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati. Support for write privileges on outsourced data[C]. Information Security and Privacy Research, pp. 199-210, Springer, 2012.
  • 8Access Control-Amazon Simple Storage Service[EB/OL]. http://docs. aws.amazon.com/AmazonS3/latest/dev/UsingAuthAccess.html,2013.
  • 9Introduction-Google Cloud Storage-Google Code[EB/OL]. http:// code.google.com/apis/storage/docs/getting-started.html,2013.
  • 10Access Control-Google Cloud Storage-Google Code[EB/OL]. http : / / code.google,com/ apis/ storage/ docs/ accesscontrol.html,2013.

同被引文献18

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部