{"title":"一种新的基于加密配对的云存储安全解决方案","authors":"H. Eldeeb, H. Dahshan, A. Shehata","doi":"10.1109/JEC-ECC.2018.8679551","DOIUrl":null,"url":null,"abstract":"Cloud storage service is one of the services provided by cloud computing where data is stored on a remote group of public storage severs. Despite the various benefits of cloud storage service, the service suffers from various security problems. This paper introduces a new cryptographic and pairing-based security solution to overcome the security issues/concerns found in cloud storage security. In addition to confidentiality and privacy, the proposed solution provides a mechanism that eliminates the need for a trusted third-party entity for the purpose of cipher key management, private key distribution and user revocation. Besides, the solution is concerned with providing protection for the cipher key and its derived sub-keys against different security threats.","PeriodicalId":197824,"journal":{"name":"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A new Cryptographic Pairing-Based Security Solution for Cloud Storage\",\"authors\":\"H. Eldeeb, H. Dahshan, A. Shehata\",\"doi\":\"10.1109/JEC-ECC.2018.8679551\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud storage service is one of the services provided by cloud computing where data is stored on a remote group of public storage severs. Despite the various benefits of cloud storage service, the service suffers from various security problems. This paper introduces a new cryptographic and pairing-based security solution to overcome the security issues/concerns found in cloud storage security. In addition to confidentiality and privacy, the proposed solution provides a mechanism that eliminates the need for a trusted third-party entity for the purpose of cipher key management, private key distribution and user revocation. Besides, the solution is concerned with providing protection for the cipher key and its derived sub-keys against different security threats.\",\"PeriodicalId\":197824,\"journal\":{\"name\":\"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JEC-ECC.2018.8679551\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JEC-ECC.2018.8679551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new Cryptographic Pairing-Based Security Solution for Cloud Storage
Cloud storage service is one of the services provided by cloud computing where data is stored on a remote group of public storage severs. Despite the various benefits of cloud storage service, the service suffers from various security problems. This paper introduces a new cryptographic and pairing-based security solution to overcome the security issues/concerns found in cloud storage security. In addition to confidentiality and privacy, the proposed solution provides a mechanism that eliminates the need for a trusted third-party entity for the purpose of cipher key management, private key distribution and user revocation. Besides, the solution is concerned with providing protection for the cipher key and its derived sub-keys against different security threats.