Journal on Communications ›› 2014, Vol. 35 ›› Issue (10): 127-137.doi: 10.3969/j.issn.1000-436x.2014.10.015

• Papers • Previous Articles     Next Articles

Trusted secure model for data services in cloud computing

Li-zhi XIONG1,Zheng-quan XU1(),Xin GU2   

  1. 1 State Key Laboratory of Information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University,Wuhan 430079,China
    2 Hubei Institute of Standardization,Wuhan 430061,China
  • Online:2014-10-25 Published:2017-06-14
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Basic Research Program of China (973 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Ph.D.Programs Foundation of Ministry of Education of China

Abstract:

For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.

Key words: cloud data services, re-encryption scheme, data security, trusted model

No Suggested Reading articles found!