Efficient Sharing of Secure Cloud Storage Services

Free registration required

Executive Summary

Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob is the user at the upper level and all the employees in the company are the users at the lower level. This paper designs and constructs a scheme, which enables the user at the upper level to efficiently share the secure cloud storage services with all the users at the lower level. A sender can specify several users at the lower level as the recipients for a file by taking the number and public keys of the recipients as inputs of a hierarchical identity based encryption algorithm.

  • Format: PDF
  • Size: 227.1 KB