Download Now Free registration required
Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner's loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider need to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these issues. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key.
- Format: PDF
- Size: 208.5 KB