Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing

Download Now
Provided by: Naval University of Engineering
Topic: Cloud
Format: PDF
The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, the authors extensively analyze the techniques on data privacy protection for secure cloud storage. They propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKC-based scheme, key-escrow-based scheme, ID-based threshold decryption scheme, and trusted third party based scheme. After the analysis and comparison, ID-based threshold decryption scheme has the most advantages with respect to no constraints such as certificate and key escrow.
Download Now

Find By Topic