Research Article
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
407 downloads
@INPROCEEDINGS{10.1007/978-3-642-31909-9_4, author={Saman Zarandioon and Danfeng Yao and Vinod Ganapathy}, title={K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access}, proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={10}, keywords={Cloud Untrusted Storage Access Control Mashup Security Web}, doi={10.1007/978-3-642-31909-9_4} }
- Saman Zarandioon
Danfeng Yao
Vinod Ganapathy
Year: 2012
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
SECURECOMM
Springer
DOI: 10.1007/978-3-642-31909-9_4
Abstract
Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacy-preserving cryptographic access control protocol called 2 (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. 2 is scalable and supports the lazy revocation. It can be easily implemented on top of existing cloud services and APIs – we demonstrate its prototype based on Amazon S3 API.
Copyright © 2011–2024 ICST