Secure method for data storage and sharing during data outsourcing

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data via networks and various devices, which are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy re-encryption. However, existing searchable encryption technology is inconvenient for use in the storage outsourcing environments where users upload their data, which are shared with others as necessary. The users also change frequently. In addition, some existing methods are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we propose a secure and efficient method for data storage and sharing during data outsourcing. © 2013 Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Lee, S. H., Go, S. J., & Lee, I. Y. (2013). Secure method for data storage and sharing during data outsourcing. In Lecture Notes in Electrical Engineering (Vol. 253 LNEE, pp. 485–493). Springer Verlag. https://doi.org/10.1007/978-94-007-6996-0_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free