@inproceedings{b685acc7c93f4ec0be457086e2f60404,
title = "A security proxy scheme based on attribute node mapping for cloud storage",
abstract = "Cloud storage provides convenient storage services with data leaking risk while the encryption and decryption keys are supported by cloud service. However, the traditional CP-ABE scheme cannot solve the problem of integrity of could service provider according to single attributes rules. In this paper, we design a prototype system for secure cloud storage which separates storage services and security service using Attribute node mapping based on CP-ABE scheme. The prototype system consists of four parts: a client, a key generation center, a security proxy and a storage system. We propose an innovative convergence encryption method and a shared access mechanism to improve the encryption against guessing attack. Hierarchical eliminate redundancy and parallel data access technologies are also proposed improving the data transmission efficiency.",
keywords = "Access control, Attribute-based Encryption, CP-ABE, Cloud storage, Node mapping",
author = "Huakang Li and Zhenyu Wang and Yitao Yang and Guozi Sun",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2016.; 9th International Conference on Security, Privacy, and Anonymity in Computation, Communication and Storage, SpaCCS 2016 ; Conference date: 16-11-2016 Through 18-11-2016",
year = "2016",
doi = "10.1007/978-3-319-49148-6_2",
language = "English",
isbn = "9783319491479",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "14--25",
editor = "Thampi, {Sabu M.} and Indrakshi Ray and Guojun Wang and {Alcaraz Calero}, {Jose M.}",
booktitle = "Security, Privacy, andAnonymity inComputation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Proceedings",
}