My Library

Limit search to available items
Book Cover
Title Security for Cloud Storage Systems [electronic resource].
Author Yang, Kan.
Publication Info. Dordrecht : Springer, 2014.

Location Call No. Status Notes
 Libraries Electronic Books  ELECTRONIC BOOKS-DDA    AVAIL. ONLINE
Description 1 online resource.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series SpringerBriefs in computer science.
Contents Preface; Contents; 1 Introduction; 1.1 Brief Introduction to Cloud Storage Systems; 1.1.1 Cloud Computing; 1.1.2 Cloud Storage as a Service; 1.2 Data Security for Cloud Storage Systems; 1.2.1 Storage Auditing as a Service; 1.2.2 Access Control as a Service; References; 2 TSAS: Third-Party Storage Auditing Service; 2.1 Introduction; 2.2 Preliminaries and Definitions; 2.2.1 Bilinear Pairing; 2.2.2 Computational Bilinear Diffie-Hellman Assumption; 2.2.3 Definition of System Model; 2.2.4 Definition of Security Model; 2.3 An Efficient and Privacy-Preserving Auditing Protocol; 2.3.1 Overview.
2.3.2 Algorithms for Auditing Protocol2.3.3 Construction of the Privacy-Preserving Auditing Protocol; 2.3.4 Correctness Proof; 2.4 Secure Dynamic Auditing; 2.4.1 Solution of Dynamic Auditing; 2.4.2 Algorithms and Constructions for Dynamic Auditing; 2.5 Batch Auditing for Multi-Owner and Multi-Cloud; 2.5.1 Algorithms for Batch Auditing for Multi-Owner and Multi-Cloud; 2.5.2 Correctness Proof; 2.6 Security Analysis; 2.6.1 Provably Secure Under the Security Model; 2.6.2 Privacy-Preserving Guarantee; 2.6.3 Proof of the Interactive Proof System; 2.7 Performance Analysis; 2.7.1 Storage Overhead.
2.7.2 Communication Cost2.7.3 Computation Complexity; 2.7.4 Computation Cost of the Owner; 2.8 Related Work; 2.9 Conclusion; References; 3 ABAC: Attribute-Based Access Control; 3.1 Introduction; 3.2 Preliminary; 3.2.1 Access Structures; 3.2.2 Linear Secret Sharing Schemes; 3.2.3 Bilinear Pairing; 3.2.4 q-Parallel BDHE Assumption; 3.3 System and Security Model; 3.3.1 System Model; 3.3.2 Framework; 3.3.3 Security Model; 3.4 ABAC: Attribute-Based Access Control with Efficient Revocation; 3.4.1 Overview; 3.4.2 Construction of ABAC; 3.4.3 Attribute Revocation Method; 3.5 Analysis of ABAC.
3.5.1 Security Analysis3.5.2 Performance Analysis; 3.6 Related Work; 3.7 Conclusion; References; 4 DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems; 4.1 Introduction; 4.2 System Model and Security Model; 4.2.1 System Model; 4.2.2 DAC-MACS Framework; 4.2.3 Security Model; 4.3 DAC-MACS: Data Access Control for Multi-Authority Cloud Storage; 4.3.1 Overview; 4.3.2 Construction of DAC-MACS; 4.3.3 Efficient Attribute Revocation for DAC-MACS; 4.4 Analysis of DAC-MACS; 4.4.1 Comprehensive Analysis; 4.4.2 Security Analysis; 4.4.3 Performance Analysis.
4.5 Related Work4.6 Conclusion; References.
Reproduction Electronic reproduction. Perth, W.A. Available via World Wide Web.
Note Description based on print version record.
Added Author Jia, Xiaohua.
Ebooks Corporation
Related To Print version: Yang, Kan. Security for Cloud Storage Systems. Dordrecht : Springer, ©2014 9781461478720
ISBN 9781461478737
OCLC # EBC1317706
View Shelf for Similar Items