Skip to main content
placeholder image

Privacy enhanced data outsourcing in the cloud

Journal Article


Download full-text (Open Access)

Abstract


  • How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.

Publication Date


  • 2012

Citation


  • Zhou, M., Mu, Y., Susilo, W., Yan, J. & Dong, L. (2012). Privacy enhanced data outsourcing in the cloud. Journal of Network and Computer Applications, 35 (4), 1367-1373.

Scopus Eid


  • 2-s2.0-84860377061

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=9236&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1901

Number Of Pages


  • 6

Start Page


  • 1367

End Page


  • 1373

Volume


  • 35

Issue


  • 4

Abstract


  • How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.

Publication Date


  • 2012

Citation


  • Zhou, M., Mu, Y., Susilo, W., Yan, J. & Dong, L. (2012). Privacy enhanced data outsourcing in the cloud. Journal of Network and Computer Applications, 35 (4), 1367-1373.

Scopus Eid


  • 2-s2.0-84860377061

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=9236&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1901

Number Of Pages


  • 6

Start Page


  • 1367

End Page


  • 1373

Volume


  • 35

Issue


  • 4