Full metadata record
DC FieldValueLanguage
dc.contributor.authorKao, Yung-Weien_US
dc.contributor.authorHuang, Kuan-Yingen_US
dc.contributor.authorGu, Hui-Zhenen_US
dc.contributor.authorYuan, Shyan-Mingen_US
dc.date.accessioned2014-12-08T15:31:43Z-
dc.date.available2014-12-08T15:31:43Z-
dc.date.issued2013en_US
dc.identifier.issn1751-8709en_US
dc.identifier.urihttp://hdl.handle.net/11536/22436-
dc.identifier.urihttp://dx.doi.org/10.1049/iet-ifs.2012.0198en_US
dc.description.abstractOne of the most challenging problems of cloud service solicitation is to persuade users to trust the security of cloud service and upload their sensitive data. Although cloud service providers can claim that their services are well-protected by elaborate encryption mechanisms, traditional cloud systems still cannot persuade the users that even if the cloud servers are compromised, the data are still securely protected. This study proposes uCloud, a user-centric key management scheme for cloud data protection, to solve this problem. uCloud utilises RSA and indirectly encrypts users' data by users' public keys, but stores the users' private keys on neither servers nor users' PCs; instead, the private keys are stored on users' mobile devices and presented via two-dimensional (2D) barcode images when they are utilised to decrypt users' sensitive data. In this manner, users' data are safely protected even if the cloud servers are compromised. Also, uCloud provides users with the experience of managing visible private keys by storing the keys into mobile phones and displaying them via 2D barcodes. Moreover, three scenarios: personal storage, home surveillance and enterprise storage scenarios are proposed to present the practicability of uCloud. In addition, a hierarchical structure is designed for basic key backup and data sharing in the proposed scheme.en_US
dc.language.isoen_USen_US
dc.titleuCloud: a user-centric key management scheme for cloud data protectionen_US
dc.typeArticleen_US
dc.identifier.doi10.1049/iet-ifs.2012.0198en_US
dc.identifier.journalIET INFORMATION SECURITYen_US
dc.citation.volume7en_US
dc.citation.issue2en_US
dc.citation.spage144en_US
dc.citation.epage154en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000321701300011-
dc.citation.woscount0-
Appears in Collections:Articles


Files in This Item:

  1. 000321701300011.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.