完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Kao, Yung-Wei | en_US |
dc.contributor.author | Huang, Kuan-Ying | en_US |
dc.contributor.author | Gu, Hui-Zhen | en_US |
dc.contributor.author | Yuan, Shyan-Ming | en_US |
dc.date.accessioned | 2014-12-08T15:31:43Z | - |
dc.date.available | 2014-12-08T15:31:43Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.issn | 1751-8709 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/22436 | - |
dc.identifier.uri | http://dx.doi.org/10.1049/iet-ifs.2012.0198 | en_US |
dc.description.abstract | One of the most challenging problems of cloud service solicitation is to persuade users to trust the security of cloud service and upload their sensitive data. Although cloud service providers can claim that their services are well-protected by elaborate encryption mechanisms, traditional cloud systems still cannot persuade the users that even if the cloud servers are compromised, the data are still securely protected. This study proposes uCloud, a user-centric key management scheme for cloud data protection, to solve this problem. uCloud utilises RSA and indirectly encrypts users' data by users' public keys, but stores the users' private keys on neither servers nor users' PCs; instead, the private keys are stored on users' mobile devices and presented via two-dimensional (2D) barcode images when they are utilised to decrypt users' sensitive data. In this manner, users' data are safely protected even if the cloud servers are compromised. Also, uCloud provides users with the experience of managing visible private keys by storing the keys into mobile phones and displaying them via 2D barcodes. Moreover, three scenarios: personal storage, home surveillance and enterprise storage scenarios are proposed to present the practicability of uCloud. In addition, a hierarchical structure is designed for basic key backup and data sharing in the proposed scheme. | en_US |
dc.language.iso | en_US | en_US |
dc.title | uCloud: a user-centric key management scheme for cloud data protection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1049/iet-ifs.2012.0198 | en_US |
dc.identifier.journal | IET INFORMATION SECURITY | en_US |
dc.citation.volume | 7 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 144 | en_US |
dc.citation.epage | 154 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000321701300011 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |