Data access control policy of encrypted deduplication system
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such a...
Saved in:
Main Authors: | Chunfu JIA, Guanxiong HA, Ruiqi LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020062/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
by: Chunfu JIA, et al.
Published: (2021-10-01) -
Data popularity-based encrypted deduplication scheme without third-party servers
by: Guanxiong HA, et al.
Published: (2022-08-01) -
Cloud data secure deduplication scheme via role-based symmetric encryption
by: Jinbo XIONG, et al.
Published: (2018-05-01) -
Key-customizable encrypted deduplication with access control for cloud storage
by: GU Bolun, et al.
Published: (2024-08-01) -
Research progress on secure data deduplication in cloud
by: Jin-bo XIONG, et al.
Published: (2016-11-01)