Loading web-font TeX/Math/Italic
Research and Application of Data Privacy Protection Technology in Cloud Computing Environment Based on Attribute Encryption | IEEE Conference Publication | IEEE Xplore

Research and Application of Data Privacy Protection Technology in Cloud Computing Environment Based on Attribute Encryption


Abstract:

With the continuous progress of Internet information technology, cloud computing has come into being. In the cloud computing environment, most applications and data are m...Show More

Abstract:

With the continuous progress of Internet information technology, cloud computing has come into being. In the cloud computing environment, most applications and data are moved to the huge network data centers of cloud service providers. However, when users outsource sensitive data to cloud services, this raises a number of issues related to data security and access control. Focusing on cloud computing environment based on the weight of attribute more agencies encryption problem, this paper puts forward a cloud computing environment based on the weight of attribute more agencies encryption scheme, and by introducing concept of attribute weights, attributes authority according to the attribute importance for attributes assigned different weights. Attribute weights of attributes can be converted to set. This scheme can reflect the importance of attributes, so it has more practical significance, so as to prove the security and correctness of the cloud computing environment.
Date of Conference: 28-30 July 2020
Date Added to IEEE Xplore: 22 September 2020
ISBN Information:
Conference Location: Shenyang, China

I. Introduction

Hash function is the modern cryptography constitute the basic elements of a lot of information security solutions, plays an important role in modern cryptography. The hash function is used to compress arbitrary length messages into fixed-length message digests, and it has been widely used in the integrity of the data authentication, digital signature, key management, etc. [1]–[3]

Contact IEEE to Subscribe

References

References is not available for this document.