CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. This technique has not been employed extensively. The main reason lies in that users are especially concerned on the confidentiality, integrity and query of the outsourced files as cloud computing is a lot more complicated than the local data storage systems, as the cloud is managed by an untrusted third party. The outsoured files are not accessed by the unauthorized users and not modified by proxy servers is an important problem that has been considered in the data storage research community.The outsourced files from proxy servers is another concern as the proxy server only maintains the outsourced ciphertexts. These topics grows significantly. Query in data storage is executed between a receiver and a proxy server. The proxy server can perform some functions on the outsourced ciphertexts and convert them to those for the receiver. As a result, the receiver can obtain the data outsourced by the owner without the proxy server knowing the content of the data.
You are here: Home / ieee projects 2013 / IBSDDS:Access control and security schemes for Distributed Network