Децентралізований доступ до хмарного сховища даних
dc.citation.epage | 14 | |
dc.citation.issue | 1 | |
dc.citation.journalTitle | Комп’ютерні системи та мережі | |
dc.citation.spage | 9 | |
dc.citation.volume | 1 | |
dc.contributor.affiliation | Національний університет “Львівська політехніка” | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.contributor.author | Березко, Л. О. | |
dc.contributor.author | Тат’янчук, В. П. | |
dc.contributor.author | Berezko, L. | |
dc.contributor.author | Tatianchuk, V. | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.date.accessioned | 2021-04-20T11:41:56Z | |
dc.date.available | 2021-04-20T11:41:56Z | |
dc.date.created | 2019-03-01 | |
dc.date.issued | 2019-03-01 | |
dc.description.abstract | Розглянуто питання підвищення безпеки зберігання та забезпечення конфіденційності управлінням доступом до даних у хмарних сховищах. Досліджено наявні способи контролю такого доступу. Запропоновано спосіб вдосконалення техніки шифрування, що ґрунтується на атрибутах політики шифротексту та його застосування в децентралізованій системі управління доступом до даних у багатокористувацьких хмарних системах їх зберігання. Основною метою є підвищення безпеки та конфіденційності управління хмарним сховищем даних, для якого наявне управління не відповідає всім необхідним вимогам. | |
dc.description.abstract | Consideration is given to enhancing storage security and maintaining data access control in cloud storage. Existing ways of controlling such access are analyzed. An enhancement of the encryption technique is proposed, based on the attributes of the ciphertext policy and its application in a decentralized data access management system in multi-user cloud storage systems. The main objective is to improve the security and privacy of the management of the cloud storage for which the existing management does not meet all the necessary requirements. | |
dc.format.extent | 9-14 | |
dc.format.pages | 6 | |
dc.identifier.citation | Березко Л. О. Децентралізований доступ до хмарного сховища даних / Л. О. Березко, В. П. Тат’янчук // Комп’ютерні системи та мережі. — Львів : Видавництво Львівської політехніки, 2019. — Том 1. — № 1. — С. 9–14. | |
dc.identifier.citationen | Berezko L. Decentralized access management scheme to the cloud data storage / L. Berezko, V. Tatianchuk // Kompiuterni systemy ta merezhi. — Lviv : Lviv Politechnic Publishing House, 2019. — Vol 1. — No 1. — P. 9–14. | |
dc.identifier.issn | 2707-2371 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/56352 | |
dc.language.iso | uk | |
dc.publisher | Видавництво Львівської політехніки | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Комп’ютерні системи та мережі, 1 (1), 2019 | |
dc.relation.references | 1. Mell, P., & Grance, T. (2011, september). The NIST Defination of Cloud Computing. Gaithersburg, MD, United States. Retrieved September 2016, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. | |
dc.relation.references | 2. Dhar, S. (2012). From Outsourcing to Cloud Computing: Evolution of it Services. Management Research Review, 35(8), 664–675. 3. | |
dc.relation.references | 3. Ogu, E. C., Alao, O., Omotunde, A., gbonna, A., & Izang, A. (2014). Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks. International Journal of Advanced Research in Computer Science, V(7), 67–71. doi:10.13140/2.1.2259.7129. | |
dc.relation.references | 4. Atchinson, Brian K.; Fox, Daniel M. (May–June 1997). “The Politics Of The Health Insurance Portability And Accountability Act” (PDF). Health Affairs. 16 (3): 146–150. doi:10.1377/hlthaf .16.3.146. Archived (PDF) from the original on 2014-01-16. | |
dc.relation.references | 5. “What You Need to KnowAbout PCI DSS Compliance: UK Costs & Checklist”. Retrieved December 18, 2018. | |
dc.relation.references | 6. “U. S. State Department – Policy – Directorate of Defense Trade Controls”. Pmddtc.state.gov. Archived from the original on September 14, 2010. Retrieved July 8, 2010. | |
dc.relation.references | 7. Presidency of the Council: “Compromise text. Several partial general approaches have been instrumental in converging views in Council on the proposal for a General Data Protection Regulation in its entirety. The text on the Regulation which the Presidency submits for approval as a General Approach appears in annex, “201 pages, 11 June 2015, PDF, http://data.consilium.europa.eu/doc/document/ST-9565-2015-INIT/en/pdf. | |
dc.relation.references | 8. Atchinson, Brian K.; Fox, Daniel M. (May–June 1997). The Politics Of The Health Insurance Portability And Accountability Act. Health Affairs[en] 16 (3): 146–150. doi:10.1377/hlthaf .16.3.146. | |
dc.relation.references | 9. 1McClennan, Jennifer P.; Schick, Vadim (2007). “O, Privacy: Canada’s Importance in the Development of the International Data Privacy Regime”. Georgetown Journal of International Law. 38: 669–693. | |
dc.relation.references | 10. Lewko A. B. and Waters B. “Decentralizing attribute-based encryption” in EUROCRYPT’11. Springer, 2011, pp. 568–588. | |
dc.relation.references | 11. Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive Report 2004/199, 16 Aug 2004, revised 17 Aug 2004. Retrieved July 27, 2008. | |
dc.relation.references | 12. Green, M., Hohenberger, S., Waters, B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Security Symposium. USENIX Association (2011). 13. M. Chase, “Multi-authority attribute based encryption,” in TCC’07. Springer, 2007, pp. 515–534. | |
dc.relation.referencesen | 1. Mell, P., & Grance, T. (2011, september). The NIST Defination of Cloud Computing. Gaithersburg, MD, United States. Retrieved September 2016, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. | |
dc.relation.referencesen | 2. Dhar, S. (2012). From Outsourcing to Cloud Computing: Evolution of it Services. Management Research Review, 35(8), 664–675. 3. | |
dc.relation.referencesen | 3. Ogu, E. C., Alao, O., Omotunde, A., gbonna, A., & Izang, A. (2014). Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks. International Journal of Advanced Research in Computer Science, V(7), 67–71. doi:10.13140/2.1.2259.7129. | |
dc.relation.referencesen | 4. Atchinson, Brian K.; Fox, Daniel M. (May–June 1997). "The Politics Of The Health Insurance Portability And Accountability Act" (PDF). Health Affairs. 16 (3): 146–150. doi:10.1377/hlthaf .16.3.146. Archived (PDF) from the original on 2014-01-16. | |
dc.relation.referencesen | 5. "What You Need to KnowAbout PCI DSS Compliance: UK Costs & Checklist". Retrieved December 18, 2018. | |
dc.relation.referencesen | 6. "U. S. State Department – Policy – Directorate of Defense Trade Controls". Pmddtc.state.gov. Archived from the original on September 14, 2010. Retrieved July 8, 2010. | |
dc.relation.referencesen | 7. Presidency of the Council: "Compromise text. Several partial general approaches have been instrumental in converging views in Council on the proposal for a General Data Protection Regulation in its entirety. The text on the Regulation which the Presidency submits for approval as a General Approach appears in annex, "201 pages, 11 June 2015, PDF, http://data.consilium.europa.eu/doc/document/ST-9565-2015-INIT/en/pdf. | |
dc.relation.referencesen | 8. Atchinson, Brian K.; Fox, Daniel M. (May–June 1997). The Politics Of The Health Insurance Portability And Accountability Act. Health Affairs[en] 16 (3): 146–150. doi:10.1377/hlthaf .16.3.146. | |
dc.relation.referencesen | 9. 1McClennan, Jennifer P.; Schick, Vadim (2007). "O, Privacy: Canada’s Importance in the Development of the International Data Privacy Regime". Georgetown Journal of International Law. 38: 669–693. | |
dc.relation.referencesen | 10. Lewko A. B. and Waters B. "Decentralizing attribute-based encryption" in EUROCRYPT’11. Springer, 2011, pp. 568–588. | |
dc.relation.referencesen | 11. Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive Report 2004/199, 16 Aug 2004, revised 17 Aug 2004. Retrieved July 27, 2008. | |
dc.relation.referencesen | 12. Green, M., Hohenberger, S., Waters, B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Security Symposium. USENIX Association (2011). 13. M. Chase, "Multi-authority attribute based encryption," in TCC’07. Springer, 2007, pp. 515–534. | |
dc.relation.uri | http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf | |
dc.relation.uri | http://data.consilium.europa.eu/doc/document/ST-9565-2015-INIT/en/pdf | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2019 | |
dc.rights.holder | © Березко Л. О., Тат’янчук В. П., 2019 | |
dc.subject | хмарні сховища даних | |
dc.subject | доступ | |
dc.subject | шифрування | |
dc.subject | cloud data warehouses | |
dc.subject | access | |
dc.subject | encryption | |
dc.subject.udc | 004.65 | |
dc.subject.udc | 004.62 | |
dc.title | Децентралізований доступ до хмарного сховища даних | |
dc.title.alternative | Decentralized access management scheme to the cloud data storage | |
dc.type | Article |
Files
License bundle
1 - 1 of 1