You are not logged in.

Two-factor data security protection mechanism for cloud storage system

Liu, Joseph K., Liang, Kaitai, Susilo, Willy, Liu, Jianghua and Xiang, Yang 2016, Two-factor data security protection mechanism for cloud storage system, IEEE transactions on computers, vol. 65, no. 6, pp. 1992-2004, doi: 10.1109/TC.2015.2462840.

Attached Files
Name Description MIMEType Size Downloads

Title Two-factor data security protection mechanism for cloud storage system
Author(s) Liu, Joseph K.
Liang, Kaitai
Susilo, Willy
Liu, Jianghua
Xiang, Yang
Journal name IEEE transactions on computers
Volume number 65
Issue number 6
Start page 1992
End page 2004
Total pages 13
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2016-06
ISSN 0018-9340
1557-9956
Keyword(s) two-factor
factor revocability
security
cloud storage
Summary In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the ciphertext. The first thing is his/her secret key stored in the computer. The second thing is a unique personal security device which connects to the computer. It is impossible to decrypt the ciphertext without either piece. More importantly, once the security device is stolen or lost, this device is revoked. It cannot be used to decrypt any ciphertext. This can be done by the cloud server which will immediately execute some algorithms to change the existing ciphertext to be un-decryptable by this device. This process is completely transparent to the sender. Furthermore, the cloud server cannot decrypt any ciphertext at any time. The security and efficiency analysis show that our system is not only secure but also practical.
Language eng
DOI 10.1109/TC.2015.2462840
Field of Research 080503 Networking and Communications
080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30089220

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 5 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Wed, 23 Nov 2016, 15:37:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.