CHAPTER 13

Cloud Security Key Management

Cloud User Controls

Weiyu Jiang

AWS China

Chaoyang District, Beijing

Jingqiang Lin

Institute of Information Engineering, Chinese Academy of Sciences

Haidian District, Beijing

Zhan Wang

Institute of Information Engineering, Chinese Academy of Sciences

Haidian District, Beijing

Bo Chen

Pennsylvania State University

University Park, Pennsylvania

Kun Sun

College of William and Mary

Williamsburg, Virginia

Contents

13.1 Introduction

13.2 Efficient Key-Enforced Access Control

13.2.1 Preliminaries

13.2.1.1 Over-Encryption

13.2.1.2 Limitations

13.2.2 Main Scheme

13.2.2.1 Dual-Header Structure

13.2.2.2 Batch Revocation

13.2.3 Access Control Policy Updates

13.2.3.1 Granting Privileges

13.2.3.2 Revoking Privileges ...

Get Cloud Computing Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.