O'Reilly logo

Cloud Computing Security by John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13

Cloud Security Key Management

Cloud User Controls

Weiyu Jiang

AWS China

Chaoyang District, Beijing

Jingqiang Lin

Institute of Information Engineering, Chinese Academy of Sciences

Haidian District, Beijing

Zhan Wang

Institute of Information Engineering, Chinese Academy of Sciences

Haidian District, Beijing

Bo Chen

Pennsylvania State University

University Park, Pennsylvania

Kun Sun

College of William and Mary

Williamsburg, Virginia

CONTENTS

13.1  Introduction

13.2  Efficient Key-Enforced Access Control

13.2.1  Preliminaries

13.2.1.1  Over-Encryption

13.2.1.2  Limitations

13.2.2  Main Scheme

13.2.2.1  Dual-Header Structure

13.2.2.2  Batch Revocation

13.2.3  Access Control Policy Updates

13.2.3.1  Granting Privileges

13.2.3.2  Revoking ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required