浏览全部资源
扫码关注微信
华北电力大学 控制与计算机工程学院,北京 102206
[ "关志涛(1979-),男,辽宁沈阳人,博士,华北电力大学讲师,主要研究方向为电力信息安全、云安全、无线传感器网络安全。" ]
[ "杨亭亭(1989-),女,山东淄博人,华北电力大学硕士生,主要研究方向为云安全。" ]
[ "徐茹枝(1966-),女,江西上饶人,博士,华北电力大学副教授,主要研究方向为电力信息安全。" ]
[ "王竹晓(1981-),男,四川自贡人,博士,华北电力大学讲师,主要研究方向为智能电网Cyber-Physical系统安全、自治愈技术、知识表示与推理以及分布式动态描述逻辑。" ]
网络出版日期:2015-06,
纸质出版日期:2015-06-25
移动端阅览
关志涛, 杨亭亭, 徐茹枝, 等. 面向云存储的基于属性加密的多授权中心访问控制方案[J]. 通信学报, 2015,36(6):116-126.
Zhi-tao GUAN, Ting-ting YANG, Ru-zhi XU, et al. Multi-authority attribute-based encryption access control model for cloud storage[J]. Journal on communications, 2015, 36(6): 116-126.
关志涛, 杨亭亭, 徐茹枝, 等. 面向云存储的基于属性加密的多授权中心访问控制方案[J]. 通信学报, 2015,36(6):116-126. DOI: 10.11959/j.issn.1000-436x.2015142.
Zhi-tao GUAN, Ting-ting YANG, Ru-zhi XU, et al. Multi-authority attribute-based encryption access control model for cloud storage[J]. Journal on communications, 2015, 36(6): 116-126. DOI: 10.11959/j.issn.1000-436x.2015142.
已有基于属性加密的访问控制研究多是基于单授权中心来实现,该种方案在授权方不可信或遭受恶意攻击的情况下可能会造成密钥泄露。提出一种基于属性加密的多授权中心访问控制模型PRM-CSAC。基于CP-ABE方法,设计多授权中心的属性加密方案以提高密钥安全性;设计最小化属性分组算法,使用户访问文件时,能够按需分配密钥,减少不必要的属性密钥分配,降低重加密属性数量,提高系统效率;增加读写属性加强加密方对文件的访问控制,使访问控制策略更加完善。安全性分析及仿真实验表明,相比已有方案,PRM-CSAC对用户访问请求的响应时间更短,开销较小,且能够提供很高的安全性。
The existing attribute-based encryption access control studies are mostly based on single authority
and this scheme is apt to be under attack to cause exposure of secret keys.Thus
a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method
a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs
which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud
and it also has less response time and system cost.
李瑞轩 , 董新华 , 辜希武 等 . 移动云服务的数据安全与隐私保护综述 [J ] . 通信学报 , 2013 , 34 ( 12 ): 159 - 166 .
LI R X , DONG X H , GU X W , et al . Overview of the data security and privacy preserving of mobile cloud services [J ] . Journal on Communications , 2013 , 34 ( 12 ): 159 - 166 .
冯登国 , 张敏 , 张妍 等 . 云计算安全研究 [J ] . 软件学报 , 2011 , 22 ( 1 ): 71 - 83 .
FENG D G , ZHANG M , ZHANG Y , et al . Study on cloud computing security [J ] . Journal of Software , 2011 , 22 ( 1 ): 71 - 83 .
SHAMIR A . Identity-based cryptosystems and signature schemes [A ] . Advances in Cryptology [C ] . Springer , 1985 . 47 - 53 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Advances in Cryptology–EUROCRYPT 2005 [C ] . 2005 . 557 - 557 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine grained access control of encrypted data [A ] . CCS [C ] . 2006 . 89 - 98 .
苏金树 , 曹丹 , 王小峰 . 等 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
YU S,WANG C , REN K , LOU W . Achieving secure,scalable,and fine-grained data access control in cloud computing [A ] . IEEE INFOCOM [C ] . 2010 . 1 - 9 .
俞能海 , 郝卓 , 徐甲甲 . 等 云安全研究进展综述 [J ] . 电子学报 , 2013 , 41 ( 2 ): 371 - 381 .
YU N H , HAO Z , XU J J , et al . Review of cloud computing security [J ] . Acta Electronica Sinica , 2013 , 41 ( 2 ): 371 - 381 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . IEEE S;P 2007 . 321 - 334 .
WANG G J , LIU Q , WU J . Hierarchical attribute-based encryption for fine-grained access control in cloud storage services [A ] . CCS [C ] . 2010 . 735 - 737 .
CHASE M . Multi-authority attribute based encryption [A ] . Theory of Cryptography [C ] . 2007 . 515 - 534 .
CHASE M , CHOW S . Improving privacy and security in multi- authority attribute based encryption [A ] . CCS [C ] . 2009 . 121 - 130 .
LI M , YU S C , ZHENG Y , et al . Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 24 ( 1 ): 131 - 143 .
JUNG T,LI X , WAN Z , WAN M . Privacy preserving cloud data access with multi-authorities [A ] . IEEE INFOCOM [C ] . 2013 . 2625 - 2833 .
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography [A ] . Proc of EUROCRYPT [C ] . 1998 . 127 - 144 .
DAN B , MATTHEW K F . Identity-based encryption from the Weil pairing [A ] . Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology [C ] . 2001 . 213 - 229 .
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution [D ] . Haifa,Israel,Israel Institute of Technology , 1996 .
洪澄 , 张敏 , 冯登国 . AB-ACCS:一种云存储密文访问控制方法 [J ] . 计算机研究与发展 , 2010 , 47 ( z1 ): 259 - 265 .
HONG C , ZHANG M , FENG D G . A cryptographic access control scheme for cloud storage [J ] . Journal of Computer Research and Development , 2010 , 47 ( z1 ): 259 - 265 .
IMERCATI S D C , FORESTI S , JAJODIA S , et al . Over-encryption:management of access control evolution on outsourced data [A ] . Proc of VLDB’07 [C ] . 2007 . 123 - 134 .
0
浏览量
1968
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构