浏览全部资源
扫码关注微信
1. 华侨大学工学院,福建 泉州 362021
2. 工业智能化技术与系统福建省高校工程研究中心,福建 泉州 362021
3. 北京邮电大学信息安全中心,北京100876
[ "张维纬(1982-),男,福建泉州人,博士,华侨大学讲师、硕士生导师,主要研究方向为大数据与云计算安全、物联网安全与密码学等。" ]
[ "张育钊(1963-),男,福建泉州人,华侨大学副教授、硕士生导师,主要研究方向为嵌入式系统安全、物联网技术应用等。" ]
[ "黄焯(1993-),男,福建福州人,华侨大学硕士生,主要研究方向为数据挖掘、云计算安全等。" ]
[ "张茹(1976-),女,山东济南人,博士,北京邮电大学副教授、硕士生导师,主要研究方向为数字水印、数字图像取证与密码学等。" ]
[ "杨义先(1961-),男,四川绵阳人,博士,北京邮电大学教授、博士生导师,主要研究为网络与信息安全、密码学、编码理论等。" ]
网络出版日期:2017-04,
纸质出版日期:2017-04-25
移动端阅览
张维纬, 张育钊, 黄焯, 等. 支持安全外包计算的无线体域网数据共享方案[J]. 通信学报, 2017,38(4):64-75.
Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, et al. Data sharing scheme supporting secure outsourced computation in wireless body area network[J]. Journal on communications, 2017, 38(4): 64-75.
张维纬, 张育钊, 黄焯, 等. 支持安全外包计算的无线体域网数据共享方案[J]. 通信学报, 2017,38(4):64-75. DOI: 10.11959/j.issn.1000-436x.2017085.
Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, et al. Data sharing scheme supporting secure outsourced computation in wireless body area network[J]. Journal on communications, 2017, 38(4): 64-75. DOI: 10.11959/j.issn.1000-436x.2017085.
如何有效保护无线体域网(WBAN)中数据共享时的数据安全是一个亟待解决的关键问题。传统的CP-ABE机制具有“一对多”的数据安全通信功能,适用于 WBAN 中的访问控制,但运算复杂度高且不支持属性撤销。充分考虑WBAN节点资源的有限性和用户属性的动态性,提出一种在标准模型下CPA安全、支持属性撤销、加密和解密安全外包计算的CP-ABE方案。与已有的方案相比,提出的方案在保证安全性的同时,终端的运算负担大为减少,且可以实时、细粒度地撤销用户属性。
How to effectively protect the security of data sharing in WBAN was a key problem to be solved urgently.The traditional CP-ABE mechanism had a 〝one to many〝 data security communication function which was suitable for access control in WBAN
but it had high computational complexity and did not support attribute revocation.Fully considering of limitations on computation and storage of sensor nodes and dynamic user attribute in WBAN
a CP-ABE scheme was proposed which was provably secure against CPA under the standard model and supported attributes revocation
outsourced encryption and decryption.Compared with the proposed schemes
the computation burden on senor nodes is greatly reduced and the user's attribution can be revoked immediately and fine grained while meeting the demand of its security in the proposed scheme.
HUSSEIN M , FRANCIS M B . Optimal relay selection and power control with quality-of-service provisioning in wireless body area networks [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 8 ): 5497 - 5510 .
HU F Y , WANG L , WANG S S . A human body posture recognition algorithm based on BP neural network for wireless body area networks [J ] . China Communications , 2016 , 13 ( 8 ): 198 - 208 .
肖人毅 . 云计算中数据隐私保护研究进展 [J ] . 通信学报 , 2014 , 35 ( 12 ): 168 - 177 .
XIAO R Y . Survey of privacy preserving data queries in cloud computing [J ] . Journal on Communications , 2014 , 35 ( 12 ): 168 - 177 .
董晓蕾 . 物联网隐私保护研究进展 [J ] . 计算机研究与发展 , 2015 , 52 ( 10 ): 2341 - 2351 .
DONG X L . Advances of privacy preservation in internet of things [J ] . Journal of Computer Research and Development , 2015 , 52 ( 10 ): 2341 - 2351 .
LI M , LOU W , REN K . Data security and privacy in wireless body area networks [J ] . IEEE Wireless Communications , 2010 , 17 ( 1 ): 51 - 58 .
HU C Q , LI H J , HUO Y , et al . Secure and efficient data communication protocol for wireless body area networks [J ] . IEEE Transactions on Multi-Scale Computing Systems , 2016 , 2 ( 2 ): 94 - 107 .
TIAN Y , PENG Y B , PENG X G , et al . An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks [J ] . International Journal of Distributed Sensor Networks , 2014 , 10 ( 11 ): 1 - 11 .
LIU X Y , ZHU Y S , GE Y , et al . A secure medical information management system for wireless body area networks [J ] . KSII Transactions on Internet and Information Systems , 2016 , 10 ( 1 ): 221 - 237 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Eurocrypt 2005 . Berlin:Heidelberg , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The ACM 13th Conference on Computer and Communications Security . 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // 2007 IEEE Symposium on Security and Privacy . Berkeley,CA:IEEE , 2007 : 321 - 334 .
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient and provably secure realization [C ] // PKC 2011 . Berlin:Heidelberg , 2005 : 53 - 70 .
YU S , REN K , LOU W . FDAC:Toward fine-grained distributed data access control in wireless sensor networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 4 ): 637 - 686 .
PICAZO-SANCHEZ P , TAPIADOR J E,PERIS-LOPEZ P , et al . Secure publish-subscribe protocols for heterogeneous medical wireless body area networks [J ] . Sensors , 2014 , 14 ( 12 ): 22619 - 22642 .
GUO F , MU Y , SUSILO W , et al . CP-ABE with constant-size keys for lightweight devices [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 5 ): 763 - 771 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // USENIX Security Symposium . Berkeley,CA:USENIX , 2011 : 523 - 538 .
ASIM M , PETKOVIC M , IGNATENKO T . Attribute-based encryption with encryption and decryption outsourcing [C ] // The 12th Australian Information Security Management Conference,Perth,Western Australia,Austria:Edith Cowan University , 2014 : 21 - 28 .
ZHOU Z B , HUANG D J . Efficient and secure data storage operations for mobile cloud computing [C ] // The 8th International Conference on Network and Service Management,Laxenburg,Austria:International Federation for Information Processing . 2012 : 37 - 45 .
ZHOU S G , DU R Y , CHEN J , et al . FACOR:flexible access control with outsourceable revocation in mobile clouds [J ] . China Communications , 2016 , 13 ( 4 ): 136 - 150 .
SHOUP V , . Lower bounds for discrete logarithms and related problems [C ] // Eurocrypt'97 . 1997 : 256 - 266 .
MAURER U , . Abstract models of computation in cryptography [C ] // Cryptography and Coding 2005 . 2005 : 1 - 12 .
BONEH D , FRANKLIN M . Identity-based encryption from the weil paring [C ] // CRYPTO 2001 . Berlin:Heidelberg , 2001 : 213 - 229 .
BEIMEL A . Secure schemes for secret sharing and key distribution [D ] . Haifa:Israel Institute of Technology , 1996 .
0
浏览量
1290
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构