浏览全部资源
扫码关注微信
1. 北京交通大学智能交通数据安全与隐私保护技术北京市重点实验室,北京 100044
2. 信息保障技术重点实验室,北京 100072
[ "宋衍(1982-),男,湖北老河口人,北京交通大学博士生,信息保障技术重点实验室工程师,主要研究方向为密态计算、云计算安全等。" ]
[ "韩臻(1962-),男,浙江宁波人,北京交通大学教授、博士生导师,主要研究方向为信息安全体系结构、可信计算等。" ]
[ "李建军(1980-),男,山东荣城人,信息保障技术重点实验室博士后,主要研究方向为态势感知、智能防御等。" ]
[ "韩磊(1983-),男,内蒙古海拉尔人,信息保障技术重点实验室博士后,主要研究方向为云计算、态势感知等。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
宋衍, 韩臻, 李建军, 等. 支持安全共享的云存储系统研究[J]. 通信学报, 2017,38(Z1):88-96.
Yan SONG, Zhen HAN, Jian-jun LI, et al. Research on cloud storage systems supporting secure sharing[J]. Journal on communications, 2017, 38(Z1): 88-96.
宋衍, 韩臻, 李建军, 等. 支持安全共享的云存储系统研究[J]. 通信学报, 2017,38(Z1):88-96. DOI: 10.11959/j.issn.1000-436x.2017240.
Yan SONG, Zhen HAN, Jian-jun LI, et al. Research on cloud storage systems supporting secure sharing[J]. Journal on communications, 2017, 38(Z1): 88-96. DOI: 10.11959/j.issn.1000-436x.2017240.
针对云存储的数据安全共享及效率问题,提出一种实用的云存储系统方案。方案使用对称加密和属性加密,融入代理加密功能,实现加密保护、访问控制和高效检索的无缝结合。基于双线性映射和多项式方程技术,实现连接关键词非域子集搜索。基于外包解密技术,将原属于用户完成的部分解密工作转移到云端服务器完成,降低解密带来的计算开销。对方案的性能进行了分析,并通过实验验证。
A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption
proxy encryption with symmetric encryption
could integrate access control
efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last
the performance was analyzed and an experiment was made for verification.
傅颖勋 , 罗圣美 , 舒继武 . 一种云存储环境下的安全网盘系统 [J ] . 软件学报 , 2014 , 25 ( 8 ): 1831 - 1843 .
FU Y X , LUO S M , SHU J W . Secure online storage system based on cloud storage environment [J ] . Journal of Software , 2014 , 25 ( 8 ): 1831 - 1843 .
薛矛 , 薛巍 , 舒继武 , 等 . 一种云存储环境下的安全存储系统 [J ] . 计算机学报 , 2015 , 38 ( 5 ): 987 - 998 .
XUE M , XUE W , SHU J W , et al . A secure storage system over cloud storage environment [J ] . Chinese Journal of Computers , 2015 , 38 ( 5 ): 987 - 998 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Advances in Cryptology (EUROCRYPT 2005),Aarhus,Denmark,2005 . Berlin Heidelberg:Springer , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security (CCS’ 06) . 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The 2007 IEEE Symposium on Security and Privacy (SP’ 07)2007 . 2008 : 321 - 334 .
ATTRUPADUNG N , HERRANZ J , LAGUILLAUME F , et al . Attribute-based encryption schemes with constant-size ciphertexts [J ] . Theoretical Computer Science , 2012 , 422 : 15 - 38 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // The 20th USENIX conference on security (SEC 2011) . 2011 : 34 - 49 .
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // The IEEE Symposium on Security and Privacy(S&P’00) . 2000 : 44 - 55 .
BONEH D , CRESCENZOM G D , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // The International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004) . 2004 : 506 - 522 .
LEE C C , HSU S T , H M S . A study of conjunctive keyword searchable schemes [J ] . International Journal of Network Security , 2013 , 15 ( 5 ): 321 - 330 .
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data [C ] // Applied Cryptography and Network Security Conference (ACNS 2004) . 2004 : 31 - 45 .
PARK D J , KIM K , and LEE P J . Public key encryption with conjunctive-field keyword search [C ] // The 5th Information Security Applications International Workshop (WISA 2004) . 2004 : 73 - 86 .
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system [C ] // The First International Conference of Pairing-Based Cryptography (Pairing 2007) . 2007 : 2 - 22 .
ZHANG B , ZHANG F G . An efficient public key encryption with conjunctive-subset keywords search [J ] . Journal of Network and Computer Applications , 2011 , 34 ( 1 ): 262 - 267 .
0
浏览量
661
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构