浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "王祥宇(1994-),男,内蒙古巴彦淖尔人西安电子科技大学博士生,主要研究方向为数据安全、云安全、大数据隐私保护等" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为信息安全、密码学与无线网络安全等。" ]
[ "苗银宾(1988-),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全。" ]
[ "张凯(1987-),男,陕西西安人,西安电子科技大学博士生,主要研究方向为密码学、信息安全等。" ]
[ "伍祈应(1994-),女,湖南邵阳人,西安电子科技大学硕士生,主要研究方向为网络与信息安全。" ]
网络出版日期:2018-05,
纸质出版日期:2018-05-25
移动端阅览
王祥宇, 马建峰, 苗银宾, 等. 基于密钥状态散列树的密钥存储管理方案[J]. 通信学报, 2018,39(5):94-102.
Xiangyu WANG, Jianfeng MA, Yinbin MIAO, et al. Key storage management scheme based on keyed hash tree with state[J]. Journal on communications, 2018, 39(5): 94-102.
王祥宇, 马建峰, 苗银宾, 等. 基于密钥状态散列树的密钥存储管理方案[J]. 通信学报, 2018,39(5):94-102. DOI: 10.11959/j.issn.1000-436x.2018080.
Xiangyu WANG, Jianfeng MA, Yinbin MIAO, et al. Key storage management scheme based on keyed hash tree with state[J]. Journal on communications, 2018, 39(5): 94-102. DOI: 10.11959/j.issn.1000-436x.2018080.
针对密文检索系统中多源数据加密带来的海量密钥存储管理问题,提出了以密钥状态散列树作为密钥派生结构的密钥存储管理方案。该方案借助根密钥及密钥派生树进行密钥计算,且只需要存储根密钥和树结构,大大降低了密钥存储开销;另外,该方案可以根据撤销状态值进行密钥撤销管理,解决了派生树密钥撤销及结构更新难题。安全分析表明,部分数据密钥的泄露并不会泄露其他数据机密性,且基于实际数据集的性能分析表明所提密钥管理方案在实际应用中是可行的。
To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system
a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree
and just needs to store the root key and the tree structure
which greatly reduces the key storage costs.In addition
the scheme manages key revocation according to the revocation state value
thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data
and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.
曾文英 , 赵跃龙 , 尚敏 . 云计算及云存储生态系统研究 [J ] . 计算机研究与发展 , 2011 , 48 ( S1 ): 234 - 239 .
ZENG W Y , ZHAO Y L , SHANG M . Research on cloud computing and cloud storage ecosystem [J ] . Journal of Computer Research and Development , 2011 , 48 ( S1 ): 234 - 239 .
ABDALLA M , BELLARE M , CATALANO D , et al . Searchable encryption revisited:consistency properties,relation to anonymous ibe,and extensions [J ] . Journal of Cryptology , 2008 , 21 ( 3 ): 350 - 391 .
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [C ] // ACM Conference on Computer and Communications Security (CCS) . 2006 : 79 - 88 .
CUI Z , ZHU H , CHI L . Lightweight key management on sensitive data in the cloud [J ] . Security & Communication Networks , 2013 , 6 ( 10 ): 1290 - 1299 .
ATALLAH M J , BLANTON M , FAZio N , et al . Dynamic and efficient key management for access hierarchies [J ] . ACM Transactions on Information and System Security (TISSEC) , 2009 , 12 ( 3 ): 1 - 43 .
BLUNDO C , CIMATO S , VIMERCATI S D C D , et al . Efficient key management for enforcing access control in outsourced scenarios [C ] // Emerging Challenges for Security . 2009 : 364 - 375 .
CUI Z , ZHU H , SHI J , et al . Lightweight management of authorization update on cloud data [C ] // International Conference on Parallel and Distributed Systems (ICPADS) . 2014 : 456 - 461 .
BESSANI A , CORREIA M , QUARESMA B , et al . DepSky:dependable and secure storage in a cloud-of-clouds [J ] . ACM Transactions on Storage , 2011 , 9 ( 4 ): 31 - 46 .
马华 , 白翠翠 , 李宾 , 等 . 支持属性撤销和解密外包的属性基加密方案 [J ] . 西安电子科技大学学报自然科学版 , 2015 , 42 ( 6 ): 6 - 10 .
MA H , BAI C C , LI B , et al . Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing [J ] . Journal of Xidian University (Natural Science) , 2015 , 42 ( 6 ): 6 - 10 .
付东来 , 彭新光 , 杨玉丽 . 基于可信平台模块的外包数据安全访问方案 [J ] . 电子与信息学报 , 2013 , 35 ( 7 ): 1766 - 1773 .
FU D L , PENG X G , YANG Y L . Trusted platform module-based scheme for secure access to outsourced data [J ] . Journal of Electronics& Information Technology , 2013 , 35 ( 7 ): 1766 - 1773 .
田丰 , 桂小林 , 张学军 , 等 . 基于兴趣点分布的外包空间数据隐私保护方法 [J ] . 计算机学报 , 2014 , 37 ( 1 ): 123 - 138 .
TIAN F , GUI X L , ZHANG X J , et al . Privacy-preserving approach for outsourced spatial data based on POI distribution [J ] . Chinese Journal of Computers , 2014 , 37 ( 1 ): 123 - 138 .
周林 , 矫文成 , 吴杨 , 等 . 一种基于层簇式的卫星网络组密钥管理方案 [J ] . 宇航学报 , 2013 , 34 ( 4 ): 559 - 567 .
ZHOU L , JIAO W C , WU Y , et al . A group key agreement protocol based on layer-cluster for satellite network [J ] . Journal of Astronautics , 2013 , 34 ( 4 ): 559 - 567 .
WONG C K , GOUDA M , LAM S S . Secure group communications using key graphs [J ] . IEEE/ACM Transactions on Networking , 2000 , 8 ( 1 ): 16 - 30 .
祝烈煌 , 曹元大 , 廖乐健 . 基于状态密钥树的安全群组密钥分发协议 [J ] . 北京理工大学学报 , 2006 , 26 ( 9 ): 805 - 808 .
ZHU L H , CAO Y D , LIAO L J . Secure group key distribution protocol based on the status key tree [J ] . Transactions of Beijing institute of Technology , 2006 , 26 ( 9 ): 805 - 808 .
LI Y , DHOTRE N S , OHARA Y , et al . Horus:fine-grained encryption-based security for large-scale storage [C ] // Usenix Conference on File and Storage Technologies (FAST) . 2013 : 147 - 160 .
KALLAHALLA M , RIEDEL E , SWAMINATHAN R , et al . Plutus:scalable secure file sharing on untrusted storage [C ] // Usenix Conference on File and Storage Technologies . 2003 : 29 - 42 .
MARTIN L . XTS:a mode of AES for encrypting hard disks [J ] . IEEE Security & Privacy , 2010 , 8 ( 3 ): 68 - 69 .
0
浏览量
1187
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构