Research on cloud storage systems supporting secure sharing
Papers|更新时间:2024-06-05
|
Research on cloud storage systems supporting secure sharing
Journal on CommunicationsVol. 38, Issue Z1, Pages: 88-96(2017)
作者机构:
1. 北京交通大学智能交通数据安全与隐私保护技术北京市重点实验室,北京 100044
2. 信息保障技术重点实验室,北京 100072
作者简介:
基金信息:
The National Natural Science Foundation of China(61502030);The National Natural Science Foundation of China(61672092);Innovation Foundation of Science and Technology on Information Assurance Laboratory(61421120401)
Yan SONG, Zhen HAN, Jian-jun LI, et al. Research on cloud storage systems supporting secure sharing[J]. Journal on Communications, 2017, 38(Z1): 88-96.
DOI:
Yan SONG, Zhen HAN, Jian-jun LI, et al. Research on cloud storage systems supporting secure sharing[J]. Journal on Communications, 2017, 38(Z1): 88-96. DOI: 10.11959/j.issn.1000-436x.2017240.
Research on cloud storage systems supporting secure sharing
A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption
proxy encryption with symmetric encryption
could integrate access control
efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last
the performance was analyzed and an experiment was made for verification.
FU Y X , LUO S M , SHU J W . Secure online storage system based on cloud storage environment [J ] . Journal of Software , 2014 , 25 ( 8 ): 1831 - 1843 .
XUE M , XUE W , SHU J W , et al . A secure storage system over cloud storage environment [J ] . Chinese Journal of Computers , 2015 , 38 ( 5 ): 987 - 998 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Advances in Cryptology (EUROCRYPT 2005),Aarhus,Denmark,2005 . Berlin Heidelberg:Springer , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security (CCS’ 06) . 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The 2007 IEEE Symposium on Security and Privacy (SP’ 07)2007 . 2008 : 321 - 334 .
ATTRUPADUNG N , HERRANZ J , LAGUILLAUME F , et al . Attribute-based encryption schemes with constant-size ciphertexts [J ] . Theoretical Computer Science , 2012 , 422 : 15 - 38 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // The 20th USENIX conference on security (SEC 2011) . 2011 : 34 - 49 .
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // The IEEE Symposium on Security and Privacy(S&P’00) . 2000 : 44 - 55 .
BONEH D , CRESCENZOM G D , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // The International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004) . 2004 : 506 - 522 .
LEE C C , HSU S T , H M S . A study of conjunctive keyword searchable schemes [J ] . International Journal of Network Security , 2013 , 15 ( 5 ): 321 - 330 .
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data [C ] // Applied Cryptography and Network Security Conference (ACNS 2004) . 2004 : 31 - 45 .
PARK D J , KIM K , and LEE P J . Public key encryption with conjunctive-field keyword search [C ] // The 5th Information Security Applications International Workshop (WISA 2004) . 2004 : 73 - 86 .
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system [C ] // The First International Conference of Pairing-Based Cryptography (Pairing 2007) . 2007 : 2 - 22 .
ZHANG B , ZHANG F G . An efficient public key encryption with conjunctive-subset keywords search [J ] . Journal of Network and Computer Applications , 2011 , 34 ( 1 ): 262 - 267 .