期刊文献+

云计算中数据资源的安全共享机制 被引量:20

A Secure Sharing Mechanism for Data Resources in Cloud Computing
下载PDF
导出
摘要 文章基于密文策略的属性加密模式,提出了一种数据资源的安全共享机制,在此安全共享机制中,它为每个数据拥有者定义了相应的数据属性,并为数据共享的不同过程提出了相应算法。为了证明这种共享机制的可行性和有效性,进行了一系列的实验。实验结果表明,在云计算中使用这种机制能够确保数据资源的安全共享。 In order to solve this problem, we propose a secure sharing mechanism which is based on the ciphertext-policy attribute-based encryption scheme (CPA scheme). In the secure sharing mechanism, the corresponding data attributes are defined for each owner and some corresponding algorithms are proposed for different processes. In order to justify the feasibility and availability of the sharing mechanism, a series of experiments have been done. The results show that it is feasible to ensure the security of data resources sharing in cloud computing.
出处 《信息网络安全》 2012年第8期79-82,共4页 Netinfo Security
关键词 安全的共享 数据资源 云计算 secure sharing data resources cloud computing
  • 相关文献

参考文献9

  • 1Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures, Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, China: IEEE Computer Society, 2009: 711-716.
  • 2Roy I, Ramadan H, Setty S, et al. Airavat: Security and privacy for map reduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose, USA: USENIX Association Berkeley, 2010: 297-312.
  • 3Mowbray M, Pearson S. A client-based privacy manager for cloud computing, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, New York, USA: Association for Computing Machinery, 2009.
  • 4Creese S, Hopkins P, Pearson S, et al. Data protection-aw are design for cloud services, Proceedings of the 1st International Conference on Cloud Computing. Lecture Notes in Computer Science. Beijing, China: Springer, 2009: 119-130.
  • 5林果园,贺珊,黄皓,吴吉义,陈伟.基于行为的云计算访问控制安全模型[J].通信学报,2012,33(3):59-66. 被引量:69
  • 6毛剑,李坤,徐先栋.云计算环境下隐私保护方案[J].清华大学学报(自然科学版),2011,51(10):1357-1362. 被引量:42
  • 7冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1064
  • 8吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 9L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE, In Proc. of CCS' 07, New York, NY, USA, 2007.456-465.

二级参考文献61

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1166

同被引文献111

引证文献20

二级引证文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部