期刊文献+

一个改进型云存储共享方案 被引量:5

Improved Data Sharing Scheme over Cloud Storage
下载PDF
导出
摘要 云存储安全一直是云安全研究的重点。Zhao等提出了一种云存储可信共享(TSCS)方案,但分析发现,该方案不能抵抗恶意CSP攻击。根据云存储安全需求,构建了云存储可信共享模型。随后,依据云存储可信共享模型构造了一个云存储可信共享方案。分析表明,新方案减弱了对随机数的依赖,不仅具有Zhao等的TSCS方案的安全性能,还能抵御服务器端的恶意篡改。新TSCS方案具有一定的应用前景。 Cloud storage security has always been emphasis in cloud security.Zhao et al.proposed a TSCS(Trusted Sharing over Cloud Storage) scheme,which is incapable of withstanding malicious CSP attacks,according to our analysis.This paper constructed the model of TSCS in terms of its requirements for security.Afterwards,a new TSCS scheme was proposed based on it.Analysis shows the new one relies less on random numbers,and not only retains the security properties of Zhao et al.’s scheme,but also resists tampering of the server,and could be put into application.
出处 《计算机科学》 CSCD 北大核心 2012年第8期99-103,共5页 Computer Science
基金 国家自然科学基金(10961013) 江西省教育厅科学技术研究项目(GJJ11730)资助
关键词 云安全 云存储安全 可信共享 Cloud security Cloud storage security Trusted sharing
  • 相关文献

参考文献16

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2张逢喆,陈进,陈海波,臧斌宇.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011,48(7):1155-1167. 被引量:53
  • 3李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37. 被引量:433
  • 4Heiser J, Nicolett M. Assessing the Security risks of cloud com- puting[EB/OL], http://www, gartner, com/DisplayDoeument? id= 685308,2008.
  • 5Ateniese G, Burns R, Curtmola R, et al. Provable data posses- sion at untrusted stores [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007: 598-609.
  • 6Ateniese G, Di Pietrn R, Mancini L, et al. Scalable and efficient provable data possession[C] // Proceedings of the 4th Interna- tional Conference on Security and Privacy in Communication Networks. 2008.
  • 7Wang Cong, Wang Qian, Ren Kui, et al. Ensuring data storage security in cloud computing[C]//Proceedings of the 17th IEEE International Workshop on Quality of Service. 2009 : 1-9.
  • 8Juels A, Kaliski J B. PORs.-Proofs of retrievability for large files [C] // Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007:584-597.
  • 9Wang Qian, Wang Cong, Li Jin, et ak Enabling public verifiability and data dynamics for storage security in cloud computing[C]// Proceedings of the 14th European Symposium on Research in Computer Security. 2009.
  • 10Wang Cong,Wang Qian, Ren Kui, et al. Privacy-Preserving Pub- lie Auditing for Data Storage Security in Cloud Computing[C]// Proceedings of the 29th IEEE Conference on Computer Commu- nications. 2010:1-9.

二级参考文献97

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1506

同被引文献72

  • 1Song D X,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy (S&P'00).2000:44-55.
  • 2Goh E J.Secure Indexes.http://crypto.stanford.edu/ eu-jin/papers/ secureindex/secureindex.pdf,2003.
  • 3Chang Y C,Mitzenmacher M.Privacy Preserving Keyword Sear-ches on Remote Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security(ACNS'05).LNCS 3531,2005:442-455.
  • 4Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunc-tive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security(ICICS'05).2005:414-426.
  • 5Golle P,Staddon J,Waters B.Secure Conjunctive KeywordSearch over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security (ACNS'04).2004:31-45.
  • 6Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]∥Proceedings of ACM Conference on Computer and Communications Security (CCS'06).2006:79-88.
  • 7Yang Z Q,Zhong S,Wright R.Privacy-Preserving Queries onEncrypted Data[C]∥Proceedings of European Symposium on Research in Computer Security (ESORICS'06).LNCS 4189,2006:479-495.
  • 8Boneh D,Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'04).2004:506-522.
  • 9Abdalla M,Bellare M,Catalano D,et al.Searchable Encryption Revisited:Consistency Properties,Ration to Anonymous IBE,and Extensions[C]∥Proceedings of International Cryptology Conference (CRYPTO'05).LNCS 3621,2005:205-222.
  • 10Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System[C]∥Proceedings of International Conference on Pairing-Based Cryptography(Pairing'07).LNCS 4575,2007:2-22.

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部