期刊文献+

企业云存储数据的加密与密文全文检索研究 被引量:9

Enterprise Data Encryption and Ciphertext Fulltext Retrieval on Cloud Storage
下载PDF
导出
摘要 将密文规则的基于属性加密技术同Lucene全文索引技术相结合,提出适合云存储中密文数据全文检索的方法;针对云存储的特点改进了密文规则的基于属性加密技术.给出了设置在企业端的私有安全模型,并基于Lucene全文索引引擎以及改进的密文规则的基于属性加密方案开发设计了密文全文检索服务和数据加密与访问控制服务.在Eucalyptus云平台上实现了该安全模型的主要服务模块.该安全模型较好地解决了企业数据云存储的机密性与密文全文检索问题. Based on ciphertext-policy attribute-based encryption and full text indexing technology of Lucene, a method of ciphertext data in full text indexing and retrieving is proposed for cloud storage applications. An improved ciphertext-policy attribute-based en- cryption is presented according to features of cloud storage applications. A security model deployed in enterprise sides is proposed. Services of data encryption, ciphertext fulltext retrieval and access control are designed based on Lucene full text indexing engine and the improved ciphertext-policy attribute-based encrypfion. The security model can be used to solve the problem of data confidential and ciphertext full text retrieval of an enterprise in the cloud storage properly.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第2期429-432,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金委员会与中国民用航空局联合项目(60979011)资助
关键词 云存储 机密性 密文访问控制 密文检索 cloud storage confidentiality ciphertext access control ciphertext retrieval
  • 相关文献

参考文献9

  • 1Bethencourt J,Sahai A,Waters B. Ciphertext-policy attributcbased encryption[A].Los Alamitos,2007.321-334.
  • 2Goh E,Shacham H,Modadugu N. SiRiUS:securing remote untrusted storage[A].San Diego,Internet SOCiety,2003.131-145.
  • 3Damiani E. Key management for multi-user encrypted databases[A].New York:ACM,2005.74-83.
  • 4Vimercati S D C,Foresti S,Jajodia S. Over-encryption:management of access control evolution on outsourced data[A].2007.123-134.
  • 5Hong Cheng,Zhang Min,Feng Deng-guo. AB-ACCS:a cryptographic access control scheme for cloud storage[J].Journal of Computer Research and Development,2010,(Sup):259-265.
  • 6Feng Deng-guo,Zhang Min,Zhang Yan. Research on cloud security[J].Journal of Software,2011,(01):71-83.doi:10.3724/SP.J.1001.2011.03958.
  • 7Gentry C. Fully homomorphic encryption using ideal lattices[A].New York,2009.169-178.
  • 8洪澄;张敏;冯登国.AB-ACCS:一种云存储密文访问控制方法[J]计算机研究与发展,2010(Suppl):259-265.
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

同被引文献74

  • 1郭思培,彭智勇,唐祖锴,李旭辉,任毅.基于对象代理模型的形式概念分析方法应用研究[J].计算机研究与发展,2008,45(z1):212-216. 被引量:2
  • 2牛德华,马建峰,马卓,李辰楠,王蕾.基于属性的安全增强云存储访问控制方案[J].通信学报,2013,34(S1):276-284. 被引量:12
  • 3Lupse OS, Vida MM, Tivadar LS. Cloud Computing and interoperability in healthcare information systems[ C]. The First International Conference on Intelligent Systems and Applications. France : Paseal Lorenz, 2012 : 81-85.
  • 4Hassan T, James BD, Gail-Joon A. Security and privacy challenges in cloud computing environments[J]. In IEEE Journal& Magazines, 2010,8 ( 6 ) : 32-39.
  • 5Zhang R, Liu L. Security models and requirements for health- care application clouds[J]. In IEEE ard International Confer ence on Cloud Computing. Florida: Cririvas, 2 010 : 5-10.
  • 6Takabi H ,Joshi JB. An approach to manage policy hetero- geneity in cloud computing e.nvironment[C]. In 45th Ha- waii International Conference on System Sciences. Honda- lu: Ralph,2012,27(9) : 10-15.
  • 7Bowers KD,Juels A,Oprea A. HAIL. A high-availability and integrity layer for cloud storage[C]//Proc of the 16th ACM Conference on computer and communications secur- ity. New York : ACM,2009: 187-198.
  • 8Gartner. Teleworking in the cloud:security risks andrem edies[DB/OL]. 2010[2010-11-11]. http://www. gartner corn/resources/167600 / 167661 / teleworking-in- the-cloud- sec_167661. pdf.
  • 9Cloud Security Alliance. Security guidance for critical are- as of focus in cloud computing[DB/OL]. 2010[2010-11-11 ]. http..//www, eloudsecurityalliance. org/guidance/ csaguide. pdf.
  • 10SUN.云计算架构介绍白皮书[DB/OL].2010[2010-11-11].http://developers.sun.com.cn/blog/functionalca,resource/sun_353cloudcomputing_chinese.pdf.

引证文献9

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部