期刊文献+

基于服务商再加密机制的DaaS访问控制方案

Access control scheme in DaaS based on database provider re-encryption mechanism
下载PDF
导出
摘要 为增强DaaS的隐私保护,给出了DaaS中数据隐私的定义并将其作为授权的基本单位,基于数据隐私定义对关系数据表进行了形式化定义,基于DaaS服务框架提出了一种基于双线性映射的DaaS提供商再加密机制,将该机制与访问控制策略结合,设计了DaaS下保护隐私的访问控制方案,并分析了该方案的正确性与安全性。新方案不仅实现了服务提供者对委托密文数据细粒度、灵活的访问控制管理,还可有效地防止用户与服务提供商的合谋攻击。 To enforce the privacy preserving in DaaS,the concept of data privacy in DaaS is presented as the basic unit of access control management which will be authorized and a formal definition of the relational data table based on data privacy definition is given.Then the DaaS provider re-encryption mechanism with bilinear map is constructed based on the DaaS service framework.By combining the proposed mechanism with access control policy,a privacy preserving access control schema in DaaS is designed.Finally,the correctness and security of the new access control schema is analyzed.The new schema no only achieves flexible and fine-grained access control,but also effectively resists conspiracy attack and protects the privacy of data owner and data request.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第8期2711-2716,共6页 Computer Engineering and Design
基金 广东省医学基金项目(A2012295) 国家自然科学基金项目(65073145) 广东省战略性新兴产业核心攻关基金项目(2012A010701005) 广东省计算机网络重点实验室开放基金项目(CCNL201105)
关键词 云计算 数据库即服务 隐私保护 访问控制 重加密 双线性映射 cloud computing database as a service privacy preservation access control re-encryption bilinear map
  • 相关文献

参考文献12

  • 1TIAN Xiuxia. Access control and query processing with privacyin DaaS paradigm [D]. Shanghai: Fudan University, 2012 (inChi.
  • 2田秀霞.数据库服务中保护隐私的访问控制与查询处理[D].上海:复旦大学,2012.
  • 3Jessica E V. Google discloses privacy glitch [EB/OL]. 009-03-0. http: //blogs, wsj. com/digits/2009/03/08/1214/.
  • 4Greenberg A. Cloud computing,s stormy side [ EB/OL ].008-05-1. http://www. forbes. com/2008/02/17/ web-ap-plication -cloud-tech-Intel-cx_ag_0219cloud. html.
  • 5Moniruzzaman M D, Ferrous M D Sadek. A study of privacypolicy enforcement in access control models [C] // Proceedingsof 13th International Conference on Computer and InformationTechnology. Dhaka. Bangladesh: IEEE Computer Society,2010: 352-357.
  • 6ZHANG Rui. Research on privacy preserving based on trustedcomputing technology [D]. Beijing: Beijing Jiaotong Univer-sity, 2012: 65-89.
  • 7章睿.基于可信计算技术的隐私保护[D].北京:北京交通大学,2012: 65-89.
  • 8Blaze M, Bleumer G,Strauss M. Overtible protocols and atomicproj^ cryptography [C] //Eurocrypt. Nyberg K (ed ). Berlin:Springer Verlag,1998: 127-144.
  • 9Ateniese G, Fu K,Green M,et al. Improved proxy re-encryp-tion schemes with applications to secure distributed storage [J],ACM Transactions on Information and System Security, 2006,9 (1): 1-30.
  • 10Libert B, Vergnaud D. Tracing malicious proxies in proxy Re-Encryption [C] // Proceedings of the 2nd International Confer-ence on Pairing-based Cryptography-Pairing. Berlin: Springer,2008: 332-353.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部