期刊文献+

一种新型的安全云存储模型 被引量:2

A New Secure Model of Cloud Storage
下载PDF
导出
摘要 针对云存储中的数据安全访问控制问题,设计了一个以云服务器为中心节点,支持不同权限多用户访问的安全高效的云存储模型。该模型利用椭圆曲线公钥密码设计具有语义安全的可搜索加密算法,并结合关键字相关度定义和保序加密算法提高数据检索准确性,降低系统通信负担;通过代理加密思想、用户访问控制列表和用户——数据访问控制矩阵实现不同权限用户的访问控制,安全灵活解决动态用户密钥管理问题。最后通过对模型安全性和模型效率两个方面对比分析,对模型可行性给出了证明。 Aimed at the problem of the secure access to the data in cloud storage,an efficient and secure model of cloud storage which supports the access of multi-user in hierarchy and adopts the cloud server as the central point is proposed.This model is used to design a semantic searchable encryption with the use of elliptic curve cryptosystem,and the use of the model improves the accuracy of the result by the keyword's degree of correlation and the order preserving encryption.Through the combination of proxy encryption,user access control list and user-data access control matrix,this model can satisfy the access of multi-user in hierarchy and efficiently solve the management of the dynamic user's private keys.In the end through the analysis and comparison of the security and efficiency,the results show that his new model is feasible.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2013年第5期71-75,共5页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金资助项目(61272486)
关键词 云存储 椭圆曲线密码 保序加密 密钥管理 可搜索加密 cloud storage elliptic curve cryptosystem order preserving encryption key management searchable encryption
  • 相关文献

参考文献19

  • 1Dawn Xiaodong Song,David Wagner, Adrian Perrig. Practi-cal techniques for searches on encrypted data[C]//In the2000 IEEE symposium on security and privacy ,2000 : 44-55.
  • 2Masayuki Yoshino? Ken Naganuma,Hisayoshi Satoh. Sym-metric searchable encryption for database applications [ C] //2011 international conference on network-based informationsystems. Tirana, Albania: IEEE computer society, 2011 : 657-662.
  • 3Boneh C, Crescenzo G D? Ostrovsky R, et al. Public key en-cryption with keyword search[C]//Pro int,l conf advancesin cryptology C EUROCR YP ? 04). Berlin: Springer - verlag,2004:506-522.
  • 4Golle P,Staddon J, Waters B R. Secure conjunctive keywordsearch over encrypted data[C]//Proc Second inty conf ap-plied cryptography and network security. Berlin: Springer -verlag, 2004:31-45.
  • 5Hwang Y H,Lee P J. Public key encryption with conjunctivePairing-based cryptography. Berlin: Springer-verlag? 2007 :31-45.
  • 6Cong Wang, Ning Cao,Kui Ren? et al. Enabling secure andefficient ranked keyword search over outsourced cloud data[J] . IEEE transcantions parallel and distributed systems,2012f23(8):1467-1479.
  • 7Di Vimercati S D C,Foresti S, Jajodia S,et al. A data out-sourcing architecture combining cryptography and access con-trol[C]//Proc of ACM workshop on computer security archi-tecture. Fairfax, VA: ACM SIGAC,2007 : 63-69.
  • 8Yu S, Wang C, Ren K, et al. Achieving secure, scalable,andfine- grained data access control in cloud computing [C]//IEEE INFOCOM 2010. San Diego, CA : Vnited states instituteof electrical and electronics engineers inc,2010 :63-71.
  • 9Wang W,Owens Z Li R, Bhargava B. Secure and efficient ac-cess to outsourced data[C]//Proc of ACM cloud computing se-curity workshop. New York: ACM press,2009:55-65.
  • 10Yang Yanjiang. Towards multi-user private keyword searchfor cloud computing [ C] //2011 IEEE 4th international con-ference on cloud computing. Washington, DC: IEEE press,2011:758-759.

同被引文献13

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部