期刊文献+

基于MA-ABE的云存储访问控制策略 被引量:1

Cloud storage access control policy based on MA-ABE
下载PDF
导出
摘要 针对云存储访问控制存在的效率和安全问题,提出一种基于MA-ABE的云存储访问控制策略,并详细给出MA-ABE算法和云存储访问控制实现过程.使用多授权中心的属性加密机制和代理重加密技术以达到云存储系统的灵活性、细粒度性、可扩展性、保密性、动态性的目的.最后分析方案的安全性和效率. Aimed at the problem of efficiency and safety in cloud storage access control,a MA-ABE-based control policy was presented and the MA-ABE algorithm and implementation process of cloud storage access control were given in detail.The MA-ABE and proxy re-encryption technique were used to achieve flexibility,fine-granularity,scalability,confidentiality,and fine dynamics.Finally,the safety and efficiency of this scheme was analyzed.
出处 《兰州理工大学学报》 CAS 北大核心 2013年第6期79-84,共6页 Journal of Lanzhou University of Technology
基金 国家自然科学基金(60972078 61072066)
关键词 属性加密 多授权中心 代理重加密 云存储 访问控制 attribute-based encryption multi-authority proxy re-encryption cloud storage access control
  • 相关文献

参考文献15

  • 1吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011,5(9):835-844. 被引量:34
  • 2YU S. Achieving secure, scalable, and fine-grained data accesscontrol in cloud computing [C]//Pmeeedings of IEEE INFO- COM. San Diego: IEEE Press, 2010: 534-542.
  • 3HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage [J]. Journal of Computer Research and Development, 2010,47 (S) : 259-265.
  • 4PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure at- tribute-based systems [C]//Proceedings of the ACM Confer- ence on Computer and Communications Security. New York: ACM Press, 2006: 99-112.
  • 5YU Shucheng,WANG Cong, REN Kui, et al. Attribute based data sharing with attribute revocation [C]//Proceedings of the 5th International Symposium on Information, Computer and Commtmications Security. Singapore: Springer-Verlag, 2010: 261- 270.
  • 6洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79
  • 7JEONGMIN D, YOUJIN S, NAMJE P. Attribute based proxy re-encryption for data confidentiality in cloud computing envi- ronments[C]//2011 First ACIS/JNU International Confer- ence on Computers, Systems and Industrial Engineering. Jeju Island: IEEE Press, 2011 : 248-251.
  • 8LIMing, YU Shucheng , ZHENG Yao, et al. Scalable and se- cure sharing of personal health records in cloud computing u- sing attribute-based encryption[J]. IEEE Transactions on Par- allel and Distributed Systems,2013,24(1) : 131-143.
  • 9NARAYAN S, GAGNE M, SAFAVI-NAINI 1L Privacy pre- serving EHR system using attribute-based Infrastructure [C]//Proceedings of the 2010 ACM Workshop on Cloud Com- puting Security Workshop. New York: ACM Press, 2010: 47- 52.
  • 10RUJ S, NAYAK A, STOJMENOVIC I. Dacc: distributed ac- cess control in clouds [C]//10th IEEE TrustCom. Ottawa: IEEE Press, 2011 : 91-98.

二级参考文献34

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199.
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229.
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334.
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286.
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265.
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112.
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270.

共引文献106

同被引文献12

  • 1Mell P, Grance T. 800-145 The NIST definition of cloud computingrS3. Gaithersburg, USA, National In- stitute of Standards and Technology, 2009.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption EC//The 24th annual international conference on the theory and applications of cryptographic techniques, 2005. Aarhus, Denmark, Springer, 2005 : 457-473.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryptionC// IEEE symposium on security and privacy (SP' 07), 2007. Oakland, USA: IEEE Computer Society, 2007 .- 321-334.
  • 4Waters B. Ciphertext-policy attribute-based encryption [C// An expressive, efficient, and provably secure realization: The 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany. Springer, 2011. 53-70.
  • 5Yang K, Jia Xiaohua, Ren K, et al. Dac-macs: effec- tive data access control for multi-authority cloud stor- age systems[C]// IEEE INFOCOM 2013. Turin. 2013 : 2895-2903.
  • 6Jung T, Li XiangymN, Wan Zhiguo,et ak Privacy preser- ving cloud data access with multi-authorities[C]// INFOCOM 2013. Turin, IEEE, 2013: 2625-2633.
  • 7Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems [J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2011, 22(7): 1214-1221.
  • 8Cheumg L, Newport C. Provably secure ciphertext policy ABE[C]// The 14th ACM conference on com- puter and communications security, 2007. New York ACM, 2007: 456-465.
  • 9Bobba R, Khurana H, Prabhakaran M. Attribute-sets.- a practically motivated enhancement to Attribute-Based encryptionECl//The 14th european symposium on re- search in computer security. France: Springer, 2009: 587-604.
  • 10Zhao J, Feng D, Zhang Z. Attribute-based conditional proxy re-eneryption with chosen-ciphertext security I-C]// Global telecommunications conference (GLO- BECOM 2010). Miami,FL: IEEE, 2010:1-6.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部