期刊文献+

云存储中隐私保护的线性同态加密方案 被引量:2

Linear Homomorphic Encryption Scheme for Privacy Protection of Cloud storage
下载PDF
导出
摘要 云存储数据具有访问方便、可靠性高及可测量等优势,然而也存在一些安全风险,如敏感数据泄露、未授权访问及数据完整性等。针对敏感数据泄露问题,本文提出了一基于整多项式环上差错学习(R-LWE)问题的有效线性同态加密方案(LHES),该方案可对要上传云端的数据进行加密并以密文形式分布式存储,其安全性是基于R-LWE问题的困难性。分析表明,该方案在效率上较基于LWE的加法同态加密方案有很大改进,并且在标准模型下是选择明文攻击安全的。最后,给出了本文方案在云存储隐私保护中的应用架构。 Cloud storage possesses enormous advantages:ubiquitous access,high reliability and scalability and so on.But,unfortunately,also several security risks such as sensitive data disclosure,unauthorized access and data integrity etc are still existing.Aiming at the problem of sensitive data disclosure,an efficient linear homomorphic encryption scheme from R-LWE is proposed in this paper.In this scheme,the data is encrypted first and then stored in cloud in a distributed manner,and its security is based on the difficulty of R-LWE problem.The analyses indicate that the efficiency of the proposed scheme is much more efficient than the additive homomorphic encryption scheme from LWE,and it is secure under chosen plaintext attacks (CPA) in standard model.Finally,the architecture of privacy protection of cloud storage based on the proposed scheme is introduced in this paper.
出处 《信号处理》 CSCD 北大核心 2013年第11期1463-1469,共7页 Journal of Signal Processing
基金 国家自然科学基金(61171072) 广东省高等学校科技创新重点项目(CXZD1143) 深圳市科技计划资助项目(ZDSY20120612094312435 CXB201104210002A)
关键词 同态加密 云存储 环上差错学习问题 隐私保护 Homomorphic encryption cloud storage learning with errors over rings privacy protection
  • 相关文献

参考文献17

  • 1刘鹏.云计算发展现状[0L].http://www.china-cloud.cn/show.aspx?id=754&cid=11,2012-2-16.
  • 2Zeng W, Zhao Y, Ou K, Son W. Research on Cloud Stor- age Architecture and Key Technologies [ C ]. AICIT.Proceedings of the 2nd International Conference on Inter- action Sciences: Information Technology, Culture and Human. New York: ACM, 2009: 1044-1048.
  • 3刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456. 被引量:25
  • 4朱炜玲,喻建平.物联网移动RFID系统匿名访问控制认证密钥交换协议[J].信号处理,2012,28(11):1595-1601. 被引量:5
  • 5侯清铧,武永卫,郑纬民,杨广文.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7):1146-1154. 被引量:40
  • 6Tebaa M, Hajji S, Ghazi A. Homomorphic Encryption Ap- plied to the Cloud Computing Security [ C ]. Proceedings of the World Congress on Engineering (WCE 2012 ). 2012 : 536-539.
  • 7Ajtai M, Dwork C. A Public-key Cryptosystem with Worst- case/Average-case Equivalence [ C ]. SIGACT. Proceed- ings of 29th ACM Symposium on Theory of Computing ( STOC 1997). New York : ACM, 1997 : 284-293.
  • 8Regev O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [ C ]. ACM. Proceed- ings of 37th ACM Symp. on Theory of Computing (STOC). New York: ACM, 2005: 84-93.
  • 9Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for Hard Lattices and New Cryptographic Constructions [ C ]. SIGACT. Proceedings of 40th ACM Symp. on Theory of Computing (STOC). New York: ACM, 2008: 197-206.
  • 10Cash D, Hofheinz D, Kiltz E, Peikert C. Bonsai Trees, or How to Delegate a Lattice Basis [ C ]. Henri Gilbert. Proceedings of 29th International Conference on the Theo- ry and Applications of Cryptographic Techniques ( EURO- CRYPT). Berlin : Springer, 2010 : 523-552.

二级参考文献41

  • 1Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43.
  • 2Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html.
  • 3Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html.
  • 4Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177.
  • 5Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 6Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192.
  • 7Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192.
  • 8Lie David, Thekkath Chandramohan, Mitchell Mark, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Syslems. New York: ACM, 2000:168-177.
  • 9Dwoskin Jeffrey S, Lee Ruby B. Hardware rooted trust for secure key management and transient trust [C] //Proe of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:389-400.
  • 10Lee Ruby B, Kwan Peter C S, McGregor John P, et al. Architecture for protecting critical secrets in microprocessors [C] //Proc of the 32nd Int Syrup on Computer Architecture. Washington: IEEE, 2005:2-13.

共引文献65

同被引文献29

  • 1Sahai A, Waters B. Fuzzy Identity-Based Encryption[ C]// Proceedings of Cramer R (ed.) EUROCRYPT 2005, LNCS 3494, 2005:457-473.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-Based En- cryption for Fine-Grained Access Control of Encrypted Data[ C] ///Proceedings of ACM Conference on Computer and Communications Security, 2006:89-98.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-Policy At- tribute Based Encryption[ C ]//Proceedings of IEEE Sym- posium on Security and Privacy, 2007:321-334.
  • 4Waters B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realiza- tion [ C ] // Proceedings of Public Key Cryptography-PKC, 2011:53-70.
  • 5Hur J. Improving Security and Efficiency in Attribute- Based Data Sharing [ J ]. IEEE Transactions on Knowl- edge and Data Engineering, 2013, 25(10) : 2271-2282.
  • 6Xie X, Ma H, Li J, et al. An Efficient Ciphertext-Policy Attribute-Based Access Control Towards Revocation in Cloud Computing[J]. Journal of Universal Computer Sci- ence, 2013, 19(16): 2349-2367.
  • 7Deng H, Wu Q, Qin B, et al. Ciphertext-Policy Hierar- chical Attribute-Based Encryption with Short Ciphertexts [ J ]. Information Sciences, 2014, 275 : 370-384.
  • 8Balu A, Kuppusamy K. An Expressive and Provably Se-cure Ciphertext-Policy Attribute-Based Encryption [J]. Information Sciences, 2014, 276 : 354-362.
  • 9Zhou Z, Huang D, Wang Z. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broad- cast Enc~ption [ J]. IEEE Transactions on Computers, 2015, 64( 1 ) : 126-138.
  • 10Emura K, Miyaji A, Nomura A, et al. A Ciphertext-Poli- cy Attribute-Based Encryption Scheme with Constant Ci- phertext Length [ C ]//Proceedings of ISPEC, 2009, 5451 : 13-23.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部