期刊文献+

基于属性加密的组合文档安全自毁方案 被引量:22

A Secure Self-Destruction Scheme for Composite Documents with Attribute Based Encryption
下载PDF
导出
摘要 为保护组合文档全生命周期的隐私安全,提出了一种基于属性加密的组合文档安全自毁方案.该方案引入多级安全思想创建新的组合文档结构,采用访问密钥加密组合文档内容、基于属性的加密算法加密访问密钥,两者的密文经过一系列算法提取和变换后获得密文分量和封装自毁对象,分别存储在两个分布式哈希表网络和云服务器中.当组合文档过期后,该网络节点将自动丢弃所存密文分量,使得原始组合文档密文和访问密钥不可恢复,从而实现安全自毁.安全分析表明,该方案既能抵抗传统的密码分析或蛮力攻击,又能抵抗分布式哈希表网络的Sybil攻击. In order to protect the confidentiality and privacy security of the composite documents within the whole life cycle , we leverage attribute-based encryption (ABE ) algorithm to propose a secure self-destruction scheme for composite documents ,re-ferred to as SelfDoc .We firstly set up a new composite document structure by employing the idea of multilevel security ,and then , use an access key to encrypt the composite document and the ABE algorithm to encrypt the access key .After a series of algorithms for extracting and transforming from the two ciphertexts ,we obtain ciphertext shares and encapsulated self-destruction object ,both of which are stored into two distributed hash table (DHT ) networks and cloud servers respectively .Nodes in the DHT networks will self-discard the ciphertext shares periodically ,so the original ciphertext and access key are unrecoverable after the expiration time , and the function of secure self-destruction is achieved .Compared with existing schemes ,the security analyses indicate that SelfDoc scheme is able to resist the traditional cryptoanalysis or brute-force attack ,and the Sybil attacks from the DHT networks .
出处 《电子学报》 EI CAS CSCD 北大核心 2014年第2期366-376,共11页 Acta Electronica Sinica
基金 长江学者和创新团队发展计划(No.IRT1078) 国家自然基金委员会-广东联合基金重点基金(No.U1135002) 国家自然科学基金(No.61370078 No.61170251) 国家科技重大专项(No.2011ZX03005-002) 国家863高技术研究发展计划(No.2012AA013102)
关键词 组合文档 隐私安全 基于属性的加密 安全自毁 分布式哈希表网络 composite document privacy security attribute-based encryption secure self-destruction DHT network
  • 相关文献

参考文献25

  • 1BALINSKY H, SIMSKE S J. Secure document engineering [ A]. Proceedings of the 11th ACM symposium on Document Engineering[ C] .New York: ACM,2011.269 - 272.
  • 2BALINSKY H, SIMSKE S J. Differential access for publicly- posted composite documents with multiple workflow partici- pants[ A ] .Proceedings of the 10th ACM Symposium on Docu- ment Engineering[ C] .New York:ACM,2010.115- 124.
  • 3BALINSKY H, CHEN L Q, SIMSKE S J. Publicly posted com- posite documents with identity based encryption[ A]. Proceed- ings of the llth ACM Symposium on Document Engineering [C] .New York: ACM,.2011.239 - 248.
  • 4李凤华,苏铓,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. 被引量:126
  • 5XIONG J B,YAO Z Q,MA J F,et al.A secure document self- deslxuction scheme with identity based encryption[ A]. Proceed- ings of the 5th International Conference on Intelligent Network- ing and CoUaborative Systems, IEEE /NCoS ' 13 [ C ]. Los Alamitos, CA: IEEE CS,2013.239 - 243.
  • 6GEAMBASU R, KOHNO T,LEVY A,et al. Vanish:Increasing data privacy with self-destructing data[ A]. Proceedings of the 18th USENIX Security Symposium [ C]. Berkeley, CA: USENIX, 2009.299 - 315.
  • 7SAMSON T. Deleted Cloud Files Can be Recovered from Smartphones, Researchers Find [ EB/OL ]. http://www, in- foworld, com/t/mobile- security/delelzd-cloud- files-can-be-re- covered- smartphones- researchers- find- 214779,2013 - 04.
  • 8PERLMAN R. File system design with assured delete[A]. Pro- ceedings of the Third IEEE International Security in Storage Workshop[ C]. Los Alamitos, CA: 1F.F,E CS, 2005.83 - 88.
  • 9PERLMAN R. The ephemerizer: making data disappear [ J ]. Journal of Information Systems Security, 2005,1 ( 1 ) :21 - 32.
  • 10TANG Y, LEE P P, LUI J C, et al. FADE: Secure overlay cloud storage with file assured deletion[ A]. Proceedings of the Security and Privacy in Communication Networks[ C]. Berlin: Springer, 2010.380 - 397.

二级参考文献49

共引文献190

同被引文献154

引证文献22

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部