期刊文献+

基于改进CP-ABE算法的移动云计算数据安全访问控制方法(英文) 被引量:8

A secure access control method for mobile cloud computing data based on improved CP-ABE algorithm
下载PDF
导出
摘要 为了提高云计算数据访问的安全性及高效性,采用改进的CP-ABE算法来实现移动云计算数据访问控制。该方案将文件按不同的访问权限进行分级管理,将每种访问权限定义为一个权限模型,接着对多个权限模型结构进行整合。这种方案对密文的处理采用分享式的模式,所有权限模型均可共享该密文,有效减少每个权限模型存储密文的时间成本。实验结果显示,提出的分享式密文方案在加密和解密过程中可以有效减少时间开销,具有较强的应用价值。 In order to improve the security and efficiency of cloud computing data access,the improved CP-ABE algorithm is adopted to control the mobile cloud computing data access.The scheme classifying files according to different access rights,defining each access right as a permissions model,and then integrating multiple permissions model structures.This scheme adopts the shared mode for the ciphertext processing,and all the ciphertext models share the ciphertext so as to effectively reduce the time cost of storing the ciphertext for each rights model. Experimental results show that the proposed shared ciphertext scheme could effectively reduce the time overhead in the encryption and decryption process,and it has significant application value.
作者 贾民政 朱云飞 Min-zheng JIA;Yun-fei ZHU(Department of Information Engineering,Beijing Polytechnic College,Beijing 100042,China;Beijing Language and Culture University,Beijing 100083,China)
出处 《机床与液压》 北大核心 2018年第24期108-113,共6页 Machine Tool & Hydraulics
基金 Quality Promotion Plan for Beijing Vocational College Teachers,Scientific Research Project of Beijing Polytechnic College(BGZYKY201823)~~
关键词 云计算 访问控制 CP-ABE 双线性对 密文 Cloud computing Access control CP-ABE Bilinear pairing Ciphertext
  • 相关文献

参考文献2

二级参考文献22

  • 1SHAMIR A. Identity-based Cryptosystems and Signature Schemes[EB/OL]. http://xueshu.baidu.com/s?wd=pape ruri%3A%28b3c4ef36 lf1358c0814a5f7e50d77db 1%29&fi lter=sc_long sign&tn=SE_xueshusource 2kduw22v&sc_ vurl=http%3A%2F%2Flink.springer.com%2F 10.1007%2F3-540- 39568-7_5&ie=utf-8, 2015-11-20.
  • 2SAHAI A, WATERS B. Fuzzy Identity Based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer-Verlag, 2005: 457-473.
  • 3GOYAL V, PANDEY O, SAHAI A, et al. Attribute Based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. 13th ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, VA, USA. New York: ACM, 2006: 89-98.
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Oakland, Califormia, USA. New |ersey: IEEE, 2007: 321-334.
  • 5DAMIANI E, VIMEI~CATI S D C D, FORESTI S, et al. Selective Data Encryption in Outsourced Dynamic Environments[J]. Electronic Notes in Theoretical Computer Science, 2007, 168(1): 127-142.
  • 6HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Computer Research and Development, 2010, 47(zl): 259-265.
  • 7冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1063
  • 8石强,赵鹏远.云存储安全关键技术分析[J].河北省科学院学报,2011,28(3):66-69. 被引量:15
  • 9王淑娥,林柏钢,杨旸,李应.用于PHR云存储的属性密文访问控制方案[J].信息网络安全,2014(5):15-20. 被引量:3
  • 10李琦,马建峰,熊金波,刘西蒙,马骏.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702. 被引量:13

共引文献35

同被引文献79

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部