期刊文献+

无线体域网中基于属性加密的数据访问控制方案 被引量:12

Attribute-based encryption access control scheme in wireless body area networks
下载PDF
导出
摘要 作为一种新的电子医疗技术,无线体域网(wireless body area networks,WBANs)将在病情监测中发挥重要作用,安全性及隐私性保护是无线体域网的重要内容。针对WBANs数据访问控制提出一种细粒度的数据访问方法,该方法采用基于属性的数据加密方法,加密者将数据访问结构作为访问策略,当解密者所具有的属性满足该结构时,即可访问该数据,否则,拒绝用户访问。分别从正确性、安全性及能量消耗三方面对方案进行分析。仿真实验结果表明,本方案相对其他方案能量消耗较小。 WBANs have emerged as a new technology for e-healthcare and will play an important role in the patient-healthy monitoring. Security and privacy protection is a major concern. This paper proposed a fine-grained data access control method, which implied the attribute-based encryption. The encryptor set the access structure as access policy, and the user decrypted the ciphertext with attributes. If the attributes satisfied the structure, the user could get the medical data, otherwise, the user could not. This paper analyzed the scheme in correctness, security and energy consumption. The simulation experiment results show that the scheme is efficient in energy consumption to others.
出处 《计算机应用研究》 CSCD 北大核心 2015年第7期2163-2167,共5页 Application Research of Computers
基金 山西省留学基金资助项目(2009-28) 山西省自然科学基金资助项目(2009011022-2)
关键词 无线体域网 安全与隐私 数据访问控制 基于属性的加密 访问控制结构 wireless body area networks(WBANs) security and privacy data access control attribute-based encryption(ABE) access control structure
  • 相关文献

参考文献14

  • 1Kossinets G. Effects of tnissing data in social networks [ J ]. Social Networks, 2006,28 ( 3 ) :247 - 268.
  • 2Freeman L C. Graphic techniques for exploring social network data [ D ]. Irvine : University of California,2001.
  • 3Wondracek G, I-Iolz T, Kirda E, eta/. A practical attack to de-anony- mize social network users[ C]//Proc of IEEE Symposium on Security and Privacy.[S. 1. ] :IEEE Press,2010:223-238.
  • 4Fogel J, Nehmad E. lnternet social network communities: risk taking, trust, and privacy concerns [ J]. Computers in Human Behavior, 2011,25( 1 ) :153-160.
  • 5Narayanan A, Shmatikov V. De-anonymizing social networks [ C ]// Proc of the 30th IEEE Symposium on Security and Privacy. [ S. 1. ] : IEEE Press,2009 : 173-187.
  • 6李栋,徐志明,李生,刘挺,王秀文.在线社会网络中信息扩散[J].计算机学报,2014,37(1):189-206. 被引量:63
  • 7Sweeney L. Achieving k-anonymity privacy protection using generaliza- tion and suppression [ J ]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012,10 ( 5 ) : 571- 588.
  • 8Li Na, Das S K. Applications of k-anonymity and/-diversity in pub- lishing online social networks [ M ]//Security and Privacy in Social Networks. New York : Springer,2013 : 153-179.
  • 9Bayardo R J, Agrawal R. Data privacy through optimal k-anonymiza- tion [ C ]//Proc of the 21st International Conference on Data Enginee- ring. IS. 1. ] :IEEE Press,2005:217-228.
  • 10丁悦,张阳,王勇,李伟卫.基于能量函数和模块最优化的不确定图聚类[J].计算机应用研究,2012,29(8):3173-3175. 被引量:2

二级参考文献124

  • 1GOETHALS R G, SNOECK M, LEMAHIEU W, et al. Considering (de) Centralization in a Web Services World[C]//Proceedings of Second International Con- ference on Internet and Web Applications and Serv- ices, Mauritius, 2007:22.
  • 2JORDAN C. Sur les Assemblages de Lignes [J]. Journal fur Die Reine und Angewandte Mathematik, 1869(70):185-190.
  • 3WASSERMAN S, FAUST K. Social Network Anal- ysis [M] Cambridge: Cambridge University Press, 1994.
  • 4TUTZAUER F, ELBIRT B. Entropy-based Centrali zation and Its Sampling Distribution in Directed Corn munication Networks [J].Communication Mono graphs, 2009, 76(3): 351-375.
  • 5CRUCITTI P, LATORA V, PORTA S. Centrality Measures in Spatial Networks of Urban Streets [J]. Physical Review E, 2006, 73(3): 1-5.
  • 6YANG C C, SAGEMAN M. Analysis of Terrorist Social Networks with Fractal Views [J}. Journal of Information Science, 2009, 35(3): 299-320.
  • 7GOLDSZMIDT G, YEMINI Y. Distributed Man- agement by Delegation [C]//Proceedings of 15th IEEE International Conference on Distributed Corn-puting Systems, Vancouver, 1995:333-340.
  • 8CRASWELL N, HAWKING D, THISTLEWAITE P. Merging Results from Isolated Search Engines [C]//Proceedings of the Tenth Australasian Data- base Conference, Auckland, 1999.. 189-200.
  • 9KNORR E, NG R, TUCAKOV V. Distance-based Outliers: Algorithms and Applications [J]. VLDB Journal, 2000, 8(3/4): 237-253.
  • 10O'CONNOR B, BALASUBRAMANYAN R, ROU- TLEDGE B, et al. From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series[J].// Proceedings of the 4th International AAAI Confer- enee on Weblogs and Social Media, Washington, 2010:122-129.

共引文献144

同被引文献79

引证文献12

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部