期刊文献+

一种属性可撤销的安全云存储模型 被引量:2

Secure Model of Cloud Storage Supporting Attribute Revocation
下载PDF
导出
摘要 针对云存储服务中数据用户权限撤销粒度较粗及现有方案密钥分发计算量大等问题,基于双系统加密的思想,在合数阶双线性群上提出了一种新的细粒度权限撤销的安全云存储模型。数据拥有者同时也作为属性分发机构,保证了对自身数据的绝对控制,确保了在云服务商不可信情况下开放环境中的云端存储数据的安全。从模型架构和属性密钥分发两个方面对模型进行了研究,并用严格的数学方法证明了本方案是适应性安全的。云存储模型的数据访问策略根据实际需要可灵活设置,适用于云存储等开放式环境。 To solve the problem of coarse-grained attribute revocation for data users and huge computation for key distribution in the existing cloud storage model,we proposed a new secure model of cloud storage supporting fine-grained attribute revocation over the composite order bilinear groups.Data owner is also the attribute distributing authority,assuring the absolute control of the data in the cloud,which ensures that the data stored in open environment is secure on condition that the cloud service provider is unbelievable.We studied the model in two aspects,the frame of the model and the key distribution.The strict mathematical proofs of the model show that the scheme is adaptively secure.Based on the model,data access strategy is flexible and diverse,therefore it is suitable for open environment like cloud storage.
出处 《计算机科学》 CSCD 北大核心 2015年第7期210-215,共6页 Computer Science
基金 国家自然科学基金项目(61272486 61103231) 国家自然基金青年基金(61202489) 陕西省自然科学基础研究计划面上计划(2011JM8012)资助
关键词 属性加密 双系统加密 云存储 属性撤销 适应性安全 Attribute-based encryption Dual-system encryption Cloud storage Attribute revocation Adaptive security
  • 相关文献

参考文献15

  • 1傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145. 被引量:175
  • 2Sahai A, Waters B. Fuzzy identity-based encryption[C]//Cra- mer R, ed. Advances in Cryptology-EUROCRYTP 2005: 24thAnnual International Conference on the Tehroy and Applica- tions of Cryptographic Techniques. Springer Berlin Heidelberg, 2005:457-473.
  • 3苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:98
  • 4Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Procee- dings of the 13th ACM Conference on Computer and Communi- cations Security. Alexandria, Virginia, USA, 2006 : 89-98.
  • 5Lin Huang,Cao Zhen-fu, Liang Xiao-hui, et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central AuthorityFJ]. Information Sciences, 2010,180(13) : 2618-2632.
  • 6Chase M. Multi-authority attribute based encryption [ C]//Theo- ry of Cryptography:Proceedings of 4th Theory of Cryptography Conference. Springer Berlin Heidelberg, 2007:516-534.
  • 7Maller S,Katzenbeisser S,Eckert C. Distributed attributed-based encryption[M] // Information Security and Cryptology(ICISC 2008). Springer Berlin Heidelberg, 2009 : 20-36.
  • 8Lewko A, Okamoto T, Sahai A, et al. Fully Secure Functional Eneryption:Attribute-Based Encryption and (Hierarchical) In- ner Product Encryption[C]//Advances in Cryptology- EURO- CRYPT 2010:Proceedings of 29th Annual International Confe- rence on the Theory and Applications of Cryptographic Tech- niques. Springer, 2010 : 62- 91.
  • 9Waters B. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions[C]//Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag, 2009 : 619-636.
  • 10王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816. 被引量:45

二级参考文献92

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献303

同被引文献6

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部