期刊文献+

保护隐私的轻量级云数据共享方案 被引量:4

Privacy-preserving lightweight data sharing scheme based on cloud
下载PDF
导出
摘要 针对基于隐私保护的云数据共享系统中用户需要持有大量密钥、密钥管理困难的问题,提出了一种轻量级的云数据共享方案。在介绍基于公有云的数据共享系统架构的基础上,描述了基于广播加密、可搜索加密等密码学技术构建的数据共享方案,并讨论了数据共享系统的工作流程。与传统的云数据共享系统相比,所提出的方案无须可信的私有云,可以降低客户的投资,而且用户无须随身携带所有密钥,增加了系统的灵活性。 Aiming at resolving the problem that massive keys existing in the user side in most of privacy-preserving data sharing systems based on the cloud storage, this paper proposed a lightweight data sharing scheme. It introduced the data sharing system architecture based on public cloud, described the data sharing scheme in details and further discussed the work flows in the real data sharing system built by the proposed scheme. Compared with traditional data sharing systems, this scheme doesn' t need trusted private cloud and thus reduces the investment of customer, and it doesn' t require the user to carry his keys at any time and thus increase the flexibility of the system.
出处 《计算机应用研究》 CSCD 北大核心 2015年第8期2410-2414,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61300241) 广东-国家自然科学基金重点项目(U1135002) 天津市自然科学基金资助项目(13JCQNJC00300) 国家教育部新青年博士点基金资助项目(20120031120036)
关键词 数据共享 云存储 可搜索加密 广播加密 data sharing cloud storage searchable encryption broadcast encryption
  • 相关文献

参考文献17

  • 1Kallaballa M, Riedel E, Swaminathan R, et al. Plutus: scalable secure file sharing on untrusted storage [ C]//Proc of the 2nd USENIX Con- ferenee on File and Storage Technologies. 2003:29-42.
  • 2Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[ C ]//Proc of the 12th International Conference on Practice and Theory in Public Key Cryptogrphy. Berlin : Springer,2005:357-376.
  • 3Li Jin, Chen Xiaofeng, Li Jingwei, et al. Fine-grained access control based on outsoureed attribute-based eneryption[ C]//Proc of the 18th European Symposium on Research in Computer Security, Berlin: Springer-Verlag, 2013 : 592 - 609.
  • 4Yu Shueheng, Wang Cang, Ren Kui,et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[ C]//Proe of IEEE INFOCOM. 2010:534-542.
  • 5Li Jin, Chen Xiaofeng, Huang Qiong,et al. Digital provenance enabling secure data forensics in cloud computing[ J], IEEE Trans on Paral- lel and Distributed Systems,2013,37(2):259-266.
  • 6Liu Xuefeng, Zhang Yuqing, Wang Boyang, et al. Mona:secure multi- owner data sharing for dynamic groups in the cloud [J]. IEEE Trans on Parallel and Distributed Systems,2013,24 (6) : 1182-1191.
  • 7Chu C, Chow S ,Tseng W. Key-aggregate cryptosystem for scalable data sharing in cloud storage[ J ]. I EEE Trans on Parallel and Distribu- ted Systems,2014,25(2) :468-477.
  • 8Song X D, Wagner D, Perrig A. Practical techniques for searches on encrypted data [ C ]//Proc of IEEE Symposium on Security and Priva- cy. IS. 1. ] :IEEE Press,2000:44-55.
  • 9Goh E. Secure indexes,Technical Report 2003/216[ R]. [ S. 1. ] :IA- CR,2003.
  • 10Chang Yancheng, Mitzenmacher M. Privacy preserving keyword sear- ehes on remote encrypted data [ C]//Proc of the 3rd International Conference on Applied Cryptography and Network Security. Berlin: Springer,2005:442-455.

同被引文献36

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部