期刊文献+

一种基于属性加密的细粒度云访问控制方案 被引量:4

A Fine-grained Attribute-based Encryption Cloud Access Control Scheme
下载PDF
导出
摘要 针对云计算环境下精细访问控制问题,提出一种基于属性加密的细粒度云访问控制(FGABE-CAC)方案,该方案设计新的多授权方系统模型,引入多权限树的思想和属性群加密的访问控制方法,允许数据拥有者按其自身需求定义不同的访问结构,制定精细的访问控制策略.通过多个授权方管理用户不同的属性域,并结合懒惰重加密和代理重加密技术,在用户权限撤销时实现高效的属性层面的撤销.最后给出方案的安全模型,并证明该方案在判定性双线性假设下是选择明文攻击安全的,具有前向安全性和后向安全性.仿真实验结果表明方案的正确性及高效性. To solve the problem of fine-grained access control in cloud computing,a fine-grained attribute-based encryption cloud access control (FGABE-CAC)scheme is proposed.The scheme has a new system model with Multi-authorities.The notion of privilege tree and attribute group encryption into access control was built,which allowed data owners to define different access structure and fine-grained access control policies.Different attribute-fields of user were owned by Multi-authorities.When users ’ privileges were revoked,efficient attribute level revocation was put forward by lazy re-encryption and proxy re-encryption technology .In addition ,the security model was proposed and the scheme was proven to be the chosen plaintext attack(CPA)secure under the condition of decisional bilinear Diffie-Hellman(DBDH)assumption and it has forward and backward security.The simulation results show the correctness and efficiency of scheme.
出处 《微电子学与计算机》 CSCD 北大核心 2015年第9期33-39,44,共8页 Microelectronics & Computer
基金 国家自然科学基金(61462069) 内蒙古自然科学基金项目(2012MS0912 2014MS0622) 内蒙古教育厅高校科研项目(Njzy12110)
关键词 多授权 访问控制 权限树 属性群 multi-authorities access control privilege tree attribute group
  • 相关文献

参考文献13

  • 1Mell P, Grance T. 800-145 The NIST definition of cloud computingrS3. Gaithersburg, USA, National In- stitute of Standards and Technology, 2009.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption EC//The 24th annual international conference on the theory and applications of cryptographic techniques, 2005. Aarhus, Denmark, Springer, 2005 : 457-473.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryptionC// IEEE symposium on security and privacy (SP' 07), 2007. Oakland, USA: IEEE Computer Society, 2007 .- 321-334.
  • 4Waters B. Ciphertext-policy attribute-based encryption [C// An expressive, efficient, and provably secure realization: The 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany. Springer, 2011. 53-70.
  • 5冯涛,安文斌,柳春岩,郝铮.基于MA-ABE的云存储访问控制策略[J].兰州理工大学学报,2013,39(6):79-84. 被引量:1
  • 6Yang K, Jia Xiaohua, Ren K, et al. Dac-macs: effec- tive data access control for multi-authority cloud stor- age systems[C]// IEEE INFOCOM 2013. Turin. 2013 : 2895-2903.
  • 7Jung T, Li XiangymN, Wan Zhiguo,et ak Privacy preser- ving cloud data access with multi-authorities[C]// INFOCOM 2013. Turin, IEEE, 2013: 2625-2633.
  • 8郭振洲,李明楚,孙伟峰,崔永瑞,范鑫鑫,赵辉.基于多认证中心和属性子集的属性加密方案[J].小型微型计算机系统,2011,32(12):2419-2423. 被引量:1
  • 9Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems [J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2011, 22(7): 1214-1221.
  • 10Cheumg L, Newport C. Provably secure ciphertext policy ABE[C]// The 14th ACM conference on com- puter and communications security, 2007. New York ACM, 2007: 456-465.

二级参考文献21

  • 1Sahai A, Waters B. Fuzzy identity-based encryption[ C]. In: Eurocrypt, LNCS 3494, Springer, 2005:457-473.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute- based encryption[ C]. In: IEEE Symposium on Secruity and Privacy,2007:321-334.
  • 3Goyal V, Jain A, Pandyey O, et al. Bounded ciphertext policy at- tribute based encryption [ A ]. In: ICALP ( 2 ). LNCS 5126 [ C ], Springer Berlin,2009:579-591.
  • 4Bobba R, Khurana H, Prabhakaran M. Attribute-sets: a practically motivated enhancement to attribute-based eneryption [ A ]. In: Computer Security-ESORICS 2009, LNCS 5789 [ C ]. Springer Berlin ,2009:587-564.
  • 5Chase M. Multi-authority attribute based enerypfion[ C]. In: Theory of Cryptography ,LNCS1392 ,Springer Berlin ,2007:515-535.
  • 6Boneh D, Franklin M. Identity-based cncryption from the weil pairing[ C]. Advances in Cryptology-Crypto,2001:213-229.
  • 7YU S. Achieving secure, scalable, and fine-grained data accesscontrol in cloud computing [C]//Pmeeedings of IEEE INFO- COM. San Diego: IEEE Press, 2010: 534-542.
  • 8HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage [J]. Journal of Computer Research and Development, 2010,47 (S) : 259-265.
  • 9PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure at- tribute-based systems [C]//Proceedings of the ACM Confer- ence on Computer and Communications Security. New York: ACM Press, 2006: 99-112.
  • 10YU Shucheng,WANG Cong, REN Kui, et al. Attribute based data sharing with attribute revocation [C]//Proceedings of the 5th International Symposium on Information, Computer and Commtmications Security. Singapore: Springer-Verlag, 2010: 261- 270.

同被引文献54

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部