期刊文献+

基于CP-ABE的云存储数据访问控制方案 被引量:7

Data Access Control Scheme Based on CP-ABE in Cloud Storage
下载PDF
导出
摘要 结合云存储的应用环境,构造了一种基于密文策略属性的加密(ciphertext policy attribute based encryption,CP-ABE)技术和收敛加密技术的混合加密数据访问控制方案.该方案包括密钥发布中心、用户和云服务器三方实体,能高效、灵活、细粒度地进行数据的访问控制,可提高云存储服务器的空间利用率,并使用签名技术支持数据源认证和数据完整性认证.理论分析与实验验证了该方案具有较高的实际应用价值. A hybrid encryption and data access control scheme based on CP-ABE with convergent encryption technology was constructed by combining the application environment of cloud storage. Three entities are included in the proposed scheme which are key distribution center,customers and cloud server.It was indicted that the proposed scheme is efficient,flexible,fine-grained which can also improve the space utilization of the storage server.The data origin authentication and the data integrity certification were supported by using signature authentication technology. Theoretical analysis and experimental test showed that the proposed scheme has highly practical value.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第10期1416-1421,共6页 Journal of Northeastern University(Natural Science)
基金 国家科技重大专项基金资助项目(2013ZX03002006) 辽宁省科技攻关项目(2013217004) 中央高校基本科研业务费专项资金资助项目(N130317002)
关键词 云存储 基于密文策略的属性加密 访问控制 收敛加密 数字签名 cloud storage ciphertext policy attribute based encryption (CP-ABE ) access control convergent encryption digital signature
  • 相关文献

参考文献8

  • 1Cachin C, Keidar I, Shraer A. Trusting the cloud [ J ]. ACM SIGACT News,2009,40( 2 ) :81 -86.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption [ M ]. Heidelberg : Springer, 2005:457 - 473.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]// The 13th ACM Conference on Computer and Communications Security. New York: ACM,2006 : 89 - 98.
  • 4Bethencourt J Sahai A Waters B. Ciphertext-policy attribute- based encryption [ C]//IEEE Symposium on Security and Privacy. Piscataway IEEE,2007:321 - 334.
  • 5王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816. 被引量:45
  • 6Hohenberger S, Waters B. Attribute-based encryption with fast decryption [ M]. Berlin : Springer,2013 : 162 - 179.
  • 7Douceur J R, Adya A, Bolosky W J, et ai. Reclaiming space from duplicate files in a serverless distributed file system [ C]// The 22nd International Conference on Distributed Computing Systems. Piscataway : IEEE,2002:617 - 624.
  • 8Shamir A. How to share a secret[ J]. Communications of the ACM, 1979,24 ( 11 ) :612 - 613.

二级参考文献21

  • 1Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology--EUROCRYPT 2005. Berlin: Springer-Verlag, 2005.457-473. [doi: 10.1007/11426639_27].
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 3Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi: 10.1145/1315245.1315270].
  • 4Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography--Pairing 2009. Berlin: Springer-Verlag, 2009.248-265. [doi: 10.1007/978-3-642-03298-1_16].
  • 5Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding. Berlin: Springer-Verlag, 2009. 278-300. [doi: 10.1007/978-3-642-10868-6_17].
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-Poliey attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?amumber=4223236 [doi: 10.1109/SP.2007.11].
  • 7Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, Catalano N, eds. Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3- 642-19379-8_4].
  • 8Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute based encryption schemes. Journal of Software, 2011,22(6): 1299-1315 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993].
  • 9Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, cd. Advances in Cryptology--ASIACRYPT 2005. Berlin: Springer-Verlag, 2005. 495-514. Idol: 10.1007/11593447_27].
  • 10Boldyreva A, Goyal V, Kumar V. Identity-Based encryption with efficient revocation. In: Proc. of the 15th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2008. 417-426. [doi: 10.1145/1455770.1455823].

共引文献44

同被引文献49

引证文献7

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部