期刊文献+

改进的基于DAA的隐私保护云资源消费系统

Improved Privacy Preserving Cloud Resource-payment System with Direct Anonymous Attestation
下载PDF
导出
摘要 当前,用户在享受低成本且便捷的云服务的同时,不得不面对个人隐私遭受损害的风险.为此,Pirker等人提出一个允许用户利用资源受限设备匿名消费云资源的系统.该系统的主要缺点是要求用户和云服务供应商执行大量的在线对运算,且并未提供完整的协议实现细节及形式化证明.对Brickell等人的DAA(直接匿名证明)方案进行扩展,并且结合Yang等人的改进的BBS+签名证明协议和Peng等人的小区间证明技术提出一个更为高效的改进系统.改进系统在新定义的安全模型下满足可证安全,且具有如下的显著特点,即无需用户执行在线对运算,利用硬件机制防止恶意用户共享匿名令牌,且适合于在智能手机平台上进行部署. At present, while users enjoy the low cost and convenient cloud services, they have to face the risk of personal privacy may suffer damage. To propose a solution to this dilemma, Pirker et al. proposed an anonymous cloud resource payment system for users ' constrained devices. Unfortunately, the main disadvantage of their system is that users and cloud service providers have to perform a number of expensive online pairing operations. In addition , they did not provide complete descriptive details and formal security proof. This paper proposed a more efficient revised system, which was constructed by extending the DAA ( direct anonymous attestation ) scheme by Brickell et al. and incorporating the improved protocol for proving knowledge of a BBS + signature by Yang etc. as well as the range proof with practical small ranges by Peng etc. The improved system is provable secure in a new defined security model, and it has several notable characteristics as follows,i, e. ,it does not require users' online pairing operations,it can prevent malicious users sharing their anonymous tokens, and it can be easily deployed on popular intelligent mobile phone platforms.
作者 柳欣
出处 《小型微型计算机系统》 CSCD 北大核心 2015年第12期2707-2713,共7页 Journal of Chinese Computer Systems
基金 山东省自然科学基金项目(ZR2015FL023)资助 山东省高等学校科技计划项目(J14LN61)资助 山东青年政治学院科研项目(2013QN13)资助 山东青年政治学院博士科研启动经费资助项目(14A007)资助 山东青年政治学院教学改革研究项目(201404)资助
关键词 云服务 云资源 隐私保护的 直接匿名证明 区间证明 cloud services cloud resources privacy preserving direct anonymous attestation range proof
  • 相关文献

参考文献2

二级参考文献56

  • 1鲁荣波,宣恒农,何大可.对一种高效群签名方案的安全性分析[J].通信学报,2007,28(4):9-12. 被引量:6
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Brodkin. Gartner: seven cloud-computing security risks[DB/OL]. http://www.networkworld.comlnews/2008/070208-cloud. html, 2008-07-02.
  • 4Cao Tian-jie , Zhang Yong-ping, Wang Chu-jiao. Security protocol [ M]. Beijing: Beijing University of Posts and Telecommunications Press, 2009.
  • 5Aaram Yun, Shi Chun-hui, Yongdae Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [ C]. In CCSW'09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009: 67- 75.
  • 6Carter J L, Wegman M N. Universal classes of hash functions (extended abstract) [ A]. STOC '77: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, New York, NY, USA [C]. ACMPress, 1977:106-112.
  • 7Wang Cong , Wang Qian , Ren Kui, et al. Ensuring data storage security in cloud computing [ C]. In IWQoS' 09: Proceedings of 17th International Workshop on Quality of Service, Charleston, SC, USA, 2009:1-9.
  • 8Adi Shamir. Identity-based cryptosystems and signature schemes [ C]. In Proceedings of CRYPTO'84 on Advances in Cryptology, Santa Barbara, California, USA, 1985 :47-53.
  • 9Horwitz J, Lynn B. Toward hierarchical identity-based encryption [C]. In Proceedings of EUROCRYPT 2002, LNCS, Springer, Heidelberg ,2002 ,2332 :466481.
  • 10Li H, Dai Y, Tian L,et al. Identity-based authentication for cloud computing[ C]. In CloudCom'09: Proceedings of the 1 st International Conference on Cloud Computing, Beijing, China, 2009: 157-166.

共引文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部