期刊文献+

一种面向云存储的高效动态密文访问控制方法的安全性分析与改进

SECURITY ANALYSIS OF EFFICIENT DYNAMIC CRYPTOGRAPHIC ACCESS CONTROL AND ITS IMPROVEMENT FOR CLOUD STORAGE
下载PDF
导出
摘要 为解决云计算环境下文件共享的安全问题,Hong等人[1]提出了一种基于CP-ABE(Ciphertext-policy attributed-based encrtption)密文策略的动态密文访问控制方法 HCRE,将访问控制结构转移到云端,实现高效的共享访问控制。针对该方案在用户访问权限撤销过程中存在严重的安全漏洞,通过给出实际的攻击案例不但指出该漏洞所在,而且分析其成因,并结合代理重加密提出一种新的改进方案。其在继承HCRE方案优点的同时,还弥补了安全漏洞,且在权限撤销阶段更具效率。 To solve security problem of file sharing in cloud computing environment,Hong et al.[1]proposed a CP-ABE ciphertext strategy-based dynamic cryptographic access control method,named HCRE,it transfers the access control structure to cloud side,and achieves efficient sharing access control. But in the process of revoking user's access privileges,HCRE has serious security vulnerability. In light of this,by giving the actual attack case we point out where the vulnerability is,and analyse the causes of it as well,furthermore we propose an improved scheme in combination with the proxy re-encryption. While inheriting the advantages of HCRE,it also makes up the security vulnerabilities,and is more efficient in the process of revoking privileges.
出处 《计算机应用与软件》 CSCD 2016年第5期325-329,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61272415 61272413 61133014) 广东省教育科研"十二五"规划2013年度研究项目(2013JK213) 广东省高等职业技术教学研究会重点课题(GDGZ14Y095)
关键词 密码学 云存储 动态密文访问控制 基于属性的密文策略 Cryptography Cloud storage Dynamic cryptographic access control Ciphertext-policy attribute-based encryption
  • 相关文献

参考文献12

  • 1洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79
  • 2Sahai A,Waters B.Fuzzy indentity-based encryption[C]//Proceedings of EUROCRYPT Berlin,2005.
  • 3Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for finegrained access control of encrypted data[C]//Proc.of the 13thACM Conference on Computer and Communications Security New York,USA,2006.
  • 4Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy Berkeley,USA,2007.
  • 5孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152. 被引量:64
  • 6Malek B,Miri A.Combining attribute-based and access systems[C]//Proceedings of 12thIEEE int’l Conf on Computational Science and Engineering Vancouver,Cannada,2009.
  • 7张浩军,范学辉.一种基于可信第三方的CP-ABE云存储访问控制[J].武汉大学学报(理学版),2013,59(2):153-158. 被引量:3
  • 8Luan I,Muhammad A,Milan P.An encryption scheme for a secure policy updating[C]//Proc.of International Conference on Security and Cryptography Athens,Greece,2010.
  • 9Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]//advances in Cryptology-Eurocrypt,1998:127-144.
  • 10Ostrovsky R,Sahai A,Waters B.Attribute-based encryption with nonmonotonic access structures[C]//Proc.of the 14th ACM Conference on Computer and Communications Security New York,USA,2007.

二级参考文献24

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展.2010.
  • 4Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM SIGACT News ,2009,40(2) :81-86.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryptionfor fine-grained access control of encrypted data[DB/OL]. [2012-01-09]. http://dl, acre. org/ci- ration, c fro? id= 1180418.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ DB/OL ]. [ 2012-02-11 ]. http://ieeexplore, ieee. org/xpls/abs_ all. jsp? at- number=4223236.
  • 7Fu K. Group Sharing and Random Access in Crypto- graphic Storage File Systems [D]. Massachusetts: MIT,1999.
  • 8Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[DB/OL]. [2012-02- 28]. http://www, springerlink, com/content/b730- 83628wvr1865.
  • 9WANG Q,WANG C,REN K.Enabling public auditability and datadynamics for storage security in cloud computing. IEEE Transac-tions on Parallel and Distributed Systems . 2011
  • 10GOYAL V,PANDEY O,SAHAI A,et al.Attribute based encryptionfor fine-grained access control of encrypted data. ACM conferenceon Computer and Communications Security . 2006

共引文献131

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部