期刊文献+

虚拟分组撤销策略的云存储访问控制模型

Virtual Group Revocation Policy-based Cloud Storage Access Control Model
下载PDF
导出
摘要 为解决现有云存储访问控制模型用户权限撤销效率低、无法适应大规模用户的问题,在分析基于属性加密的密文策略的基础上提出了一个新的模型,给出了虚拟分组撤销策略,将用户映射到多个虚拟分组中,并重新构建了访问结构。用户权限撤销的范围被限制在一个虚拟分组内,对该虚拟组内的用户重新分发密钥即可实现用户权限撤销,而其它虚拟分组不需要任何变化,从而提高了用户权限撤销的效率。在Hadoop平台下进行了仿真实验,结果表明该模型具有较高的撤销效率。 To solve the problems that the existing cloud storage access control models have low efficiency of users' privilege revocation and are unable to adapt to a large number of users,this paper proposed a new model on the basis of analysis of cipher-text policy attribute-based encryption.Virtual group revocation policy was given,all users were mapped to multiple virtual groups,and the access structure was rebuilt.The range of users' privilege revocation was limited within a virtual group.By redistributing the users' private key in the certain virtual group where revocation takes place,users' privilege revocation can be achieved without any changes in the other virtual groups.Obviously,this approach greatly improves the efficiency of users' privilege revocation.A simulation experiment was conducted in Apache Hadoop platform,and the experiment results demonstrate that this model has higher efficiency on users' privilege revocation.
出处 《计算机科学》 CSCD 北大核心 2016年第5期122-126,共5页 Computer Science
基金 国家科技重大专项(2012ZX03002002) 国家自然科学基金(60776807 61179045) 天津市科技计划重点项目(09JCZDJC16800) 中国民航科技基金(MHRD201009 MHRD201205)资助
关键词 云存储 访问控制 虚拟分组 用户权限撤销 Cloud storage Access control Virtual group Users' privilege revocation
  • 相关文献

参考文献12

  • 1Wu J,Fu J,Lin Z,et al.A survey on cloud storage [J].Journal of Computers,2011,6(8):1764-1771.
  • 2Elavarasi P,Parijatham R.Key updation for the dynamic attri-butes in cloud computing for competent user retraction [J].International Journal of Engineering Science and Technology,2013,5(06s):2278-9510.
  • 3Sahai A,Waters B.Fuzzy identity-based encryption[C]∥The 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473.
  • 4Goyal B,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥The 13th ACM Conference on Computer and Communications Security.New York:ACM Press,2006:89-98.
  • 5Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[J].Journal of Network and Computer Applications,2010,33(2):76-83.
  • 6Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥The 14th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2011,6571:53-70.
  • 7Zhang R,Chen P.A Dynamic Cryptographic Access Control Sch-eme in Cloud Storage Services [C]∥2012 8th International Conference on Computing and Networking Technology.Washington D C:IEEE CS Press,2012:50-55.
  • 8Pervez Z,Khattak A M,Lee S,et al.SAPDS:self-healing attri-bute-based privacy aware data sharing in cloud[J].The Journal of Supercomputing,2012,62(1):431-460.
  • 9Yang K,Jia X,Ren K.Attribute-based Fine-Grained AccessControl with Efficient Revocation in Cloud Storage Systems[C]∥The 8th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2013:523-528.
  • 10Yu S,Wang S,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥The 5th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2010:261-270.

二级参考文献56

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部