期刊文献+

基于策略隐藏属性加密的云访问控制方案 被引量:11

An Access Control Scheme in Cloud Storage with Policy Hiding ABE
原文传递
导出
摘要 基于策略隐藏属性基加密(ABE,attribute based encryption)算法,提出了一种适用于云环境的访问控制方案PHACS(policy hiding access control scheme).该方案在基于属性访问控制的基础上,借鉴单向匿名密钥协商的思想,既能够进行细粒度的访问控制,又有效地避免了由于访问控制策略泄漏造成的隐私问题.另外,PHACS中策略表达支持任意门限或布尔表达式,解密操作能够在计算能力受限的设备上实施.本文对方案的安全性进行了证明,并通过理论与实验分析表明PHACS能很好地适应云存储中数据共享的访问控制. In this paper, we propose an access control scheme for cloud storage by constructing a policies-hidden attribute-based encryption scheme. This scheme can not only protect the privacy of shared data, but also prevent the disclosure of access policy. Meanwhile, the access policy can be expressed with any arbitrary access formula, and the decryption operations can be implemented in devices with limited computing power. The theoretical analysis and exper- imental results show that we find our scheme is well suitable for access control in the cloud storage.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2016年第3期242-248,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(61272451 61173154)资助项目
关键词 访问控制 属性基加密 策略隐藏 access control attribute-based encryption policy hiding
  • 相关文献

参考文献11

  • 1GOH E J, SHACHAM H, MODADUGU N, etal. SiRiUS: Securing remote untrusted storage[DB/OL]. [2014-06-12]. http://www, isoc. org/isoc/confer- ences/ndss/03/ proceedings/ papers/9, pd f .
  • 2SAHAI A, WATERS B. Fuzzy identity-based encryp- tion [ C ]//Advances in Cryptology-EUROCRYPT 2005. Berlin Heidelberg:Springer-Verlag, 2005: 457- 473.
  • 3LI M, YU S, ZHENG Y, et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption [J]. Parallel and Distributed Systems, IEEE Transactions on, 2013, 24 (1) : 131-143.
  • 4WU Y, WEI Z, DENG H. Attribute-based access to sealable media in cloud-assisted content sharing[J]. IEEE Transactions on Multimedia, 2013, 15 (4) : 778- 788.
  • 5JAH1D S, MITTAL P, BORISOV N. EASIER: En- cryption-based access control in social networks with efficient revoeation[C]/ / Proceedings of the 6th ACM Symposium on Information, Computer and Communi- cations Security. New York.. ACM, 2011: 411-415.
  • 6BETHENCOURT J, SAHAI A, WATERS B. Ci- phertext-policy attribute-based encryption[C]//Secur- ity and Privacy, 2007. SP' 07. IEEE Symposium on. Piscataway, N J:IEEE, 2007: 321-334.
  • 7NISHIDE T, YONEYAMA K, OHTA K. Attribute- based encryption with partially hidden eneryptor-specified access structures[C ]// Applied Cryptography and Net- za)rk Security. Berlin Heidelberg.. Springer-Verlag, 2008: 111- 129.
  • 8LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional eneryption: Attribute-based encryp- tion and (hierarchical) inner product encryption[DB/ OL]. [2014-03-09]. http: //link. springer, com/chap- 007/978-3-642-13190-5_4 # page- 1.
  • 9HUR J. Attribute-based secure data sharing with hid- den policies in smart grid[J]. Parallel and Distributed Systems, IEEE Transactions on, 2013, 24(11) : 2171- 2180.
  • 10LI J, CHEN X, LI J, et al. Fine-grained access con- trol system based on outsourced attribute-based en- cryption [ C]//Computer Security-ESORICS 2013. Berlin Heidelberg : Springer-Verlag, 2013 : 592-609.

同被引文献35

引证文献11

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部