期刊文献+

一种高效多授权中心云访问控制方案 被引量:1

High Efficiency Multi-authority Cloud Access Control Scheme
下载PDF
导出
摘要 针对已有云计算多授权访问控制方案中用户端负担过重的问题,提出一种基于属性加密的多授权中心访问控制方案HE-MA-ACS。在层次化授权结构的基础上,引入外包解密思想,将用户访问的大部分解密计算开销外包至云服务端,实现细粒度的属性撤销,并且用户端不需要参与属性的撤销操作。对方案的正确性、安全性、计算和存储性能进行了分析,证明了该方案在用户端存储开销、访问通信开销、解密时间及属性撤销时计算开销上的优越性。该方案有效地降低了用户端的负担,提高了解密效率。 For solving the overhead problems of users in the multi-authority access control schemes, a HE-MA-ACS scheme was proposed. Outsourced decryption is introduced based on the hierarchical authorization structure, so large part of the decryption overhead is moved to the CSP. Furthermore,fine-grained attribute revocation is achieved and the users can not participate in the operation when their attributes are revoked. The correctness, security, calculated and storage performance were analyzed. Experimental results demonstrate the superiority of overhead in user storage, access communication, decryption and the computation costs when attribute is revoked as well. The scheme effectively reduces the burden on the user side and improves the efficiency of decryption.
出处 《计算机科学》 CSCD 北大核心 2016年第9期180-183,208,共5页 Computer Science
关键词 多授权中心 属性基加密 云计算 访问控制 外包解密 Multi-authority, ABE, Cloud computing, Access control, Outsourced decryption
  • 相关文献

参考文献18

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 2林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:320
  • 3洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79
  • 4Sahai A,Water B. Fuzzy identity-based encryption[C]//Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Vet- lag, 2005 : 457-473.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proc of ACM Conference on Computer and Communications Security. New York: ACM Press, 2006 : 89-98.
  • 6Bethencount J, Sahai A, Waters B. Ciphertext-policy attribute based encryption[C]//Proc of IEEE Symposium on Security and Privacy. IEEE Press, 2007 : 321-334.
  • 7温昱晖,陈广勇,赵劲涛,沈吉喆.基于CP-ABE在云计算中实现数据访问控制的方案[J].重庆邮电大学学报(自然科学版),2013,25(5):658-664. 被引量:11
  • 8Chase M. Multi-Authority attribute based encryption[C]//Proc of the 4th Theory of Cryptography Conf. Germany: Springer Berlin Heidelberg, 2007 : 515-534.
  • 9Ruj S, Nayak A, Stojmenovic I. DACC: Distributed access con- trol in clouds[C]//Proc of the 10th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications. Wa- shington, DC: IEEE Press,2011 : 91-98.
  • 10Liu Xue-jiao, Xia Ying-jie,Jiang Sha-sha, et al. Hierarchical at- tribute-based access control with authentication for outsourced data in cloud computing[C]//Proc of the 201a 12th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Commu- nications. Australia: IEEE Press, 2013 : 477-484.

二级参考文献186

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1430

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部