期刊文献+

云存储中基于联合属性的密文策略加密方案 被引量:4

Cipher-policy encryption scheme based on union attributes in cloud environment
下载PDF
导出
摘要 为解决云存储环境下基于属性的密文策略变更问题,提出基于联合属性的密文策略加密方案。通过结合简单的基于属性的密文策略方案,引入联合属性,转换普通访问结构树,实现云存储环境下访问策略的动态变更。理论分析结果表明,该方案可有效减少策略属性变更时数据属主的计算开销,随着策略属性的不断增加,有效减少了整体计算开销,具有较高安全性、可靠性和实用性。 For the problem of the ciphertext policy change in cloud storage environment, a cryptographic access control solution based on attribute-based encryption (ABE) was proposed. The eiphertext policy based on attribute-based encryption (CP-ABE) was combined, the union attributes were introduced, the common access structure tree was converted, and the dynamic change of access policy was realized in cloud storage environment. Theoretical analysis shows that the proposed scheme can effectively re- duce computational costs when the policy changes. With the increasing of the policy attributes, the proposed scheme can reduce the overall computational costs, and it has better security, reliability and practicability.
作者 蒋溢 冯浩
出处 《计算机工程与设计》 北大核心 2017年第4期922-927,935,共7页 Computer Engineering and Design
基金 重庆市教委科学技术研究基金项目(KJ1400414) 重庆邮电大学博士启动基金项目(A2015-17) 重庆邮电大学自然科学基金项目(A2011-29)
关键词 策略变更 属性加密 密文策略 联合属性 普通访问结构树 policy change attribute encryption ciphertext policy union attributes common access structure tree
  • 相关文献

参考文献4

二级参考文献33

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data. Proceedings ofthe 13th ACM Conference on Computer and Communications Secu-rity . 2006
  • 5HONG C,ZHANG M,FENG D G.AB-ACCS:a cryptographic accesscontrol scheme for cloud storage. Journal of Computer ResearchAnd Development . 2010
  • 6ECHEVERRIA V,LIEBROCK L M,SHIN D.Permission manage-ment system:permission as a service in cloud computing. Pro-ceedings of the 1st IEEE International Workshop on Emerging Appli-cations for Cloud Computing . 2010
  • 7LUAN I,MUHAMMAD A,PETKOVIC.An encryption scheme for asecure policy updating. Proceedings of International Conference onSecurity and Cryptography (SECRYPT 2010) . 2010
  • 8DAEMEN J,RIJMEN V.AES proposal:rijndael,technical report,national institute of standards and technology. http://csrc.nist.gov/encryption/aes/round2/r2algs.htm .
  • 9BETHENCOURT J,SAHAI A,WATERS B.Advanced crypto soft-ware collection:the cpabe toolkit. http://acsc.cs.utexas.edu/cpabe/ .
  • 10John Bethencourt,Amit Sahai,Brent Waters."Ciphertext-policy attribute-based encryption". IEEE Symposium on Security and Privacy . 2007

共引文献404

同被引文献34

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部