期刊文献+

基于动态信用等级的密文访问控制方案 被引量:3

Dynamic trust level based ciphertext access control scheme
下载PDF
导出
摘要 针对属性基加密机制(ABE)在移动互联网环境中计算开销较大且不够灵活的问题,提出了一种基于动态信用等级的密文策略属性基加密(CP-ABE)方案。首先,该方案引入"信用等级"属性用来标识用户的"信用"并以此划分用户等级,高"信用等级"用户仅需常数级的计算开销即可解密;同时,中央授权中心(CA)在设定的时间阈值评估用户的访问行为并动态更新用户的"信用等级",更新算法避免私钥的完全重新生成。理论分析和实验结果表明,随着高"信用等级"用户占比升高,所提方案系统总时间开销不断减少,最终达到稳定并优于传统方案。该方案在保证安全性的前提下,总体上提高了移动互联网环境中访问控制的效率。 Concerning the problems of Attribute-Based Encryption (ABE) such as high computational consumption and lack of flexibility in mobile Internet, a dynamic trust level based Ciphertext-Policy ABE (CP-ABE) scheme was proposed. Firstly, the "trust level" attribute was defined to indicate user's trusted level and divide users into different classes. User with high "trust level" was be able to decrypt the message in a constant computational overhead. Meanwhile, Central Authority (CA) was allowed to evaluate user's access behavior within the certain time threshold. Only the user's "trust level" was updated dynamically by the updating algorithm instead of complete re-generating of secret key. Theoretical analysis and experimental results show that, with the growing proportion of high "trust level" user, the total time consumption of the proposed scheme was decreased until being stable and finally was superior to the traditional scheme. The proposed scheme can improve the access control efficiency in mobile Internet on the premise of keeping the security standard.
作者 陈丹伟 杨晟
出处 《计算机应用》 CSCD 北大核心 2017年第6期1587-1592,1615,共7页 journal of Computer Applications
基金 国家242信息安全计划项目(2015A051 2012A138) 国家十一五科技支撑计划项目(2007BAK34B06) 国家十五科技攻关计划项目(2004BA811B04)~~
关键词 访问控制 属性基加密 信用等级 行为评估 属性更新 access control Attribute-Based Encryption (ABE) trust level behavior evaluating attribute updating
  • 相关文献

参考文献2

二级参考文献65

  • 1新华网.云计算从概念走向应用至2015年收人将突破1800亿美元[EB/OL].(2013-12-20)[2014-10-05].http;//news,xinhuanet.com/info/2013-12/20/c_132982365.htm.
  • 2中国工业和信息化部.云计算安全问题及对策[EB/OL].[2014-10-05].http://www.miit.gov.cn/n11293472/n11293832/n15214847/n15218234/15475208.
  • 3新华网.大数据和云计算使的个人隐私四面楚歌[EB/OL].(2013-11-20)[2014-10-05].http://news,xinhuanet.com/info/2013-11/20/c_132902969.htm.
  • 4Columbus L.IDG cloud computing survey:security,integration challenge growth[EB/OL].(2013-08-13)[2014-10-05].http://www.forbcs.com/site.s/louiscolumbus/2013/08/13/idg-cloud-computing-survcy-security-integration-challenge-growth/.
  • 5中文国际.摩根大通数据泄露影响8300 万客户[EB/OL].(2014-10-03)[2014-10-05].http:/ / www.chinadaily.com.cn/hqgj/jryw/2014-10-03/content_12481331.html.
  • 6互动百科.隐私[EB/OL].[2014-10-05],www.baike.com/wiki/隐私.
  • 7Liu F,Tong J,Mao J,et al.NIST cloud computing reference architecture[J].NIST Special Publication,2011,500:292.
  • 8ZDNct.Enterprise cloud outlook:inevitably hybrid,surprisingly agile and(eventually)cheap[EB/OL].(2014-04-03)[2014-10-05].http://www.zdnet.com/enterprise-cloud-outlook-inevitably-hybrid-surprisingly-agile-and-eventually-cheap-7000028032/.
  • 9IBM.IBM hybrid cloud solution[EB/OL].[2014-10-05].http://www-01.ibm.com/software/tivoli/products/hybrid-cloud/.
  • 10Zhang K H,Zhou X Y,Chen Y Y,et al.Sedic:privacy-aware data intensive computing on hybrid clouds[C]//CCS.Proceedings of the 18th ACM conference on computer and communications security.New York:ACM,2011:515-526.

共引文献25

同被引文献22

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部