期刊文献+

基于云计算的属性加密访问控制研究 被引量:1

Research on attribute encryption access control based on cloud computing
下载PDF
导出
摘要 随着云计算技术的发展,云服务在数据处理方面也得到了广泛的应用。在云计算环境下,云服务为数据管理提供了便利,同时也存在着数据安全和访问控制等方面的问题,保证数据安全性和机密性成为云服务的重要研究课题。文章对基于属性的加密机制进行了分析,提出了云计算环境下的基于密钥策略属性加密的云存储访问控制方案。 With the development of cloud computing, cloud services in data processing has also been widely used. In the cloud computing environment, cloud service provides a convenient data management. But there are data security and access control and other issues. To ensure data security and confidentiality has become an important research topic of cloud services. In this paper, based on the encryption mechanism of the properties are analyzed, and puts forward the cloud computing environment based on key policy attributes encrypted cloud storage access control scheme.
作者 刘秀彬
出处 《无线互联科技》 2017年第12期30-31,共2页 Wireless Internet Technology
关键词 云计算 属性加密 访问控制 密钥机制 cloud computing attribute encryption access control key mechanisms
  • 相关文献

参考文献3

二级参考文献34

  • 1洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展.2010.
  • 2Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM SIGACT News ,2009,40(2) :81-86.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute based encryptionfor fine-grained access control of encrypted data[DB/OL]. [2012-01-09]. http://dl, acre. org/ci- ration, c fro? id= 1180418.
  • 4Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ DB/OL ]. [ 2012-02-11 ]. http://ieeexplore, ieee. org/xpls/abs_ all. jsp? at- number=4223236.
  • 5Fu K. Group Sharing and Random Access in Crypto- graphic Storage File Systems [D]. Massachusetts: MIT,1999.
  • 6Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[DB/OL]. [2012-02- 28]. http://www, springerlink, com/content/b730- 83628wvr1865.
  • 7ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Communications of the ACM, 2010,53(4):50 58.
  • 8SAHAI A, WATERS B. Fuzzy identity-based encryp tion [M]//LNCS: Volume 3494 Advances in Cryp tology-EUROCRYPT 2005. Berlin, Germany:Spring- er Verlag, 2005:557-557.
  • 9BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [M]//LNCS: Volume 2139 Advances in Cryptology-CRYPTO 2001. Berlin, Ger many: Springer-Verlag, 2001:213 229.
  • 10BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles M] //LNCS: Volume 3027 Advances in Cryptology-EU ROCRYPT 2004. Berlin, Germany: Springer-Verlag, 2004:223-238.

共引文献23

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部