期刊文献+

一种云存储下多授权访问控制及用户属性撤销方案 被引量:1

A Scheme of Multi-authorization Access Control and User Attribute Revocation in Cloud Storage
下载PDF
导出
摘要 云存储下已有基于属性加密的访问控制研究多是基于单授权中心来实现,该种方案在授权方不可信或遭受恶意攻击的情况下可能会造成密钥泄露.基于CP-ABE设计了一种多授权访问控制方案,引用代理服务器(Proxy Server,PS),帮助用户承担大量解密操作;对用户属性撤销问题采用高效安全的算法进行处理;最后,利用双线性判定(Decision Bilinear Diffie-Hellman,DBDH)假设理论证明是选择明文攻击安全的. The research of access control based on attribute encryption has been implemented in cloud storage,which is mostly based on single authorization center,may result in the leakage of key.Proposing a CP-ABE design of a multi access control scheme based on reference proxy server(Proxy Server,PS),to help users to undertake a large number of decryption operation;Problems with high security attributes revocation algorithm for processing;Finally,using the bilinear decision(Decision Bilinear Diffie-Hellman,DBDH)proved to be the chosen plaintext attack security.
作者 江泽涛 王伟峰 JIANG Ze-tao;WANG Wei-feng(The Key Laboratory of Image and Graphic Intelligent Processing of Guangxi , Guilin University of Electronic Technology, Guilin 541004, China;The Key Laboratory of Image and Graphic Intelligent Processing of Higher Education in Guangxi , Guilin University of Electronic Technology, Guilin 541004, China)
出处 《微电子学与计算机》 CSCD 北大核心 2018年第5期55-60,共6页 Microelectronics & Computer
基金 国家自然科学基金(61572147) 广西科技计划项目(AC16380108) 桂林电子科技大学图像图形智能处理重点实验项目(GIIP201501) 广西可信软件重点实验室项目(kx201502) 研究生教育创新计划项目(YJCXS201536)
关键词 云存储 多授权中心 访问控制 CP-ABE 属性撤销 cloud storage multi-authorization center access control CP-ABE attribute revocation
  • 相关文献

参考文献6

二级参考文献67

  • 1GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data. Proceedings ofthe 13th ACM Conference on Computer and Communications Secu-rity . 2006
  • 2HONG C,ZHANG M,FENG D G.AB-ACCS:a cryptographic accesscontrol scheme for cloud storage. Journal of Computer ResearchAnd Development . 2010
  • 3ECHEVERRIA V,LIEBROCK L M,SHIN D.Permission manage-ment system:permission as a service in cloud computing. Pro-ceedings of the 1st IEEE International Workshop on Emerging Appli-cations for Cloud Computing . 2010
  • 4LUAN I,MUHAMMAD A,PETKOVIC.An encryption scheme for asecure policy updating. Proceedings of International Conference onSecurity and Cryptography (SECRYPT 2010) . 2010
  • 5DAEMEN J,RIJMEN V.AES proposal:rijndael,technical report,national institute of standards and technology. http://csrc.nist.gov/encryption/aes/round2/r2algs.htm .
  • 6BETHENCOURT J,SAHAI A,WATERS B.Advanced crypto soft-ware collection:the cpabe toolkit. http://acsc.cs.utexas.edu/cpabe/ .
  • 7John Bethencourt,Amit Sahai,Brent Waters."Ciphertext-policy attribute-based encryption". IEEE Symposium on Security and Privacy . 2007
  • 8S.Yu,C.Wang,K.Ren,W.Lou."Achieving Secure,Scalable, and Fine-grained Data Access Control in Cloud Computing,". Proceedings IEEE INFOCOM . 2010
  • 9Malek B,Miri A.Combining attribute-based and access systems. Proc.IEEE CSE 2009,12th IEEEInt’l Conf.on Computational Science and Engineering . 2009
  • 10R Ostrovsky,B Waters.Attribute-Based Encryption with Non-Monotonic Access Structures. Proceedings of the 14th ACM conference on Computer . 2007

共引文献130

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部