期刊文献+

基于云存储的无可信中心的属性密钥分发算法 被引量:2

Cloud Storage Based Attribute Key Distribution Algorithm without Trusted Center
下载PDF
导出
摘要 随着现代通信技术的发展,云计算越来越受到人们的青睐,并且已经发展成为一项成熟的应用技术,得到了极大推广,云存储作为云环境下的应用也应运而生。云存储的主要目的是为用户共享空间资源,但是数据的安全共享如何保证,是云存储面临的一个主要问题。由于现有的密钥技术为云存储的数据共享提供有效访问控制的同时,也带来了共享数据服务提供商和密钥管理方的信任问题。针对以上问题,提出了无可信中心的属性密钥算法。对其进行的安全及性能分析表明,该算法不仅解决了云存储的信任依赖问题,而且在属性密钥分发过程中完成了用户的身份认证。 With the development of modern communication technology,cloud computing has developed into a mature application technology which is greatly promoted,and cloud storage as an application in cloud environment is also emerging. Cloud storage is intended to provide shared space resources for users,while how to ensure the safety of data sharing is a major challenge for cloud storage.The existing key techniques provide efficient access control for data sharing of cloud storage,while at the same time,they also bring trust problems of data sharing service providers and key managers.To address the above issues,an attribute key algorithm without a trusted center is proposed.Security and performance analysis shows that the algorithm not only solves the trust reliance problem of cloud storage,but also accomplishes user identity authentication in the process of attribute key distribution.
作者 卢宏才 LU Hongeai(Gansu Industry Polytechnic College,Tianshui 741025,China)
出处 《无线电工程》 2018年第7期536-540,共5页 Radio Engineering
基金 甘肃省高等学校科研基金资助项目(2017A-194)
关键词 云存储 数据共享 属性密钥 身份认证 cloud storage data sharing attribute key identity authentication
  • 相关文献

参考文献9

二级参考文献225

  • 1刘常昱,李德毅,杜鹢,韩旭.正态云模型的统计分析[J].信息与控制,2005,34(2):236-239. 被引量:210
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1227
  • 3WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 4邹晓.基于角色的访问控制模型分析与实现[J].微计算机信息,2006,22(06X):108-110. 被引量:21
  • 5魏权龄.数据包络分析[M].北京:科学出版社,2003.
  • 6M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 7V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 8E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 9C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 10J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.

共引文献270

同被引文献19

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部