期刊文献+

移动云服务环境中办公资源的安全访问控制技术研究(英文)

Research on secure access control of office resources in mobile cloud service environment
下载PDF
导出
摘要 由于云计算环境中无线办公网络环境的复杂性,导致移动端用户的数据资源存在较大的安全性隐患,因此为了提高移动云服务环境中办公数据访问的安全性,提出了一种基于改进CP-ABE(ciphertext-policy attributed-based encryption)的安全访问控制机制。该方法通过结合电子签章技术,对传统属性加密方案进行了改进,实现了更加高效的移动云计算安全访问控制。仿真实验结果显示:相比其他方法,提出方法所需计算开销和存储更小,且运算效率更高,适用于云服务环境中移动端用户的多种办公应用。 Due to the complexity of the wireless office network environment in the cloud computing environment,the data resources of the mobile terminal users have a big security risk.In order to improve the security of office data access in mobile cloud service environment,a secure access control mechanism based on improved CP-ABE(ciphertext-policy attributed-based encryption) is proposed in this paper.By combining the electronic signature technology,the proposed method improves the traditional property encryption scheme and achieves a more efficient mobile cloud computing security access control.Simulation results show that the proposed method requires less computational overhead and less storage as compared with other methods and has more computational efficiency.Therefore,it is suitable for a variety of office applications for mobile users in a cloud service environment.
作者 刘海涛 杨琼 Hai-tao LIU;Qiong YANG(Department of Information and Management Engineering,Inner Mongolia Technical College of Mechanics and Electrics,Hohhot 010070,China;Department of Education of Information Technology,East China Normal University,Shanghai 200062,China)
出处 《机床与液压》 北大核心 2018年第12期128-132,170,共6页 Machine Tool & Hydraulics
基金 Supported by science research project of higher education in Inner Mongolia autonomous region (No.NJZY17469)
关键词 移动云计算 安全访问控制 办公资源 CP-ABE 电子签章 Mobile cloud computing Secure access control Office resources CP-ABE Electronic signature
  • 相关文献

参考文献2

二级参考文献34

  • 1王应明,傅国伟.运用无限方案多目标决策方法进行有限方案多目标决策[J].控制与决策,1993,8(1):25-29. 被引量:70
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3SAHAI A, WATERS B. Fuzzy identity-based encryption[ A]. EUROCRYPT 2005[ C ]. Berlin: Springer,2005.457 - 473.
  • 4GOYAL V,PANDEY O, SAHAI A, et al. Attribute-based en- cryption for fine-grained access control of encrypted data[ A]. CCS2006[ C1. Alexandria, Virginia: ACM, 2006.89 - 98.
  • 5OSTROVSKY R, SAHAI A, WATERS B. Attribute-based en- cryption with non-monotonic access structures [ A ]. CCS2007 [ C] .Alexandria, Virginia: ACM, 2007.195 - 203.
  • 6OKAMOTO T, TAKASH1MA K. Fully secure functional en- cryption with general relations from the decisional linear as- sumption[ AJ. CRYFFO 2010[ C]. Berlin: Springer, 2010. 191 - 208.
  • 7LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure func- tional encryption: Attribute-based encryption and(hierarchical) inner product encryption[ A]. EUROCRYPT 2010[ C ]. Berlin: Springer, 2010.62 - 91.
  • 8BEFHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based enctyption [ A].IEEE Symposium on Security and Privacy 2007[ C] .Berkeley, CA: IEEE, 2007.321 - 334.
  • 9CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE[ A]. [ C]. Alexandria, Virginia: ACM, 21207.456 - 465.
  • 10GOYAL V, JAIN A, PANDEY O, et al. Bounded ciphertext policy atWibute based encryption[ A]. ICALP 2008 [ C]. Berlin: Springer, 2008.579 - 591.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部