期刊文献+

基于代理重加密的物联网云节点授权可信更新机制 被引量:8

PRE-TUAN:Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud
下载PDF
导出
摘要 物联网云平台通过物联网节点采集和使用数据,基于云平台进行数据的运算和存储,提升了物联网处理数据的能力和数据共享的范围,也丰富了云端数据的内容,推动了互联网与人类世界的渗透和融合,同样也带来了全新的安全问题,由于物联网节点的特点与局限性,导致节点极其容易受到攻击,因此,如何实现物联网云平台中被劫持节点数据访问授权的可信更新至关重要.为此,提出了一种基于代理重加密的物联网云节点授权可信更新机制(PRE based trusted update scheme of authorization for nodes on IoT cloud platform,PRE-TUAN).首先,定义系统模型,包含可信的物联网数据服务器、授权管理服务器和半可信的云端重加密代理服务器;其次,描述系统流程和算法;最后对PRE-TUAN进行安全性分析和证明.PRE-TUAN以代理重加密为基础,将充分发挥云的运算能力,同时确保物联网数据分享的安全与可靠. In the Internet of things(IoT)cloud platform,the data is collected and used by the nodes of IoT,and the processing and storage of data is based on the cloud platform.The platform has increased the data processing and sharing abilities of IoT,meanwhile,it also has enriched the resource in cloud and improved integration of the Internet and human world.All of this offers advantage as well as new problems of information security.As the characteristic and limitation of the nodes of IoT,they are particularly vulnerable,thus it is a crucial and urgent issue that how to realize the trusted update of authorization for the hijacked nodes.In order to solve this problem,we propose a PRE based trusted update scheme of authorization for nodes on IoT cloud platform(PRE-TUAN).At first,we define the system model including the trusted IoT data server and permission management server,and the semi-trusted proxy re-encryption server in cloud.Secondly,describe the system processing and algorithms.Finally,analyze and prove the security of PRE-TUAN.PRE-TUAN is based on the proxy re-encryption(PRE),which will reach the full potential of cloud computing,and ensure the security and reliability of the data in IoT cloud.
作者 苏铓 曹梦元 谢绒娜 付安民 Su Mang;Cao Mengyuan;Xie Rongna;Fu Anmin(School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094;Zhongyuan University of Technology,Zhengzhou 450007;Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第7期1479-1487,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61702266 61572255) 江苏省自然科学基金项目(BK20150787 BK20141404)~~
关键词 物联网 云计算 授权管理 权限可信更新 代理重加密 Internet of things (loT) cloud computing permission management trusted update scheme of authorization proxy re encryption (PRE)
  • 相关文献

参考文献3

二级参考文献40

  • 1袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 2工业和信息化部.物联网"十二五"发展规划[EB/OL].(2013-02-14)[2013-09-10].ht-tp://www.gov.cn/zwgk/2012-02/14/con-tent_2065999.htm.
  • 3M Tuters,K Varnelis.Beyond locative media:Giving shape to the internet of things [J].Leonardo,2006,39(4):357-363.
  • 4N Gershenfeld,R Krikorian,D Cohen.The internet of things[J].Scientific American,2004,291(4):76-81.
  • 5Ashton K.That 'internet of things' thing[J].RFID Journal,2009:97-114.
  • 6L Atzori,A Iera,G Morabito.The internet of things:A survey[J].Computer Networks,2010,54(15):2787-2805.
  • 7S Akl,P Taylor.Cryptographic solution to a problem of access control in a hierarchy[J].ACM Transactions on Computer Systems,1983,1(3):239-248.
  • 8A De Santis,A Ferrara,B Masucci.Cryptographic key assignment schemes for any access control policy[J].Information Processing Letters (IPL),2004,92(4):199-205.
  • 9ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms [A].Advances in Cryptology [C].Berlin Heidelberg:Springer,1985.10-18.
  • 10M Hwang,W Yang.Controlling access in large partially ordered hierarchies using cryptographic keys[J].Journal of Systems and Software,2003,67(2):99-107.

共引文献207

同被引文献57

引证文献8

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部