期刊文献+

云计算环境下支持高效撤销的新型属性基加密方案 被引量:2

Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
原文传递
导出
摘要 为了解决开放云计算环境下用户属性变化导致的用户权限撤销及变更问题,提出一种基于代理重加密和密钥分割技术的属性基代理重加密方案,该方案支持用户权限的即时撤销,当发生用户撤销时,只需要更新云存储服务器中的密文组件以及代理服务器中未撤销用户的属性无关私钥组件.当发生用户属性撤销时,只需更新用户属性撤销列表,解密时根据用户属性撤销列表控制撤销属性用户的访问,可减少密文更新和用户私钥更新的计算量,提高系统撤销用户权限的执行效率,保护用户属性的隐私信息. In order to solve the problem of user authorization revocation caused by user attributes change in open cloud computing environment,an attribute-based proxy re-encryption scheme based on proxy reencryption and key segmentation is proposed. Instant revocation of user authorization is supported in the scheme. When user revocation occurs,it is only necessary to update the ciphertext component in the cloud storage server and unrevoked users' attribute independence private key component in the proxy server. When the user attribute revocation occurs,it is necessary to update the user attribute revocation list from which the user authorization can be limited. Then the workload of updating ciphertext and the user private key is lessen to improve the execution efficiency of re-encryption and access control scheme,at the same time,the privacy information of user attributes are protected.
作者 陈红松 沈强磊 CHEN Hong-song;SHEN Qiang-lei(School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China;Beijing Key Laboratory of Knowledge Engineering for Materials Science,Beijing 100083,China)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2018年第3期113-118,共6页 Journal of Beijing University of Posts and Telecommunications
基金 中央高校基本科研业务费专项项目(FRF-GF-17-B27)
关键词 属性基加密 用户-属性撤销 访问控制 代理重加密 attribute-based encryption user-attribute revocation access control proxy re-encryption
  • 相关文献

参考文献2

二级参考文献22

  • 1LANEY D. 3D Data Management:Controlling Data Volume,Velocity,and Variety [J]. Application Delivery Strategies, 2001 ,( 6 ): 70-72.
  • 2QuerylO. Hadoop-based SQL & Big Data Analytics Solution[EB/OL]. http://queryio.com,2015-06-12.
  • 3IBM.智慧的城市:理解IBM智慧城市的基础[EB/OL].http://www-31.ibm.com/province/cn/smartercity.2015-06-13.
  • 4Howe D,Costanzo M,Fey P,et al.Big Data:The Furture of Biocuration[J].Nature,2008,455 ( 7209 ) : 47-50.
  • 5R.eichman O,Jones M,Schildhauer M.Challenges and Opportunities of Open Data in Ecology[J].science,2011,331 (6018):703-705.
  • 6Hongsong Chen, Bharat Bhargava, Fu Zhongchuan.Multilabels- Based Scalable Access Control for Big Data Applications[J]. IEEE Cloud Computing,2014,1 (3):65-71.
  • 7Sahai A, Waters B. Advances in cryptology-eurocrtpt2005 [ M ] . Heidelberg: Springer Berlin Heidelberg,2005 : 457-473.
  • 8Goyal V,Pandet 0,Sahai A, et al. Attribute based en-cryption for fine-grained access control of encrypted data[C] // ACM Conference on Computer and Communica-tions Security. Alexandria: ACM,2006 : 89-98.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-policy at-tribute-based encryption [ C ] // IEEE Symposium on Secu-rity and Privacy ( SP07 ). Berkeley : IEEE, 2007 : 321-334.
  • 10Chase M. Theory of cryptography [ M ]. Heidelberg:Springer Berlin Heidelberg, 2007 : 515-534.

共引文献31

同被引文献5

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部