期刊文献+

云环境中基于信任分散策略的数据共享方案 被引量:5

Data sharing scheme based on trust decentralization in cloud environment
下载PDF
导出
摘要 针对不完全可信云环境中数据共享的安全问题,提出基于信任分散策略的数据共享方案。将原始数据拆分成动态数据和静态数据,动态数据采用在用户私钥内添加全局标志的密文策略属性基加密算法加密存储于一个云端,并在用户撤销时利用代理重加密技术改变访问结构;静态数据采用对称加密算法加密,存储于另一云端。安全性分析和实验表明,该方案能有效防止动态数据的串谋攻击并保证用户撤销的后向安全性,满足实际云环境中数据安全共享需求。 According to the security problem of data sharing in the environment of incomplete credible cloud,this paper proposed a data sharing scheme based on the decentralization strategy of credit.This scheme divided the original data into dyna-mic and static data.The dynamic data’s encryption used ciphertext-policy attribute-based encryption algorithm that added the personal identification in the user’s private key,and then a cloud stored it.At the same time,this scheme used the proxy re-encryption technology to change the access structure when the user revoked.The static data’s encryption used a symmetric encryption algorithm,and another cloud stored it.The security analysis and experiments show that the proposed scheme can effectively prevent the collusion attack of dynamic data and guarantee the backward security of users,which can meet the requirement of data security sharing in the real cloud environment.
作者 张光华 刘会梦 陈振国 许向阳 Zhang Guanghua;Liu Huimeng;Chen Zhenguo;Xu Xiangyang(State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China;College of Information Science&Engineering,Hebei University of Science&Technology,Shijiazhuang 050000,China;Hebei Engineering Technology Research Center for IOT Data Acquisition&Processing,North China Institute of Science&Technology,Sanhe Hebei 065201,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第3期905-910,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61572255) 中国博士后科学基金资助项目(2015M582622) 物联网信息安全技术北京市重点实验室开放课题(J6V0011104) 河北省科技计划支撑项目(15210338)
关键词 数据共享 信任分散 云环境 属性加密 代理重加密 data sharing trust decentralization cloud environment attribute encryption proxy re-encryption
  • 相关文献

参考文献5

二级参考文献79

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1265

同被引文献43

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部