期刊文献+

基于CP-ABE的利益冲突数据集的访问控制 被引量:3

CP-ABE Based Access Control of Data Set with Conflict of Interest
下载PDF
导出
摘要 云存储允许数据拥有者将数据储存在云端,以便为用户提供数据共享服务。然而,同一个数据拥有者储存的不同数据之间可能会出现利益冲突。鉴于此,文中提出针对利益冲突数据集的基于密文策略属性基加密(CP-ABE)的访问控制方案。在该方案中,数据拥有者将虚拟属性用"与"门嵌入访问树中以得到修正的访问树,并在修正的访问树下对利益冲突数据集中的各个数据加密,从而避免了一个用户访问利益冲突数据集中的部分或全部数据而导致的错误、欺骗或风险。最后,从理论上对所提方案的效率和安全性进行了分析,分析结果表明了其是高效且安全的。 Cloud storage allows data owners to store their encrypted data in the cloud,so as to provide data sharing services for users.However,there might exist a conflict of interest among different data stored by the same data owner.In this regard,this paper proposed a ciphertext-policy attribute-based encryption(CP-ABE)based access control scheme for the data set with conflict of interest.In this scheme,the data owner embeds a virtual attribute into the access tree with the“AND”gate to get the modified access tree,and encrypts the data in the data set with conflict of interest under the modified access tree,thus avoiding errors,cheats or risks caused by an individual user’s access to some or all data in the data set with conflict of interest.Finally,the efficiency and security of this scheme were analyzed.The analytical results suggest the proposed scheme is efficient and secure.
作者 陈成 努尔买买提.黑力力 CHEN Cheng;Nurmamat HELIL(College of Mathematics and System Science,Xinjiang University,Urumqi 830046,China)
出处 《计算机科学》 CSCD 北大核心 2018年第11期149-154,共6页 Computer Science
基金 国家自然科学基金(61562085 11261057 11461069) 新疆维吾尔自治区人力资源和社会保障厅留学人员科技活动项目资助
关键词 访问控制 利益冲突数据集 中国墙策略 CP-ABE Access control Data set with conflict of interest Chinese wall policy CP-ABE
  • 相关文献

参考文献7

二级参考文献112

  • 1袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 2[1]M D Abrams. Renewed understanding of access control policies. The 16th National Computer Security Conf, 1993
  • 3[2]DTOS generalized security policy specification. Secure Computing Corporation. Tech Rep: DTOS CDRL A019, 1995
  • 4[3]P Loscocco et al. The inevitability of failure: The flawed assumption of security in modern computing environments. The 21st National Information Systems Security Conf, Crystal City, Virginia, 1998
  • 5[4]DARPA/ISO. Research challenges in operating system security. 1997. http:∥www.ito.arpa.mil/Proceedings/OS Security/challenges/challenges long.html
  • 6[5]Feustel, Mayfield. The DGSA: Unmet information security challenges for operating system designers. Operating Systems Review, 1998, 32(1): 3~22
  • 7[6]R Spencer, S Smalley, P Loscocco et al. The flask security architecture: System support for diverse security policies. The 1999 USENIX Security Symposium, Denver, CO, 1999
  • 8[7]Information technology-security techniques-evaluation criteria for IT security. ISO/IEC 15408, International Standards Organization, 1999. http:∥csrc.nist.gov/cc
  • 9[8]E I Organick. The MULTICS System: An Examination of Its Structure. Cambridge, Massachusetts and London, England: MIT Press, 1972
  • 10[9]D Redell, R Fabry. Selective revocation of capabilities. The Inernational Workshop on Protection in Operating Systems, 1974

共引文献279

同被引文献30

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部