期刊文献+

基于属性加密且支持密文检索的安全云存储系统 被引量:6

Secure Attribute Based Encryption Enabled Cloud Storage System with Ciphertext Search
下载PDF
导出
摘要 云存储作为一种新兴的网络存储技术,其优点得到了广大用户的关注与认可。然而,频繁暴露的各大云盘隐私泄露等安全问题严重阻碍了云存储服务的应用与发展。文章提出了一种基于属性加密且支持密文检索的安全云存储系统。用户首先从可信中心申请属性密钥,然后将加密的隐私数据外包给云服务器。授权用户通过属性密钥生成关键字陷门,只有授权用户的属性满足规定的访问控制树时,该授权用户才被允许通过此陷门搜索云端加密数据。为了有效管理系统内的授权用户,新系统采用重加密技术实现了系统内特定用户的废除与添加。安全性分析表明,该系统能够有效保护用户的隐私和数据安全。性能分析表明,该系统具有较高的效率。 As a new kind of network storage technologies, cloud storage gets most people's attentions. However, the privacy and security issues have seriously hindered the application and development of cloud storage service. We present a secure attribute-based encryption enabled cloud storage system with ciphertext search. The basic idea is that users first outsource encrypted private data to cloud servers, then cloud services distribute an attribute key to an authorized user. The user generates a trapdoor based on his attribute keys. Only the attributes of authorized users satisfy the access tree integrated in the ciphertext, and the authorized users are allowed to search on cloud encrypted data by the trapdoor. In order to effectively manage authorized users in the system, the idea of re-encryption is adopted to achieve the revocation and addition of the authorized user. Security analysis shows that the system can effectively protect the user*s privacy, and performance analysis indicate that the system has desirable performance.
作者 刘建华 郑晓坤 郑东 敖章衡 LIU Jianhua;ZHENG Xiaokun;ZHENG Dong;AO Zhangheng(Department of Information Center,Xi'an University of Posts and Telecommunications,Xi'an Shannxi 710121,China;School of Computer Science and Technology,Xi'an University of Posts and Telecommunications,Xfan Shannxi 710121,China;National Engineering Laboratory for Wireless Security,Xi'an University of Posts and Telecommunications,Xfan Shannxi 710121,China)
出处 《信息网络安全》 CSCD 北大核心 2019年第7期50-58,共9页 Netinfo Security
基金 国家自然科学基金[61472472]
关键词 云存储 隐私泄露 属性加密 重加密 cloud storage privacy leakage attribute-based encryption re-encryption
  • 相关文献

参考文献18

二级参考文献103

  • 1吴光远,何丕廉,曹桂宏,聂颂.基于向量空间模型的词共现研究及其在文本分类中的应用[J].计算机应用,2003,23(z1):138-140. 被引量:23
  • 2张引,陈敏,廖小飞.大数据应用的现状与展望[J].计算机研究与发展,2013,50(S2):216-233. 被引量:379
  • 3向广利,陈莘萌,马捷,张俊红.实数范围上的同态加密机制[J].计算机工程与应用,2005,41(20):12-14. 被引量:18
  • 4ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 5Rivest R,Adleman L,Dertouzos M.On data banks and privacy homomorphisms[M]Foundations of Secure Computation.New York:Academic Press,1978:169-180.
  • 6Cohen J,Fischer M.A robust and verifiable cryptographically secure election scheme (Extended Abstract)[C]//Proc of the 26th Annual Symp on Foundations of Computer Science (FOCS1985).Piscataway,NJ:IEEE,1985:372-382.
  • 7Damgard I,Jurik M.A generalization,a simplification and some applications of Pailliers probabilistic public-key system[G]//LNCS 1992:Proc of Public Key Cryptography (PKC 2001).Berlin:Springer,2001:119-136.
  • 8Paillier P.Public-key cryptosystems based on composite degree residuosity classes[G]//LNCS 1592:Proc of Eurocrypt 1999.Berlin:Springer,1999:223-238.
  • 9Melchor C,Gaborit P.A lattice-based computationally efficient private information retrieval protocol[EB/OL].2007[2012-12-09].http://eprint.iacr.org/2007/446.
  • 10Lipmaa H.An Oblivious transfer protocol with log-squared communication[G]//LNCS 3650:Proc of ISC 2005.Berlin:Springer,2005:314-328.

共引文献196

同被引文献29

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部