期刊文献+

基于属性加密的软件定义网络域间访问控制方法 被引量:16

An inter-domain access control scheme for software defined network based on attribute-based encryption
下载PDF
导出
摘要 软件定义网络(SDN)区别于传统的计算机网络,其核心思想是将网络控制与数据转发分离。SDN不仅有利于降低网络当中的硬件成本,还使得网络管理员能够方便地对来自不同厂商的设备进行集中化的调试和管理。尽管具备传统网络不可比拟的优势,SDN的应用却带来了新的安全问题。当前如何保证SDN控制器掌控的敏感信息不被窃取是SDN安全领域内的关键问题之一。然而现有SDN访问控制方案往往无法提供安全的信息保护,而且往往着眼于单域环境下的管理,不能满足多域网络管理的需求。本文提出了一种抗密钥暴露的密文策略属性快速加密算法(AKE-CP-ABFE),基于该算法构建了一种针对多控制器设置的SDN域间访问控制系统模型。利用预计算技术使加密者无需进行复杂的指数运算或双线性映射。此外将用户或者设备的MAC地址嵌入到私钥当中,即使私钥已经暴露,获取私钥的人也无法使用该私钥。分析证明AKE-CP-ABFE具备良好的安全性。仿真实验表明,该方法能以较高的计算效率保证SDN敏感信息域间分享的安全性和灵活性。 Different from traditional computer network,software defined network(SDN)separates the network control from data transmission.SDN facilitates reducing hardware cost and centralized configuration and management of devices of different vendors.Despite its overwhelming advantages that traditional network architecture does not has,the applications of SDN brings out a series of new problems in terms of security.One of the key problems is how to prevent eavesdropping sensitive information possessed by SDN controllers.However,existing SDN access control schemes cannot provide secure information protection.Furthermore,most schemes focus on single-domain management but fail to meet inter-domain requirements.To address it,an anti-key-exposure ciphertext policy attribute-based fast encryption(AKE-CP-ABFE)is proposed.By introducing pre-computation technique,the encryptors do not need to execute any complicated exponentiation or bilinear map.Besides,MAC addresses are inserted into the private keys so that others cannot use private key of someone.Theoretical analysis proves that AKE-CP-ABFE has great security.Based on the proposed scheme,an inter-domain access control system model with multi-controller setting is established.Simulation experiment demonstrates that it guarantees security and flexibility of inter-domain sensitive information sharing in SDN.
作者 周波 王树磊 Zhou Bo;Wang Shulei(School of Electrical of Engineering, Nanjing Vocational College of Information Technology, Nanjing 210023;School of Civil Aviation Flight, Changzhou Institute of Technology, Changzhou 213032)
出处 《高技术通讯》 EI CAS 北大核心 2020年第4期363-373,共11页 Chinese High Technology Letters
基金 国家自然科学基金(61571241) 江苏高校品牌专业建设工程项目(PPZY2015C242)资助。
关键词 软件定义网络(SDN) 域间访问控制 属性加密(ABE) 预计算 抗密钥暴露 software defined network(SDN) inter-domain access control attribute-based encryption(ABE) pre-computation anti-key-exposure
  • 相关文献

参考文献2

二级参考文献28

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [C] // Proc of EUROCRYPT 2005. Berlin: Springer, 2005: 457- 473.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C] //Proc of CRYPTO 2001. Berlin: Springer, 2001:213-229.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] //Proc of CCS 2006. New York: ACM, 2006: 89-98.
  • 4Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures [C] //Proc of CCS 2007. New York: ACM, 2007: 195-203.
  • 5Lewko A, Sahai A, Waters B. Revocation systems with very small private keys [C] //Proc of S&P 2010. Piscataway, NJ: IEEE, 2010: 273-285.
  • 6Attrapadung N, Libert B, De Panafieu E. Expressive key policy attribute-based encryption with constant-size ciphertexts [C]//Proc of PKC 2011. Berlin: Springer, 2011 90-108.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C] //Proc of S&P 2007. Piscataway, NJ: IEEE, 2007:321-334.
  • 8Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proc of CCS 2007. New York: ACM, 2007: 456-465.
  • 9Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption [C] //Proc of ICALP 2008. Berlin: Springer, 2008:579-591.
  • 10Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [C]// Proc of PKC 2011. Berlin: Springer, 2011: 53-70.

共引文献30

同被引文献192

引证文献16

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部