期刊文献+

一种混合云环境下安全高效的群数据共享方法 被引量:11

Secure and efficient group data sharing method in hybrid cloud environment
下载PDF
导出
摘要 在混合云数据共享中,用户量大,属性多,导致用户端的计算量随着属性数目的增多而增大,影响着群用户之间的云数据共享效率,并且还存在用户的身份隐私及相关属性容易被泄露的风险。针对这些问题进行研究,提出了一种适合混合云环境下安全高效的群数据共享方法。该方法通过使用匿名技术、属性隐藏和计算外包技术相结合,保障用户的身份隐私和属性的安全,降低用户端的计算量。安全性与性能分析和实验结果表明,该方法具有较好的安全性和效率。 In hybrid cloud data sharing,the amount of users and the attributes are large. As a result,the calculation amount of the client increases with the number of attributes,which affects the cloud data sharing efficiency among group users. And there is also a risk of leaking users’ identity privacy and related attributes. To solve these problems,this paper proposed a secure and efficient group data sharing method in hybrid cloud environment. The method combined the use of anonymous technology,attribute-hiding and computational outsourcing technology to ensure the security of the user’s identity privacy and attributes,and reduced the amount of calculations at the user end. Security and performance analysis,and the experimental results show the method has better safety and efficiency.
作者 梁有懿 凌捷 柳毅 赖琦 Liang Youyi;Ling Jie;Liu Yi;Lai Qi(Faculty of Computer,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第9期2789-2792,2810,共5页 Application Research of Computers
基金 广东省重点领域研发计划项目(2019B010139002) 广州市科技计划资助项目(201902020006,201902020007,201902010034)。
关键词 混合云 身份隐私 数据共享 匿名技术 属性隐藏 计算外包 hybrid cloud identity privacy data sharing anonymous technology attribute-hiding computing outsourcing
  • 相关文献

参考文献6

二级参考文献194

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1216
  • 2张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 3Delerablee Cecile.Identity-based broadcast encryption with constant size ciphertexts and private keys[C] //Proceedings of Asiacrypt.[s.l.] :IEEE,2007:200-215.
  • 4Cecile D,Pascal P,David P.Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys[C] //PAIRING 2007.[s.l.] :Springer-Verlag,2007:39-59.
  • 5Berkovits S.How to broadcast a secret[C] //Proceedings of Eurocrpt.[s.l.] :Springer-Verlag,1991:536-541.
  • 6Fiat A,Naor M.Broadcast encryption[C] //Proceedings of Crypto.[s.l.] :Springer-Verlag,1993:480-491.
  • 7Wallner D M,Harder E J,Agee R C.Key management for multiast:issues and architectures[S].RFC 2627.1999.
  • 8Wong C K,Gouda M,Lam L S.Secure group communications using key graphs[C] //ACM SIGCOMM.[s.l.] :[s.n.] ,1998:68-79.
  • 9Perrig A,Song D,Tygar J D.A new protocol for efficient large-group key distribution[C] //Proceedings of the IEEE Symposium on Security and Privacy.[s.l.] :IEEE,2001:247-262.
  • 10Waldvogel M,Caronni G,Sun D,et al.The VersaKey framework:Versatile group key managemen[J].IEEE J.Sel.Areas Commun(Special Issue on Middleware),1999,17(9):1614-1631.

共引文献146

同被引文献105

引证文献11

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部