期刊文献+

云计算中属性基数据与权限混合访问控制方案

Attribute-Based Data and Privilege Hybrid Access Control Scheme in Cloud Computing
下载PDF
导出
摘要 云计算的出现使得从任何位置访问应用程序和数据成为可能,由于其灵活、高效和资源共享的特性,云计算迅速应用于各个行业和领域。云计算中的安全细粒度数据访问控制、隐私保护和权限控制已成为学术界和工业界研究的热点问题。为了解决这些问题,提出一种基于SM9属性加密的数据与权限混合访问控制方案,在需要加密大量具有层次结构的数据的场景下,该方案比传统的属性基加密方案更加灵活高效,匿名的特点可以限制用户隐私泄露,层次权限控制使得更细粒度地管理云数据的操作权限成为可能。安全分析和实验结果表明,该方案在判定性双线性Diffie-Hellman假设下是安全的,在加解密等方面具有良好的工作效率。 The emergence of cloud computing has made it possible to access applications and data from anywhere.Due to its flexibility,efficiency,and resource sharing capabilities,cloud computing has been rapidly applied to various industries and fields.Fine-grained data access control,privacy protection,and privilege control in cloud computing have become hot research issues in both academia and industry.To address these issues,this paper proposes a data and privilege hybrid access control scheme based on SM9 attribute encryption.In scenarios that require encryption of a large amount of hierarchical data,this scheme is more flexible and efficient than traditional attribute-based encryption schemes,the anonymity of it can reduce the leakage of user’s privacy,and hierarchical privilege control makes it possible to manage the operation privilege of cloud data more finely.The security analysis and simulation experiments show that,the proposed scheme is secure under decisional bilinear Diffie-Hellman assumption,and it is efficient in encryption and decryption.
作者 刘芹 李鹏举 余纯武 LIU Qin;LI Pengju;YU Chunwu(School of Cyber Science and Engineering,Wuhan University,Wuhan 430079,China;School of Computer Science,Wuhan University,Wuhan 430079,China)
出处 《计算机工程与应用》 CSCD 北大核心 2024年第13期276-286,共11页 Computer Engineering and Applications
基金 国家自然科学基金(62272348)。
关键词 匿名 层次数据 权限控制 SM9 属性基加密 anonymity hierarchical data privilege control SM9 attribute-based encryption
  • 相关文献

参考文献4

二级参考文献22

  • 1Shamir A. Identity-based cryptosystems and signature schemes [C)IIAdvances in Cryptology. New York: Springer-Verlag, 1985: 47-53.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption [C]// Advances in Cryptology Eurocrypt 2005. New York: SpringerVerlag, 2005: 557557.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th A CM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.
  • 4Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]//2007 IEEE Security and Privacy. Washington 0 C: IEEE Press, 2007: 321-334.
  • 5Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2008: 456-465.
  • 6Goyal V, Jain A, Pandey 0, et al. Bounded ciphertext policy attribute based encryption (1). Automata. Languages and Programming. New York : Springer- Verlag, 2008: 579-591.
  • 7Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [C]//Public Key Cryptography PKC 2011. New York: Springer-Verlag, 2011: 53-70.
  • 8Boneh 0, Franklin M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology-CRYPTO 2001. New York :Springer-Verlag, 2001: 213-229.
  • 9Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme [C]//Advances in Cryptology Eurocrypt 2003. New York: Springer-Verlag, 2003: 646-646.
  • 10解理,任艳丽.隐藏访问结构的高效基于属性加密方案[J].西安电子科技大学学报,2015,42(3):97-102. 被引量:12

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部