期刊文献+

基于Fabric和属性加密的数据安全共享方案

Secure data sharing scheme based on Fabric and attribute encryption
下载PDF
导出
摘要 为了解决弱信任组织之间数据共享问题,提出一种基于Hyperledger Fabric及密文策略属性加密的数据安全共享方案。首先,将密文策略属性加密技术融入Fabric区块链,实现证书、属性密钥及数据加密的集成;其次,基于云存储服务器构建云存储索引结构及数据存储体系,以支持数据高效存储及检索;最后,设计基于上述技术的Fabric数据访问控制方案,实现云存储数据安全共享。Fabric区块链的引入确保了数据可追溯性,改造的Fabric CA提高了系统可用性及数据共享效率。安全性分析及实验结果表明,该方案能够平衡数据共享效率、安全性及系统可用性,可实现弱信任组织之间数据的安全共享。 In order to solve the problem of data sharing in weakly trusted organizations,a secure data sharing scheme based on Hyperledger Fabric and ciphertext policy attribute encryption was proposed.Firstly,the ciphertext policy attribute encryption technology was connected to the Fabric blockchain to integrate certificates,attribute keys and data encryption.Secondly,a cloud storage index structure and a data storage archetecture were built based on the cloud storage server to achieve efficient data storage and retrieval.Finally,a Fabric data access control scheme based on the above technolgies was designed to achieve secure sharing of cloud storing data.Fabric blockchain ensured data traceability,and the transformed Fabric CA improved system availability and data sharing efficiency.Security analysis and experimental results show that the proposed scheme can balance data sharing efficiency,data security and system availability,and implement secure data sharing among weakly trusted organizations.
作者 申童童 黄保华 SHEN Tongtong;HUANG Baohua(School of Computer,Electronics and Information,Guangxi University,Nanning 530004,China;Guangxi Intelligent Digital Services Research Center of Engineering Technology,Nanning 530004,China;Key Laboratory of Parallel,Distributed and Intelligent Computing(Guangxi University),Education Department of Guangxi Zhuang Autonomous Region,Nanning 530004,China)
出处 《广西大学学报(自然科学版)》 CAS 北大核心 2024年第3期585-594,共10页 Journal of Guangxi University(Natural Science Edition)
基金 国家自然科学基金项目(61962005)。
关键词 属性加密 数据安全共享 去中心化 云存储 attribute encryption secure data sharing decentralization cloud storage
  • 相关文献

参考文献10

二级参考文献79

  • 1马佳乐,郭银章.云计算用户行为信任评估与访问控制策略研究[J].计算机应用研究,2020,37(S02):260-262. 被引量:9
  • 2GENTRY C. A fully homomorphic encryption scheme[ D ]. San Francisco: Stanford University, 2009.
  • 3SMART N P, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[ C]//Pub- lic Key Cryptography-PKC 2010. Germany:Springer Berlin Heidelberg, 2010:420-443.
  • 4STEHLE D, STEINFELD R. Faster fully homomorphic encryption[ C]//Advances in Cryptology-ASIACRYPT 2010. Ger- many:Springer Berlin Heidelberg, 2010:377-394.
  • 5GENTRY C, SHAI H. Fully homomorphic encryption without squashing using depth-3 arithmetic circuits[ C ]//2011 52nd Annual IEEE Symposium on Foundations of Computer Science. Palm Spings, CA: IEEE, 2011 : 107-116.
  • 6GENTRY C, HALEVI S, SMART N P. Better bootstrapping in fully homomorphic encryption [ C ]//Public Key Cryptogra- phy-PKC 2012. Germany:Springer Berlin Heidelberg, 2012:1-16.
  • 7GENTRY C, HALEVI S. Implementing gentry's fully-homomorphic encryption scheme[ C ]//Advances in Cryptology-EU- ROCRYPT 2011. Germany: Springer Berlin Heidelberg, 2011 : 129-148.
  • 8SMART N P, VERCAUTEREN F. Fully homomorphic SIMD operations [ J ]. Designs, Codes and Cryptography, 2012, 71(1) : 57-81.
  • 9BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE [ C ]// Proceed- ings of the 52nd Annual Symposium on Foundations of Computer Science. Washington DC: IEEE Computer Society, 2011 : 97-106.
  • 10BRAKERSKI Z, GENTRY C, VAIKUNTANATHAN V. (Leveled) fully homomorphic encryption without bootstrapping [ C ]// Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. NewYork: ACM Press, 2012: 309-325.

共引文献93

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部