期刊文献+

基于AES和ECC的云审计数据加密方案 被引量:7

Scheme of Cloud Audit Data Encryption Based on AES and ECC
下载PDF
导出
摘要 针对云审计数据的单向加密所带来的数据传输及存储安全问题,提出了混合双向加密方案(Hybrid Bidirectional Encryption Scheme,HBES)。HBES私钥由事件发起者产生并本地化存储,其中,私钥由随机数通过映射规则得到,随机数的产生则由响应时间和外部因素决定。模拟实验结果表明:与单一加密方式相比,HBES在加密时间开销以及安全方面更加高效,在实现云端审计数据的加解密方面是切实可行的。 Focusing on the data transmission and storage security problem of one-way encryption of cloud audit data,HBES(Hybrid Bidirectional Encryption Scheme)was proposed to tackle this problem.HBES private key is brought by event sponsor and local storage,then random number which depends on response time and external factors generates private key by mapping rules.Corresponding simulation experiment advocates that compared with the one-way encryption method,HBES is a more effective and feasible way in encryption time,security and achieving the encryption and decryption of the cloud audit data.
作者 陈庄 叶成荫
出处 《计算机科学》 CSCD 北大核心 2017年第S1期333-335,371,共4页 Computer Science
基金 重庆市研究生科研创新项目(CYS16222) 重庆理工大学研究生创新基金(YCX2015222 YCX2015237 YCX2016229)资助
关键词 AES ECC 云审计 双向加密 AES ECC Cloud audit Bidirectional encryption
  • 相关文献

参考文献7

二级参考文献58

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1331

同被引文献54

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部