期刊文献+

云环境下的数据多副本安全共享与关联删除方案 被引量:8

Security sharing and associated deleting scheme for multi-replica in cloud
下载PDF
导出
摘要 针对共享在公共云环境的用户数据因所有权与管理权分离而导致的用户隐私泄露问题,结合对称加密算法、属性加密算法和副本定位技术,提出一种云环境下的数据多副本安全共享与关联删除方案,对用户数据进行加密等处理封装成副本关联对象(RAO,replication associated object),随后将RAO共享到云服务商,建立副本关联模型对RAO所产生副本进行管理并实现关联删除。分析表明方案是安全与有效的,能够对用户共享的数据及其副本进行安全共享与关联删除,有效保障了数据多副本的隐私安全。 In order to protect the privacy of data stored in public cloud environment, a security sharing and associated deleting scheme for multi-replica was proposed, which was based on symmetric encryption algorithm, attribute encryption algorithm and replica location technology. In this security scheme, the user's data was first encrypted and encapsulated into the replication associated objects(RAO), then the RAO was shared in cloud service provider and managed by the replica correlation model. The comprehensive analyses show that the scheme is security and effective, and is able to support the data security sharing and associated deleting for multi-replica to protect the data privacy.
出处 《通信学报》 EI CSCD 北大核心 2015年第S1期136-140,共5页 Journal on Communications
基金 国家自然科学基金资助项目(61402109 61370078) 福建省自然科学基金资助项目(2015J05120)~~
关键词 云环境 用户隐私 数据多副本 安全共享 关联删除 cloud environment user privacy multiple-replicas security sharing related deletion
  • 相关文献

参考文献17

二级参考文献160

  • 1周婧,王意洁,阮炜,李思昆.面向海量数据的数据一致性研究[J].计算机科学,2006,33(4):137-140. 被引量:18
  • 2武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 3Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 4Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 5Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 6Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 7Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 8Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 9Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 10Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].

共引文献183

同被引文献55

引证文献8

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部