期刊文献+

基于CP-ABE的云计算改进属性加密安全访问控制策略设计 被引量:15

Design for Strategy of Safety Access Control Cloud Computing Based on CP-ABE and Improved Attribute Encryption
在线阅读 下载PDF
导出
摘要 针对云计算存储中心由于数据和访问控制的安全性无法得到有效保障,从而可能造成用户存储的敏感数据被盗取的问题,在对CP-ABE(eiphertext-policy attribute-based encryption)进行深入分析的基础上提出了一种基于改进属性加密访问控制模型,对CPABE进行了改进,并对公钥和主密钥的生成、数据所有者加密文件、访问用户解密文件以及用户权限的全面管理过程均进行了详尽的定义和描述,从而设计了一种通用的安全访问机制;在仿真工具Ubuntu中进行实验,结果表明文中方法能有效地实现云计算环境下的安全访问控制,与其它方法相比,具有计算和存储开销低优点,具有较大的优越性。 Aiming at safety of the data and access control in the cloud computing storage center not guaranteed comprehensively,mainly leading to losing the sensitive data of user,the CP-ABE is analyzed and a improved attribute encryption model is proposed.Then the CP-ABE is improved,the generation of public key and main key,the encryption of file of data owner,access of the encryption of file and the comprehensive manage process of user right are all described and defined,so a universal safety access control mechanism is designed.The experiment is operated in Ubuntu,the result shows the method in this paper can effectively realize access control with safety,and compared with the other methods,it has the properties of lower computing and storage expense,so it has some priority.
作者 周明快
出处 《计算机测量与控制》 2015年第1期297-299,303,共4页 Computer Measurement &Control
基金 浙江省教育厅科研项目(Y201432304)
关键词 云计算 属性加密 访问控制 密钥 cloud computing attribute encryption access control key
  • 相关文献

参考文献12

  • 1Vaquero L, Rodero Marino L, Cacerce J, et al. A break in the clouds., towards a cloud definition J]. SIGCOMM Computer Com- munication Review, 2009, 39 (1) . 50 - 55.
  • 2程芳权,彭智勇,宋伟,王书林,崔一辉.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,50(8):1613-1627. 被引量:11
  • 3Wan Z G, Liu J, Deng R H. HASBE: A Hierarchical Attribute- Based Solution for Flexibleand Scalable Access Control in Cloud Computing [J]. IEEE Transactions on Information Forensics and Security, 2012, 7 (2): 743-754.
  • 4苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:98
  • 5孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152. 被引量:64
  • 6Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [A]. INFO- COM, 2010 Proceeding IEEE. San Diego, CA: IEEE [C]. Con- ference Publications, 2010:534 - 542.
  • 7邹佳顺,张永胜,高艳.基于改进CP-ABE算法的ABAC机制研究[J].计算机应用研究,2014,31(6):1860-1862. 被引量:4
  • 8Hota C, Sanka S, Rajaraja M N, et al. Capability-based crypto- graphic Data Access Control in cloud computing [J]. International Journal of Advanced Networking and Applications, 2011, 3 (3) : 1152 - 1161.
  • 9李琦,马建峰,熊金波,刘西蒙,马骏.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702. 被引量:13
  • 10Li X H, Lu R X, Lin X D, et al. Ciphertext policy attribute based eneryption with efficient revocation [EB/OL]. 2012-09- 25]. http: //bber. uwaterloo. Ca/- x271iang/papers/abe% 20with%20revocati on. pdf.

二级参考文献105

  • 1宋开波,罗军,孙金涛.基于CP-ABE算法的云存储数据保护机制[J].华中科技大学学报(自然科学版),2012,40(S1):266-269. 被引量:4
  • 2王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 3高扬,张家钰,吴敏.基于XACML和RBAC的访问控制系统[J].计算机应用与软件,2006,23(8):65-67. 被引量:5
  • 4张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 5Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 6Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 7Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 8Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 9Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 10Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.

共引文献176

同被引文献126

  • 1宋开波,罗军,孙金涛.基于CP-ABE算法的云存储数据保护机制[J].华中科技大学学报(自然科学版),2012,40(S1):266-269. 被引量:4
  • 2SHAMIR A. Identity-based Cryptosystems and Signature Schemes[EB/OL]. http://xueshu.baidu.com/s?wd=pape ruri%3A%28b3c4ef36 lf1358c0814a5f7e50d77db 1%29&fi lter=sc_long sign&tn=SE_xueshusource 2kduw22v&sc_ vurl=http%3A%2F%2Flink.springer.com%2F 10.1007%2F3-540- 39568-7_5&ie=utf-8, 2015-11-20.
  • 3SAHAI A, WATERS B. Fuzzy Identity Based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer-Verlag, 2005: 457-473.
  • 4GOYAL V, PANDEY O, SAHAI A, et al. Attribute Based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. 13th ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, VA, USA. New York: ACM, 2006: 89-98.
  • 5BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Oakland, Califormia, USA. New |ersey: IEEE, 2007: 321-334.
  • 6DAMIANI E, VIMEI~CATI S D C D, FORESTI S, et al. Selective Data Encryption in Outsourced Dynamic Environments[J]. Electronic Notes in Theoretical Computer Science, 2007, 168(1): 127-142.
  • 7HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Computer Research and Development, 2010, 47(zl): 259-265.
  • 8Blaze M,Bleumer G,Strauss M,et al.Divertible protocols and atomic proxy cryptography . EUROCRYPTc 98 [C]. Heidelberg: Springer, 1998:127-144.
  • 9Canetti R,Hobenberger S.Chosen cipertext secure proxy re-en- cryption//Proccedings of the ldth ACM Conference on Computer and Communications Security. Alexandria ,USA,2007:185-194.
  • 10Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption//Proceedings of the PKC" 08. Barcelona, Spain, 2008, LNCS 4929,Springer-Verlag,2008:360-379.

引证文献15

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部