期刊文献+

云计算中一种紧凑型的外包访问控制方案 被引量:3

A Compact and Outsourced Access Control Scheme in Cloud Computing
在线阅读 下载PDF
导出
摘要 密文策略的属性加密是实现云平台上安全的访问控制方案的最佳选择。然而,在大多数密文策略的属性加密方案中,用户密钥长度与属性的个数之间成线性关系;用户的解密时间与访问结构的复杂度成正比关系。为了减少用户密钥的存储和解密计算开销,本文提出一种面向云计算平台的紧凑型的外包访问控制方案。方案中的访问结构可以支持"与"、"或"以及"门限"三种策略。它仅采用简单的哈希和异或运算就可以验证用户外包解密返回的数据是否正确。在随机预言机模型中,基于aMSE-DDH难题,证明了方案是选择密文攻击安全的。分析表明,本文方案能够安全的实现云计算环境下的访问控制,尤其当用户终端设备受限时实现的访问控制。 Ciphertext-Policy Attribute-Based Encryption( CP-ABE) is a promising encryption technology for secure access control in cloud computing. However,in most of the existing CP-ABE schemes,the size of decryption key linearly increases with the number of attributes,and the decryption time follows a linear relationship with the complexity of access structure increasing. To reduce the storage cost of user's key and the time cost of decryption,in this paper,a compact and outsourced access control scheme is provided in cloud computing. In the proposed scheme,access structure associated with ciphertext can support three policies: AND,OR,and Threshold. At the same time,it can verify the result of outsourcing decryption only using some hash computations and XOR operations. Based on the a MSE-DDH problem,the proposed scheme is proved to be selectively secure against chosen-ciphertext attack in the random oracle model. In addition,the analyses show that it is efficient to securely achieve access control in cloud computing,especially when the terminal devices associated with user are constrained.
出处 《信号处理》 CSCD 北大核心 2015年第10期1224-1232,共9页 Journal of Signal Processing
基金 中央财政支持地方高校发展专项资金资助(项目名称:云计算中的访问控制方案研究 项目编号:000022070143) 国家自然科学基金(61171072) 深圳市科技计划资助项目(ZDSYS20140430164957660 CXB201104210002A JCYJ20130329115832637)
关键词 云计算 访问控制 属性基加密 密钥长度固定 外包解密 cloud computing access control attribute based encryption constant key length outsourcing decryption
作者简介 王树兰 女,1987年生,河南新乡人,深圳大学信息工程学院博士研究生,主要研究方向为信息安全与云计算访问控制。E-mail:wangshulan@email.SZU.edu.cn 喻建平 男,1968年生,湖南益阳人,深圳大学教授、博士生导师,主要研究方向为密码学、信息安全与网络安全。E—mail:yujp@SZU.edu.cn 张鹏 女,1984年生,湖北当阳人,深圳大学讲师、硕士生导师,主要研究方向为密码学与网络安全。E-mail:zhangp@SZU.edu.cn 王廷 男,1977年生,山东临沂人,深圳大学信息工程学院博士后,主要研究方向为密码学与信息安全。E—mail:wang809@163.com
  • 相关文献

参考文献19

  • 1王廷,喻建平,杨懿竣.云存储中隐私保护的线性同态加密方案[J].信号处理,2013,29(11):1463-1469. 被引量:2
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1076
  • 3Sahai A, Waters B. Fuzzy Identity-Based Encryption[ C]// Proceedings of Cramer R (ed.) EUROCRYPT 2005, LNCS 3494, 2005:457-473.
  • 4Goyal V, Pandey O, Sahai A, et al. Attribute-Based En- cryption for Fine-Grained Access Control of Encrypted Data[ C] ///Proceedings of ACM Conference on Computer and Communications Security, 2006:89-98.
  • 5苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:99
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-Policy At- tribute Based Encryption[ C ]//Proceedings of IEEE Sym- posium on Security and Privacy, 2007:321-334.
  • 7陈丹伟,邵菊,樊晓唯,陈林铃,何利文.基于MAH-ABE的云计算隐私保护访问控制[J].电子学报,2014,42(4):821-827. 被引量:16
  • 8Waters B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realiza- tion [ C ] // Proceedings of Public Key Cryptography-PKC, 2011:53-70.
  • 9Hur J. Improving Security and Efficiency in Attribute- Based Data Sharing [ J ]. IEEE Transactions on Knowl- edge and Data Engineering, 2013, 25(10) : 2271-2282.
  • 10Xie X, Ma H, Li J, et al. An Efficient Ciphertext-Policy Attribute-Based Access Control Towards Revocation in Cloud Computing[J]. Journal of Universal Computer Sci- ence, 2013, 19(16): 2349-2367.

二级参考文献122

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1176

同被引文献24

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部