期刊文献+

面向云存储的高效动态密文访问控制方法 被引量:78

Achieving efficient dynamic cryptographic access control in cloud storage
在线阅读 下载PDF
导出
摘要 针对云存储中敏感数据的机密性保护问题,在基于属性的加密基础上提出了一种密文访问控制方法HCRE。其思想是设计一种基于秘密共享方案的算法,将访问控制策略变更导致的重加密过程转移到云端执行,从而降低权限管理的复杂度,实现高效的动态密文访问控制。实验分析表明HCRE显著降低了权限管理的时间代价,而且没有向云端泄露额外的信息,保持了数据机密性。 To keep the data in the cloud confidential against unauthorized parties,a cryptographic access control solution called hybrid cloud re-encryption(HCRE) based on attribute-based encryption(ABE) was introduced.HCRE designed a secret sharing scheme to delegate the task of ABE re-encryption to the cloud service provider(CSP),which alleviates the administering burdens on the data owner.Experiments show that HCRE can handle dynamic access policies in a more ef-ficient way.Additionally,HCRE does not reveal extra information of the plaintext to the CSP,thus it does no harm to the data confidentiality.
出处 《通信学报》 EI CSCD 北大核心 2011年第7期125-132,共8页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2007AA120404)~~
关键词 云存储 云计算 密文访问控制 基于属性的加密 代理重加密 cloud storage cloud computing cryptographic access control attributes-based encryption proxy re-encryption
  • 相关文献

参考文献10

  • 1GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data. Proceedings ofthe 13th ACM Conference on Computer and Communications Secu-rity . 2006
  • 2HONG C,ZHANG M,FENG D G.AB-ACCS:a cryptographic accesscontrol scheme for cloud storage. Journal of Computer ResearchAnd Development . 2010
  • 3ECHEVERRIA V,LIEBROCK L M,SHIN D.Permission manage-ment system:permission as a service in cloud computing. Pro-ceedings of the 1st IEEE International Workshop on Emerging Appli-cations for Cloud Computing . 2010
  • 4LUAN I,MUHAMMAD A,PETKOVIC.An encryption scheme for asecure policy updating. Proceedings of International Conference onSecurity and Cryptography (SECRYPT 2010) . 2010
  • 5DAEMEN J,RIJMEN V.AES proposal:rijndael,technical report,national institute of standards and technology. http://csrc.nist.gov/encryption/aes/round2/r2algs.htm .
  • 6BETHENCOURT J,SAHAI A,WATERS B.Advanced crypto soft-ware collection:the cpabe toolkit. http://acsc.cs.utexas.edu/cpabe/ .
  • 7John Bethencourt,Amit Sahai,Brent Waters."Ciphertext-policy attribute-based encryption". IEEE Symposium on Security and Privacy . 2007
  • 8S.Yu,C.Wang,K.Ren,W.Lou."Achieving Secure,Scalable, and Fine-grained Data Access Control in Cloud Computing,". Proceedings IEEE INFOCOM . 2010
  • 9Malek B,Miri A.Combining attribute-based and access systems. Proc.IEEE CSE 2009,12th IEEEInt’l Conf.on Computational Science and Engineering . 2009
  • 10R Ostrovsky,B Waters.Attribute-Based Encryption with Non-Monotonic Access Structures. Proceedings of the 14th ACM conference on Computer . 2007

同被引文献603

引证文献78

二级引证文献749

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部