期刊文献+

一种用于云存储的密文策略属性基加密方案 被引量:25

Ciphertext policy attribute based encryption scheme for cloud storage
在线阅读 下载PDF
导出
摘要 云存储的应用环境中存在缺乏细粒度访问控制、密钥管理难度大、难以抵御合谋攻击等问题,为此提出了一种新的用于云存储的密文策略属性基加密(ciphertext-policy attribute-based encryption,CP-ABE)方案。通过引入由数据属主独立控制的许可属性,构建不同属性域的CP-ABE方案,能够防止云存储系统特权用户的内部攻击,使数据属主能完全控制其他共享用户对其云数据的访问。实验结果表明,该方案在提供安全性的同时能极大地提高用户属性撤销的效率。最后,对该方案进行了安全分析,并证明了该方案在DBDH假设下是CPA,安全的。 There exists some problems as the lack of fine-grained access control,low efficiency of key management and the vulnerability against collusion attack in the cloud storage environment,where there's a large number of users and files.This paper proposed a new CP-ABE scheme applied in cloud storage.It introduced the permission attributes managed by the data owners,and constructed different attribute field to resolve the security problem such as the inner attacks and data control.Se-veral experiments show that revocation method for user attributes performs wih high efficiency while providing security.In addition,it proves the scheme is secure against the chosen-plaintext attack(CPA) under the decision bilinear diffie hellman(DBDH) assumption.
作者 刘帆 杨明
出处 《计算机应用研究》 CSCD 北大核心 2012年第4期1452-1456,共5页 Application Research of Computers
关键词 云存储 访问控制 属性基加密 存储安全 cloud storage access control attribute-based encryption storage security
  • 相关文献

参考文献17

  • 1LARRY D.Cloud computing hasn’t gone fortune 500 yet,but it’scoming[EB/OL].(2007-12-18)[2008-03-10].http//blogs.zdnet.corn/BTL/?p=8199.
  • 2CHRISTIAN C,IDIT K,SHRAER A.Trusting the cloud[J].ACMSIGACT News,2009,40(2):81-86.
  • 3SAHAI A,WATES B.Fuzzy identity-based encryption[C]//Ad-vances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,2005:457-473.
  • 4SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology CRYPTO’84.Berlin:Springer-Verlag,1984:47-53.
  • 5BONEH D,FRANKLIN M.Identity-based encryption from the weilpairing[C]//Advances in Cryptology-CRYPTO’01.Berlin:Springer-Verlag,2001:213-229.
  • 6BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attri-bute-based encryptio[C]//Proc of IEEE Sympoisum on Security andPrivacy.Washington DC:IEEE Computer Society,2007:321-334.
  • 7苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:99
  • 8CHEUNG L,NEWPORT C.Provably secure ciphertext policy ABE[C]//Proc of ACM Conference on Computer and Communications Se-curity.New York:ACM Press,2007:456-465.
  • 9GOYAL V,JAIN A,PANDEY O,et al.Bounded ciphertext policyattribute based encryption[C]//Proc of ICALP.Berlin:Springer-Ver-lag,2008:579-591.
  • 10LIANG X H,CAO Z F,LIN H,et al.Provably secure and efficientbounded ciphertext policy attribute based encryption[C]//Proc ofASIAN ACM Sympoisum on Information,Computer and Communica-tions Security.New York:ACM Press,2009:343-352.

二级参考文献56

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献98

同被引文献221

引证文献25

二级引证文献125

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部