期刊文献+

CP-ABE与数字信封融合技术的云存储安全模型设计与实现 被引量:3

DESIGN AND IMPLEMENTATION OF CLOUD STORAGE SECURITY MODEL BASED ON CP-ABE AND DIGITAL ENVELOPE FUSION TECHNOLOGY
在线阅读 下载PDF
导出
摘要 为了高效地实现云端数据的存储和传输安全,提出一种结合数字信封技术的改进的密文策略的属性加密机制(CPABE)云存储安全模型。该模型在不影响云服务性能的前提下保护用户的敏感数据,在数据未上传至云端前对数据进行本地加密;加密密钥通过CP-ABE机制以保证密钥不会被非法用户获取,并通过数字信封技术确保数据在传输过程中的完整性和保密性。新模型还结合动态口令(OTP)对用户进行登录校验,从而有效阻止非授权用户对数据的访问。仿真实验表明,改进的模型能够安全有效地保护用户的机密数据,阻止恶意用户对云服务器的非法访问。通过和现有云存储安全方案进行时间性能对比,改进的CP-ABE方案加密效率和安全性能有较大幅度提高。 In order to efficiently achieve the security of cloud data storage and transmission, we propose an improved cloud storage security model of ciphertext-policy attribute-based encryption (CP-ABE) which combines the digital envelopes technology. The model, under the premise of not affecting the cloud service performance, protects user' s sensitive data and makes local encryption on data before the data uploading to the cloud. Through CP-ABE mechanism the encryption keys is ensured not to be obtained by illegal users, and through digital envelopes technology it ensures the integrity and confidentiality of data in transit. The new model also combines with the one-time password (OTP) for checking the login of users, thus effectively prevents the access to the data by unauthorised users. Simulation experiment shows that the improved model can safely and effectively protect user's confidential data, blocks the illegal access to the cloud server by malicious users. By comparing time performance with existing cloud storage security solutions, the encryption efficiency and safety performance of the impr-;ved CP-ABE model are improved greatly.
出处 《计算机应用与软件》 CSCD 2016年第9期313-319,共7页 Computer Applications and Software
基金 国家自然科学基金项目(11062002 61363076) 江西省教育厅重点科技项目(GJJ13435 GJJ14465) 江西省自然科学基金项目(20142BAB207020)
关键词 云存储安全 属性加密机制 数字信封 动态口令 Cloud storage security Attribute-based encryption mechanism Digital envelope One-time password
  • 相关文献

参考文献22

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1088
  • 2李凌.云计算服务中数据安全的若干问题研究[D].合肥:中国科学技术大学,2013.
  • 3林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:325
  • 4Burr W E, Ferraiolo H,Waltermire D. NIST and computer security [ J ]. IT Professional, 2014,16 ( 2 ) : 31 - 37.
  • 5Presbrey J. Linked data platform for web applications [ D ]. Massachu- setts Institute of Technology,2014.
  • 6Hicks R. Stata and dropbox [ J ]. Stata Journal, 2014, 14 ( 3 ) : 693 - 696.
  • 7傅颖勋,罗圣美,舒继武.一种云存储环境下的安全网盘系统[J].软件学报,2014,25(8):1831-1843. 被引量:28
  • 8Priyanka R, Pankaj K. Highly Secure Method based on Ciphertext Poli- cy Attribute based Encryption in Hadoop System [ J ~. International Journal of Computer Applications ,2014,103 (9) :34 - 38.
  • 9Lai J, Deng R H, Li Y. Expressive CP-ABE with partially hidden access structures[ C]//Proeeedings of the 7th ACM Symposium on Informa- tion, Computer and Communications Security. ACM ,2012 : 18 - 19.
  • 10Patel V, Patel R. Improving the security of SSO in distributed computer network using digital certificate and one time password (OTP) [ J]. In- teruational Journal of Computer Applications,2014,89(4) :I0-14.

二级参考文献90

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:368
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1526

同被引文献14

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部