期刊文献+

基于密文策略属性基加密算法的云存储数据更新方法 被引量:19

Data updating method for cloud storage based on ciphertext-policy attribute-based encryption
在线阅读 下载PDF
导出
摘要 针对云计算数据易遭非法窃取和恶意篡改问题,提出一种支持动态更新操作的密文策略的属性基加密方案(DU-CPABE)。首先利用线性分割思想将数据分成固定大小的数据块,然后采用密文策略属性基加密(CP-ABE)算法对各数据块进行加密,最后提出一种Address-Merkle Hash Tree(A-MHT)搜索树结构,借助A-MHT快速定位数据块实现云服务器中数据动态更新。经理论分析验证了方案的安全性,而且在理想信道中的仿真实验结果显示,在更新次数为5时,此方案相比CP-ABE方案的数据更新时间开销平均下降幅度为14.6%。实验结果表明:DU-CPABE方案在云计算服务中数据动态更新这一过程能够有效地减小数据更新的时间开销,同时降低系统开销。 Cloud computing data are vulnerable to be theft illegally and tampered maliciously. To solve these problems, a Dynamic Updating Ciphertext-Policy Attribute-Based Encryption( DU-CPABE) scheme which enables both data dynamic updating and security protection was proposed. Firstly, by using linear partitioning algorithm, data information was divided into fixed size blocks. Secondly, the data blocks were encrypted by using Ciphertext-Policy Attribute-Based Encryption( CPABE) algorithm. Finally, based on conventional Merkle Hash Tree( MHT), an Address-MHT( A-MHT) was proposed for the operation of dynamically updating data in cloud computing. The theoretical analysis proved the security of the scheme, and the simulation in ideal channel showed that, for five updates, compared with CP-ABE method, the average time overhead of data update was decreased by 14. 6%. The experimental results show that the dynamic updating of DU-CPABE scheme in cloud computng services can effectively reduce data update time and system overhead.
出处 《计算机应用》 CSCD 北大核心 2018年第2期348-351,442,共5页 journal of Computer Applications
基金 安徽省自然科学基金资助项目(1708085MF156) 安徽省重大人文社科基金资助项目(SK2014ZD033)~~
关键词 云计算 数据动态更新 密文策略属性基加密算法 Merkle哈希树 云安全 cloud computing data dynamic updating Ciphertext-Policy Attribute-Based Encryption(CP-ABE) algorithm Merkle Hash Tree(MHT) cloud security
  • 相关文献

参考文献4

二级参考文献160

  • 1张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1189

同被引文献190

引证文献19

二级引证文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部