计算机科学 ›› 2016, Vol. 43 ›› Issue (3): 167-173.doi: 10.11896/j.issn.1002-137X.2016.03.032

• 信息安全 • 上一篇    下一篇

云存储平台下基于属性的数据库访问控制策略

黄保华,贾丰玮,王添晶   

  1. 广西大学计算机与电子信息学院 南宁530004,广西大学计算机与电子信息学院 南宁530004,广西大学计算机与电子信息学院 南宁530004
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61262072)资助

Database Access Control Policy Based on Attribute in Cloud Storage Platform

HUANG Bao-hua, JIA Feng-wei and WANG Tian-jing   

  • Online:2018-12-01 Published:2018-12-01

摘要: 云存储是一种新兴的数据存储模式,具有低成本、高效、易用等特点。数据库的安全访问控制成为在云存储平台下数据库运行时不可忽视的问题。设计了一个带权重的密文策略属性加密(WCPABE)方案,并且提出了基于该加密方案的云存储平台下数据库的访问控制策略。通过引入属性权重概念,WCPABE可以动态反映数据库中各个属性的重要程度,增强数据库拥有者对数据库的访问控制;提出了3种基于WCPABE的访问控制策略;提出了WCPABE在云存储平台下的数据库加密模型,实现了云存储平台下对数据库的有效、安全的访问,增强了数据库安全性,同时解决了多用户私钥分发与管理问题。实验数据表明:WCPABE具有可行性和有效性,能使云存储平台下数据库拥有者对数据库访问控制具有更多样化的手段,增强了数据库的安全性。

关键词: 数据库安全,基于属性加密,访问控制,云存储

Abstract: Cloud storage becomes more and more popular in large scale Database’s data store recently because it has features as low-cost,high efficiency,easy-to-use.To shift database from local to cloud storage server is still facing many challenges,especially in access control of database.We designed a “Weight Cipertext-Policy Attribute-Based Encryption” (WCPABE) scheme and proposed a database access control policy based on WCPABE under the cloud storage platform.Through introducing the concept of attribute weight,WCPABE can dynamically reflect each property’s important degrees in database and enhance the ability for database access control.We proposed three kinds of access control strategies based on WCPABE,and proposed WCPABE’s database encryption model in cloud storage platform and achieved effective and safe access control for database,enhancing database security and solving users’ private key problem in distribution and management.Experimental results show that WCPABE has feasibility and effectiveness and the database owner has more diversified means of enhancing security of the database under cloud storage platform.

Key words: Database security,Attribute-based encryption,Access control,Cloud storage

[1] Krutz R L,Vines R D.Cloud security:a comprehensive guide to secure cloud computing[M].Indianapolis,IN:Wiley Publishing,2010:358
[2] Toosi A N,Calheiros R N,Rajkumar B.Interconnected cloud computing environments:challenges,taxonomy,and survey[J].ACM Computing Surveys,2014,47(1):1-47
[3] Zhu Qin,Yu Shou-jian,Le Jia-jin,et al.Research on Security Mechanisms of Outsourced Database[J].Computer Science,2007,34(2):152-156(in Chinese) 朱勤,于守健,乐嘉锦,等.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156
[4] Sahai A,Waters B.Fuzzy Identity-Based encryption [M]∥Advance in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:557-557
[5] Boneh D,Boyen X.Efficient selective Identity-Based encryption without random oracles[J].J.Cryptology,2011,24(4):659-693
[6] Boneh D,Boyen X.Efficient Selective-ID secure Identity-Based encryption without random oracles[M]∥ Advances in Cryptology-EUROCRYTP 2004.Switzerland:Springer Berlin Heidelberg,2004:223-238
[7] Boneh D,Franklin M.Identity-Based encryption from the weil pairing[J].SIAM Journal on Computing,2003,32(3):586-615
[8] Backes M,Gagn M,Thyagarajan S A K.Fully secure Inner-Product proxy Re-Encryption with constant size ciphertext[C]∥SCC’15.Singapore:ACM,2015:31-40
[9] Goyal V,Pandey O,Amit S,et al.Attribute-Based encryption for fine-grained access control of encrypted data[C]∥13th ACM Conference on Computer and Communications Security.Alexandria,VA,United states:ACM,2006:89-98
[10] Bethencourt J,Amit S,Brent W.Ciphertext-policy attribute-based encryption[C]∥ IEEE Symposium on Security and Privacy,2007(SP ’07).Berkeley,CA,United states,2007:321-334
[11] Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥14th ACM Conference on Computer and Communications Security.Alexandria,Virginia,USA:ACM,2007:456-465
[12] Khader D.Attribute based search in encrypted data[C]∥2014 ACM Workshop on Information Sharing and Colla.Scottsdale,AZ,United States:ACM,2014:31-40
[13] Chase M,Chow S M.Improving privacy and security in multi-authority attribute-based encryption[C]∥16th ACM Confe-rence on Computer and Communications.Chicago,IL,United States:ACM,2009:121-130
[14] De Caro A,Vincenzo I.Jpbc:Java pairing based cryptography[C]∥2011 IEEE Symposium on Computer and Communications.Kerkyra,Corfu,Greece,2011:850-855

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!