计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 205-207.

• 信息安全 • 上一篇    下一篇

基于属性加密的气象云数据访问控制策略研究

方忠进,夏志华,周舒   

  1. 南京信息工程大学计算机与软件学院 南京210044;南京信息工程大学计算机与软件学院 南京210044;南京信息工程大学计算机与软件学院 南京210044
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61173141),江苏省普通高校研究生科研创新计划项目(CXZZ12_0512),江苏省网络监控工程中心开放基金课题项目(KJR1106),江苏高校优势学科建设工程项目资助

Research on Access Control Policy of Meteorological Cloud Data with Attribute-based Encryption

FANG Zhong-jin,XIA Zhi-hua and ZHOU Shu   

  • Online:2018-11-16 Published:2018-11-16

摘要: 随着气象业务水平的不断提高,气象数据的云存储和即时共享问题也日益突出。针对云计算环境下气象数据存储与共享面临的身份认证和访问控制问题,提出了一种基于多方授权的属性加密的访问控制模型。该模型采用一种适合云环境下大数据的属性加密方案,解决了气象部门用户多类性情况下的资料细粒度访问控制问题,同时引入全局ID概念和多方授权机制,解决了不同机构用户在气象部门各资料存储机构间的访问权限问题。系统具有较高的安全性和良好的实用价值。

关键词: 属性加密,气象数据,访问控制,细粒度

Abstract: The problems of meteorological cloud data storage and sharing have become increasingly serious with the increasing of meteorological services level.An access control model with multi-authority attribute-based encryption(ABE) was proposed against the problems of authentication and access control of meteorological cloud data storage and sharing.An attribute-based encryption scheme which is suitable for big data cloud environment is applied to solve the fine-grained data access control problems in case of multi-class users in meteorological department.The introduction of global ID and multi-authorization mechanism solves the access problem of different institutional users in different data storage departments.The system has high security and good practical value.

Key words: Attribute-based encryption,Meteorological data,Access control,Fine-grained

[1] Hur J,Noh D K.Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7)
[2] Yang Ming.An Efficient Attribute based Encryption Schemewith Revocation for Outsourced Data Sharing Control[C]∥2011International Conference on Instrumentation,Measurement,Computer,Communication and Control.2011
[3] Jia Hong-yong.Efficient and Scalable Multicast Key Manage-ment Using Attribute Based Encryption[C]∥2010InternationalConference on Information Theory and Information Security.2010
[4] 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,22(6)
[5] Subashini S,Kavitha V.A survey on security issues in service delivery models of cloud computing[J].Journal of Network and Computer Applications,2011,34
[6] 张磊,曹珍富.一个适合分布式网络的属性基加密方案[J].上海交通大学学报,2010,44(11)
[7] 陈勤,党正芹,张金漫,等.一种多认证机构可验证的属性基加密方案[J].计算机应用研究,2012,29(1)
[8] Liu Yu-chao.A Method for Trust Management in Cloud Computing:Data Coloring by Cloud Watermarking[J].International Journal of Automation and Computing,2011,8(3)
[9] Sakr S,Liu A.A Survey of Large Scale Data Management Approaches in Cloud Environments[J].IEEE Communications Surveys & Tutorials,2011,13(3)
[10] Yu Shu-cheng,Wang Cong.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]∥IEEE INFOCOM.2010
[11] Zissis D,Lekkas D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3)
[12] Hay B,Nance K,Bishop M.Storm Clouds Rising:Security Chal-lenges for IaaS Cloud Computing[C]∥Proceedings of the 44th Hawaii International Conference on System Sciences.2011
[13] Rodero-Merino L.Building safe PaaS clouds:A survey on security in multitenant software platforms[J].Computers & Security,2012,31
[14] Blandford R.Information security in the cloud[M].Network Security,April 2011
[15] Walters R.Managing privileged user activity in the datacentre[M].Network Security,November 2010
[16] Zhuo Hao.A Privacy-Preserving Remote Data Integrity Chec-king Protocol with Data Dynamics and Public Verifiability[J].IEEE Transactions on knowledge and data engineering,2011,23(9)
[17] Jia Wei-wei.SDSM:A Secure Data Service Mechanism in Mobile Cloud Computing[C]∥The First International Workshop on Security in Computers,Networking and Communications.2011
[18] Pearson S,Mont M C.Sticky Policies:An Approach for Mana-ging Privacy across Multiple Parties[J]. Computer,2011,44(9):60-68
[19] Garber L.Serious Security Flaws Identified in Cloud Systems[J].Computer,2011,4(12):21-23
[20] Song D,Shi E,Fischer I.Cloud Data Protection for the Masses[J].Computer,2012,5(1):39-45

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!