计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 250-251.

• 信息安全 • 上一篇    下一篇

云存储环境下基于生物特征的访问控制机制研究

陈志杰,黄昆,鲜明   

  1. 国防科学技术大学训练部信息中心 长沙410073;国防科学技术大学电子科学与工程学院 长沙410073;国防科学技术大学电子科学与工程学院 长沙410073
  • 出版日期:2018-11-14 发布日期:2018-11-14

Research on Biometric Based Access Control for Cloud Storage

CHEN Zhi-jie,HUANG Kun and XIAN Ming   

  • Online:2018-11-14 Published:2018-11-14

摘要: 云计算是一种新型的计算方式,通过网络共享方式为用户提供按需使用的计算资源。如何加强对云计算资源的访问控制,保护用户的敏感信息和密钥不受恶意服务器和外部攻击者的窃取成为重要的安全问题。生物特征在这方面具有显著优势,文中研究了如何使用生物特征实现云存储数据访问控制的方法。该方法结合模糊身份加密、生物特征认证和密钥隔离加密机制,加强了私钥管理的安全性。同时,当每次用户提出访问请求时,云服务器就更新对应的文件头,而该文件头只有合法用户才能够解密。

关键词: 云计算,访问控制,基于身份的模糊加密,密钥隔离加密,生物特征

Abstract: Cloud computing is an arresting emerging computing paradigm that offers users on demand network access to a large shared pool of computing resources.How to strengthen the access control of cloud computing resources and protect sensitive data along with private key confidential against malicious servers or other external attackers,have been an important security problem.Biometric possesses notable advantage in this field,and hence this paper focused on leveraging biometric identity to achieve access control in cloud.We exploited and combined techniques of fuzzy identity based encryption(FIBE),biometric measurement,and key insulated encryption which enables augmenting the security of private key management.Specifically,we based on the idea that when every time legal user or malicious one makes the request of accessing data of his interest,and the cloud severs will update the corresponding header file which only the legal user has the ability to decrypt.

Key words: Cloud computing,Access control,Fuzzy identity based encryption,Key insulated encryption,Biometric

[1] Shamir A.Identity-Based cryptosystems and signature schemes[C]∥Procedings of the Crypto 1984 .volume 196 of LNCS,1984:47-53
[2] Itkis G,Reyzin L.SiBIR:Signer-base intrusion-resilient signa-tures [C]∥Procedings of the Crypto 2002.volume 2442 of LNCS,2002:499-514
[3] Dodis Y,Katz J,Xu S,et al.Key-Insulated Public-Key Cryptosystems[C]∥Procedings of EUROCRYPT 2002.volume 2332 of LNCS,2002:65-82
[4] Bellare M,Palacio.Protecting against key exposure:Stronglykey-insulated encryption with optimal threshold [EB/OL].[2002]http://eprint.iacr.org/2002/064
[5] Hanaoka,Imai.Parallel key-insulated public key encryption[C]∥Procedings of the PKC 2006.volume 3958 of LNCS,2006:105-122
[6] Katz D,Xu Yung.Strong key-insulated signature schemes [C]∥Procedings of the PKC 2003.volume 2567 of LNCS,2003:130-144
[7] Le Z,Ouyang Y,Ford J,et al.hierarchical key-insulated signature scheme in the CA trust model [M]∥Information Security and Cryptology.Springer,2006
[8] Zhou Y,Cao Z,Chai Z.Identity based key insulated signature [C]∥Procedings of the ISPEC 2006.volume 3903 of LNCS,2006:226-234
[9] Sahai A,Waters B.Fuzzy Identity Based Encryption [C]∥Proceedings of EUROCRYPT 2005.volume 3494 of LNCS,2005:457-473

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!