计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 250-251.
陈志杰,黄昆,鲜明
CHEN Zhi-jie,HUANG Kun and XIAN Ming
摘要: 云计算是一种新型的计算方式,通过网络共享方式为用户提供按需使用的计算资源。如何加强对云计算资源的访问控制,保护用户的敏感信息和密钥不受恶意服务器和外部攻击者的窃取成为重要的安全问题。生物特征在这方面具有显著优势,文中研究了如何使用生物特征实现云存储数据访问控制的方法。该方法结合模糊身份加密、生物特征认证和密钥隔离加密机制,加强了私钥管理的安全性。同时,当每次用户提出访问请求时,云服务器就更新对应的文件头,而该文件头只有合法用户才能够解密。
[1] Shamir A.Identity-Based cryptosystems and signature schemes[C]∥Procedings of the Crypto 1984 .volume 196 of LNCS,1984:47-53 [2] Itkis G,Reyzin L.SiBIR:Signer-base intrusion-resilient signa-tures [C]∥Procedings of the Crypto 2002.volume 2442 of LNCS,2002:499-514 [3] Dodis Y,Katz J,Xu S,et al.Key-Insulated Public-Key Cryptosystems[C]∥Procedings of EUROCRYPT 2002.volume 2332 of LNCS,2002:65-82 [4] Bellare M,Palacio.Protecting against key exposure:Stronglykey-insulated encryption with optimal threshold [EB/OL].[2002]http://eprint.iacr.org/2002/064 [5] Hanaoka,Imai.Parallel key-insulated public key encryption[C]∥Procedings of the PKC 2006.volume 3958 of LNCS,2006:105-122 [6] Katz D,Xu Yung.Strong key-insulated signature schemes [C]∥Procedings of the PKC 2003.volume 2567 of LNCS,2003:130-144 [7] Le Z,Ouyang Y,Ford J,et al.hierarchical key-insulated signature scheme in the CA trust model [M]∥Information Security and Cryptology.Springer,2006 [8] Zhou Y,Cao Z,Chai Z.Identity based key insulated signature [C]∥Procedings of the ISPEC 2006.volume 3903 of LNCS,2006:226-234 [9] Sahai A,Waters B.Fuzzy Identity Based Encryption [C]∥Proceedings of EUROCRYPT 2005.volume 3494 of LNCS,2005:457-473 |
No related articles found! |
|