计算机科学 ›› 2016, Vol. 43 ›› Issue (1): 191-194.doi: 10.11896/j.issn.1002-137X.2016.01.043
熊安萍,许春香,冯浩
XIONG An-ping, XU Chun-xiang and FENG Hao
摘要: 近年来,CP-ABE作为适用于云存储环境的访问控制机制,成为研究热点。由于现有的基于CP-ABE的访问控制方案在云存储环境下不支持系统属性灵活变更,利用云存储服务提供者的存储及计算资源优势,基于AB-ACER方案提出了支持系统属性灵活撤销及恢复的云存储访问控制方案。该方案通过引入虚拟属性来支持云存储环境下访问策略属性的撤销及恢复,且仅由存储服务提供者进行少量的重加密计算。安全及性能分析表明,该方案不仅支持数据属主访问策略的灵活变更,还保持了原有方案的安全性及细粒度访问控制,同时大大降低了数据属主的计算开销。
[1] Amazon.com.Amazon s3 Availability Event:July 20,2008.http://status.aws.amazon.com/s3-20080520.html [2] Arrington M.Gmail Disaster:Reports of Mass Email Deletions[R/OL].http://www.techcrunch.com/2006/12/28/gmail-disa-ster-reports-of-massemail-deletions [3] Krigsman M.Apple’s MobileMe Experiences Post-Launch Pain.http://blogs.zdnet.com/projectfailures/?p=908 [4] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥CCS.ACM,2006:89-98 [5] Su Jin-shu,Cao Dan,Wang xiao-feng,et al.Attribute-Based Encryption Schemes[J]Journal of Software, 2011,2(6):1299-1315 [6] Hur J,Noh D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221 [7] Dara K.Microsoft’s 2012-11 SkyDrive accidently freezes outOpera users[EB/OL].[2014-04-20].http://www.cnet.com/news/microsofts-skydrive-accidently-freezes-out-opera-users [8] Sahai A,Waters B.Fuzzy Identity-Based Encryption[M]∥Advances in Cryptology EUROCRYPT 2005.Springer Berlin Heidelberg,2005:457-473 [9] Xiong An-ping,Xu Chun-xiang.Energy Efficient Multiresource Allocation of Virtual Machine Based on PSO in Cloud Data Center[J].Mathematical Problems in Engineering,2014,18(5):816-830 [10] Bethencourt J,Sahai A,Waters B.Ciphertext-Policy Attribute-Based Encryption[C]∥IEEE Symposium on Security and Privacy,2007(SP’07).IEEE,2007:321-334 [11] Pirretti M,Traynor P,McDaniel P,et al.Secure Attribute-Based Systems[J].Journal of Computer Security,2010,18(5):799-837 [12] Ostrovsky R,Sahai A,Waters B.Attribute-Based Encryptionwith Non-Monotonic Access Structures[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Securi-ty.ACM,2007:195-203 [13] Yu S,Wang C,Ren K,et al.Attribute Based Data Sharing with Attribute Revocation[C]∥Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.ACM,2010:261-270 [14] Yu S,Ren K,Lou W.Attribute-based on-demand multicastgroup setup with membership anonymity[J].Computer Networks,2010,54(3):377-386 [15] Shamir A.Identity-Based Cryptosystems and Signature schemes[C]∥Advances in cryptology.Springer Berlin Heidelberg,1985:47-53 [16] Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing University of Technology(Natural Science),2012,6(8):85-90(in Chinese)黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学),2012,26(8):85-90 |
No related articles found! |
|