计算机科学 ›› 2026, Vol. 53 ›› Issue (2): 431-441.doi: 10.11896/jsjkx.250900047
郑开发1, 孙炜2, 周俊旭2, 吴云坤5, 徐振3, 刘志全2, 何强4
ZHENG Kaifa1, SUN Wei2, ZHOU Junxu2, WU Yunkun5, XU Zhen3, LIU Zhiquan2 , HE Qiang4
摘要: 在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访问控制的弱中心化敏感数据共享方案(HAC-SDS)。首先,通过云边端协同计算方式,将终端侧开销转移到云边侧,降低计算和存储开销。其次,通过构建加密的倒排索引,支持对云端文件进行快速、细粒度的检索,并结合属性撤销与动态更新机制,显著提升效率。最后,将区块链技术应用于密钥管理,通过其弱中心化的特性,从根本上消除传统中心化方案的单点瓶颈与信任风险。安全分析表明,密文的不可区分性有效保障了数据的机密性。实验结果表明,所提密文检索方案在实际应用中是高效可行的。
中图分类号:
| [1]ZHAO Y F.Application of big data and cloud computing in electronic information systems[J].Integrated Circuit Application,2025,42(1):122-123. [2]D’ORAZIO C J,CHOO K K R.Circumventing iOS securitymechanisms for APT forensic investigations:A security taxonomy for cloud apps[J].Future Generation Computer Systems,2018,79:247-261. [3]BROWN A J,GLISSON W B,ANDEL T R,et al.Cloud forecasting:Legal visibility issues in saturated environments[J].Computer Law & Security Review,2018,34(6):1278-1290. [4]ZHANG X,ZHOU Y,WU D,et al.A survey on privacy-preserving caching at network edge:Classification,solutions,and challenges[J].ACM Computing Surveys,2025,57(5):1-38. [5]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy(SP’07).IEEE,2007:321-334. [6]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]//20th USENIX security symposium(USENIX Security 11).2011. [7]GUO L F,XING X M,GUO H.An efficient,traceable,and revocable attribute-based encryption scheme in cloud storage[J].Journal of Cryptologic Research,2023,10(1):131-145. [8]YAN L,WANG G,YIN T,et al.Attribute-based searchable encryption:A survey[J].Electronics,2024,13(9):1621. [9]ZHOU X B,JIANG,R.A fine-grained data encryption and sharing scheme for cloud-fog integrated environments[J].Journal of Cryptologic Research,2023,10(6):1295-1318. [10]REN J,ZHANG L,WANG B.Decentralized multi-authority attribute-based searchable encryption scheme[J].International Journal of Network Security,2021,23(2):332-342. [11]SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473. [12]WANG S,ZHOU J,LIU J K,et al.An efficient file hierarchy attribute-based encryption scheme in cloud computing[J].IEEE Transactions on Information Forensics and Security,2016,11(6):1265-1277. [13]ZHENG K,DING C,WANG J.A secure data-sharing scheme for privacy-preserving supporting node-edge-cloud collaborative computation[J].Electronics,2023,12(12):2737. [14]LIU J,LI Y,SUN R,et al.EMK-ABSE:Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination[J].IEEE Internet of Things Journal,2022,9(19):18650-18662. [15]XIA J,CHENG G,GU S,et al.Secure and trust-oriented edge storage for Internet of Things[J].IEEE Internet of Things Journal,2019,7(5):4049-4060. [16]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceeding 2000 IEEE Symposium on Security and Privacy.IEEE,2000:44-55. [17]ZHENG Q,XU S,ATENIESE G.VABKS:Verifiable attribute-based keyword search over outsourced encrypted data[C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications.IEEE,2014:522-530. [18]HUANG Q,HUANG P,LI H,et al.A more efficient public-key authenticated encryption scheme with keyword search[J].Journal of Systems Architecture,2023,137:102839. [19]FAN K,CHEN Q,SU R,et al.MSIAP:A dynamic searchable encryption for privacy-protection on smart grid with cloud-edge-end[J].IEEE Transactions on Cloud Computing,2021,11(2):1170-1181. [20]ZHANG W,ZHANG Z,XIONG H,et al.PHAS-HEKR-CP-ABE:partially policy-hidden CP-ABE with highly efficient key revocation incloud data sharing system[J].Journal of Ambient Intelligence and Humanized Computing,2022,13(4):613-627. [21]LUO F C,AL-KUWARI S,WANG H Y,et al.Revocable attri-bute-based encryption from standard lattices[J].Computer Standards & Interfaces,2023,84:103698. [22]LIU J,LI Y,SUN R,et al.EMK-ABSE:Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination[J].IEEE Internet of Things Journal,2022,9(19):18650-18662. [23]LI C,LI J,ZHANG K,et al.Verifiable cloud-based data publish-subscribe service with hidden access policy[J].IEEE Transactions on Cloud Computing,2023,11(4):3737-3749. [24]HUANG B H,HUANG P R,ZHAO W H,et al.Multi-keyword searchable encryption scheme upporting attribute revocation in cloud storage[J].Computer Engineering,2021,47(11):29-36. [25]NIU S F,SONG M,FANG L Z,et al.Cloud storage data sharing based on attribute encryption in smart healthcare[J].Journal of Electronics & Information Technology,2022,44(1):107-117. [26]CHASE M.Multi-authority attribute based encryption[C]//Theory of Cryptography:4th Theory of Cryptography Confe-rence.Berlin:Springer,2007:515-534. [27]LEWKO A,WATERS B.Decentralizing attribute-based encryption[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2011:568-588. [28]CUI J,BIAN F,ZHONG H,et al.An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system[J].IEEE Systems Journal,2022,16(4):6569-6580. [29]YANG X,LI W,FAN K.A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain[J].Peer-to-Peer Networking and Applications,2023,16(1):107-125. [30]SASIKUMAR A,RAVI L,DEVARAJAN M,et al.Blockchain-assisted hierarchical attribute-based encryption scheme for secure information sharing in industrial internet of things[J].IEEE Access,2024,12:12586-12601. [31]CUI Y,GAO F,SHI Y,et al.An efficient attribute-based multi-keyword search scheme in encrypted keyword generation[J].IEEE Access,2020,8:99024-99036. [32]MIAO Y,MA J,LIU X,et al.Lightweight fine-grained search over encrypted data in fog computing[J].IEEE Transactions on Services Computing,2018,12(5):772-785. [33]ZHENG K,ZHOU Z,LIU J,et al.Secure Fine-Grained Multi-Keyword Ciphertext Search Supporting Cloud-Edge-End Colla-boration in IoT[J].Chinese Journal of Electronics,2025,34(1):266-281. [34]LI Y F,ZHANG G P,LIN L B,et al.An attribute-based encryption scheme supporting accountability and verifiable outsourced decryption[J].Journal of Guangdong University of Technology,2024,41(4):106-113. |
|
||