计算机科学 ›› 2015, Vol. 42 ›› Issue (7): 210-215.doi: 10.11896/j.issn.1002-137X.2015.07.046
张柄虹,张串绒,焦和平,张欣威
ZHANG Bing-hong, ZHANG Chuan-rong, JIAO He-ping and ZHANG Xin-wei
摘要: 针对云存储服务中数据用户权限撤销粒度较粗及现有方案密钥分发计算量大等问题,基于双系统加密的思想,在合数阶双线性群上提出了一种新的细粒度权限撤销的安全云存储模型。数据拥有者同时也作为属性分发机构,保证了对自身数据的绝对控制,确保了在云服务商不可信情况下开放环境中的云端存储数据的安全。从模型架构和属性密钥分发两个方面对模型进行了研究,并用严格的数学方法证明了本方案是适应性安全的。云存储模型的数据访问策略根据实际需要可灵活设置,适用于云存储等开放式环境。
[1] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,0(1):136-145 Fu Ying-xun,Luo Sheng-mei,Shu Ji-wu.Survey of Secure Cloud Storage System and Key Technologies[J].Journal of Computer Research and Development,2013,0(1):136-145 [2] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Cramer R,ed.Advances in Cryptology-EUROCRYTP 2005:24th Annual International Conference on the Tehroy and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2005:457-473 [3] 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,2(6):1299-1315 Su Jin-shu,Cao Dan,Wang Xiao-feng,et al.Attribute-Based Encryption Schemes[J].Journal of Software,2011,2(6):1299-1315 [4] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.Alexandria,Virginia,USA,2006:89-98 [5] Lin Huang,Cao Zhen-fu,Liang Xiao-hui,et al.Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority[J].Information Sciences,2010,0(13):2618-2632 [6] Chase M.Multi-authority attribute based encryption[C]∥Theo-ry of Cryptography:Proceedings of 4th Theory of Cryptography Conference.Springer Berlin Heidelberg,2007:515-534 [7] Müller S,Katzenbeisser S,Eckert C.Distributed attributed-based encryption[M]∥Information Security and Cryptology(ICISC 2008).Springer Berlin Heidelberg,2009:20-36 [8] Lewko A,Okamoto T,Sahai A,et al.Fully Secure Functional Encryption:Attribute-Based Encryption and (Hierarchical) Inner Product Encryption[C]∥Advances in Cryptology-EUROCRYPT 2010:Proceedings of 29th Annual International Confe-rence on the Theory and Applications of Cryptographic Techniques.Springer,2010:62-91 [9] Waters B.Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions[C]∥Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology.Springer-Verlag,2009:619-636 [10] 王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,3(10):2805-2816 Wang Peng-pian,Feng Deng-guo,Zhang Li-wu.CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J].Journal of Software,2012,3(10):2805-2816 [11] Beimel A.Secure schemes for secret sharing and key distribution [D].Haifa:Israel Institute of Technology,1996 [12] Boneh D,Goh E J,Nissim K.Evaluating 2-DNF formulas on ciphertexts[C]∥Proceedings of the Second International Confe-rence on Theory of Cryptography.Springer-Verlag,2005:325-341 [13] Gentry C,Waters B.Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)[C]∥Advances in Cryptology-EUROCRYPT 2009:Proceedings of 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,2009:171-188 [14] Minowa T,Takahashi T.Secure distributed storage for bulk data[C]∥Neural Information Processing:Proceedings of 19th International Conference(ICONIP 2012).Springer Berlin Heidelberg,2012:566-575 [15] 吴胜艳,许力,林昌露.基于门限属性加密的安全分布式云存储模型[J].计算机应用,2013,3(7):1880-1884 Wu Sheng-yan,Xu Li,Lin Chang-lu.Secure and distributed cloud storage model from threshold attribute-based encryption[J].Journal of Computer Applications,2013,3(7):1880-1884 |
No related articles found! |
|