摘要: 针对云存储中的密文访问控制,提出一种基于SKP-ABE的高效访问控制方法EACS。该方法在保持密文信息保密的前提下,将部分私钥组件和相关密文组件的重加密过程转移到云端,以大大降低数据属主的计算代价;并结合RMIA进行用户权限撤销,以实现高效、灵活的密文访问控制。
[1] Cachin C,Keidar I,Shraer A.Trusting the cloud [J].ACM SIGACT News,2009,40(2):81-86 [2] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Pro-ceedings of the Advances in Cryptology(EUROCRYPT).Aarhus,Denmark,Berlin,Heidelberg:Springer-Verlag,2005:457-473 [3] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security(CCS ’06).New York,NY,USA:ACM,2006:89-98 [4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of the 2007IEEE Sympo-sium on Security and Privacy.Oakland,California,USA,Wa-shington,DC,USA:IEEE Computer Society,2007:321-334 [5] Yu S,Wang C,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥Proceedings of the 5th International Symposium on Information,Computer and Communications Security(ASIACCS 2010).New York,NY,USA:ACM,2010:261-270 [6] Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing [A]∥Procee-dings of IEEE INFOCOM 2010[C].San Diego,CA,2010 [7] 洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(增刊):259-265 [8] 吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011(09) [9] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方案[J].通信学报,2011(07) [10] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proc.of EUROCRYPT ’98.1998 |
No related articles found! |
|