计算机科学 ›› 2013, Vol. 40 ›› Issue (8): 38-42.

• 网络与通信 • 上一篇    下一篇

云存储中基于SKP-ABE的访问控制方法

刘鸿,李谢华,杨波   

  1. 湖南大学信息科学与工程学院 长沙410082;湖南大学信息科学与工程学院 长沙410082;湖南大学信息科学与工程学院 长沙410082
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受中国博士后科学基金(20110490193),中央高校基本科研业务费项目资助

SKP-ABE Based Access Control Method in Cloud Storage

LIU Hong,LI Xie-hua and YANG Bo   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对云存储中的密文访问控制,提出一种基于SKP-ABE的高效访问控制方法EACS。该方法在保持密文信息保密的前提下,将部分私钥组件和相关密文组件的重加密过程转移到云端,以大大降低数据属主的计算代价;并结合RMIA进行用户权限撤销,以实现高效、灵活的密文访问控制。

关键词: 云存储,SKP-ABE,EACS,RMIA,用户权限撤销

Abstract: For protection of data in cloud storage server,this paper proposed a simple KP-ABE to make the access control more flexible and efficient.An efficient access control scheme was proposed for transferring some of the re-encryption and key module to cloud storage server so that the computational expenses will be reduced dramatically.Moreover,this paper used the strategy of revoke minimum influence attribute,which will only influence limited attributes and make attribute revocation easily.

Key words: Cloud storage,SKP-ABE,EACS,RMIA,User revocation

[1] Cachin C,Keidar I,Shraer A.Trusting the cloud [J].ACM SIGACT News,2009,40(2):81-86
[2] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Pro-ceedings of the Advances in Cryptology(EUROCRYPT).Aarhus,Denmark,Berlin,Heidelberg:Springer-Verlag,2005:457-473
[3] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security(CCS ’06).New York,NY,USA:ACM,2006:89-98
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of the 2007IEEE Sympo-sium on Security and Privacy.Oakland,California,USA,Wa-shington,DC,USA:IEEE Computer Society,2007:321-334
[5] Yu S,Wang C,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥Proceedings of the 5th International Symposium on Information,Computer and Communications Security(ASIACCS 2010).New York,NY,USA:ACM,2010:261-270
[6] Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing [A]∥Procee-dings of IEEE INFOCOM 2010[C].San Diego,CA,2010
[7] 洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(增刊):259-265
[8] 吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011(09)
[9] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方案[J].通信学报,2011(07)
[10] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proc.of EUROCRYPT ’98.1998

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!