期刊文献+

基于特征表达式的数据访问控制技术研究

Research on data access control based on characteristic expression
下载PDF
导出
摘要 在传感网的一些关键的应用中,数据访问控制是必不可少的,因为非法访问敏感的数据可以会导致灾难性的后果或是法律所禁止的.提出一种基于数据特征表达式的访问控制机制,数据按照特征进行划分,并将加密密钥与某种特征表达式关联.只有匹配特征表达式的密钥才能解密数据.节点利用密钥相关的访问控制策略判断用户查询的合法性以及撤销恶意的用户.实验结果表明方案具有较好的抗攻击性和扩展性,实现对数据精细地访问控制. In some critical applications of wireless sensor networks,data access control is a necessary service,because illegal access to sensitive data will lead to disastrous consequences or forbidden by the law.A characteristic expression based data access control mechanism is proposed by exploring the inherent nature of sensor data,and correlate the encryption key to specific characteristic expression,only the key matches the expression can decrypt the corresponding data.Senor nodes use key related access control strategy to verify the legitimacy of user and revoke the malicious users.Performance results demonstrate that the proposed scheme is resilience to various attacks,and achieves a fine grained data access control.
出处 《闽江学院学报》 2013年第2期92-97,共6页 Journal of Minjiang University
基金 福建省教育厅科技规划项目(JA05314) 福建省重点学科"计算机应用技术"基金
关键词 数据安全 访问控制 特征表达 无线传感网 data security access control characteristic expression wireless sensor networks
  • 相关文献

参考文献9

  • 1蔚赵春,周水庚,关佶红.无线传感器网络中数据存储与访问研究进展[J].电子学报,2008,36(10):2001-2010. 被引量:33
  • 2Boneh D, Gentry C, Waters B, Collusion resistant broadcast eneryption with short ciphertexts and private keys[ C ]//Proceedings of 25th IEEE International conference on Advances in Cryptology. Santa Barbara: Springer,2005:258 -275.
  • 3Geyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[ C ]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York : ACM,2006:89 - 98.
  • 4ORION. Ocean observatories initiative project dedicated to delivering data [ EB/OL ]. (2011 - 12 - 14 ) [ 2012 - 11 - 05 ]. http :// www. oceanobservatories, org/2011/ocean-observatories-initiative-project-dedicated-to-delivering-data/.
  • 5Purnima R. Instantaneous passive and active detection, localization and monitoring of marine mammals over long ranges [ EB/OL ]. (2011 - 11 - 12 ) [ 2012 - 03 - 04 ]. http ://www. nopp. org/funded-projects/fy2011-projects/topic-l-marine-mammal-detection- and-monitoring/.
  • 6IOOS. Animal telemetry programs/projects in North America [ EB/OL ]. (2012 - 03 - 02) [ 2012 - 12 - 04 ]. http ://www. ioos. no- aa. gov/observing/animal_telemetry/welcome, html.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[ C ]//Proceedings of IEEE Symposium on Security and Privacy, 2007:321 - 334.
  • 8Cheung L, Newport C. Provably secure ciphertext policy ABE[ C]//Proceedings of 14th International Conference on Computer and Communications Security, 2007:456 -465.
  • 9Junbeom H, Chanil P, Seong O H. Fine-grained user control in ciphertext-policy attribute-based encryption [ J ]. Security and Communication Networks, 2012, 5 (3) : 253 - 261.

二级参考文献54

  • 1龚海刚,刘明,陈力军,谢立.DEED:一种无线传感器网络中高效节能的数据通信协议[J].电子学报,2005,33(8):1391-1396. 被引量:23
  • 2I F Akyildiz, W Su, Y Sankamsubramaniam, E Cayirci. Wireless sensor networks: a survey [J].Computer Networks, 2002, 38(4) : 393 - 422.
  • 3S Tilak, N B Abu-Ghazaleh, W Heinzelman. A taxonomy of wireless micro-sensor network models [J]. Mobile Computing and Communications Review, 2002,1 (2) : 1 - 8.
  • 4S Shenker, S Ratnasamy,B Karp,R Govindan,D Estrin.Datacentric storage in sensomets[J].ACM SIGCOMM Computer Communications Review,2003,33( 1 ) :137 - 142.
  • 5D Ganesan,B Greenstein, D Estrin,J Heidemann,R Govindan. Multi-resolution storage and search in sensor networks [J]. ACM Transactions on Storage,2005,1 (3) :277 - 315.
  • 6C Intanagonwiwat, R Govindan, D Estrin, J S Heidemann, F Silva. Directed diffusion for wireless sensor networking [ J ]. IEEE/ACM Transactions on Networking,2003,11( 1):2- 16.
  • 7S Ramasamy, B Karp, S Shenker, D Estrin, R Govindan, L Yin, F Yu. Data-centric storage in sensomets with GHT, a geographic hash table[ J]. Mobile Networks and Applications, Special Issue on Wireless Sensor Networks, 2003, 8 (4) : 427 - 442.
  • 8T M Gil, S Madden. Scoop: an adaptive indexing scheme for stored data in sensor networks[ A]. Proceedings of IEEE ICDE [ C]. Istanbul, Turkey, 2007.89 - 102.
  • 9X Li, Y J Kim, R Govindan, W Hong. Multi-dimensional range queries in sensor networks [ A ]. Proceedings of ACM SENSYS[ C]. Los Angeles, California, USA, 2003.63 - 75.
  • 10D Ganesan, D Estrin, J Heidemann. DIMENSIONS: Why do we need a new data handling architecture for sensor networks?[J].Computer Communication Review, 2003,33 ( 1 ): 143 - 148.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部