期刊文献+

云存储环境下基于生物特征的访问控制机制研究 被引量:1

Research on Biometric Based Access Control for Cloud Storage
下载PDF
导出
摘要 云计算是一种新型的计算方式,通过网络共享方式为用户提供按需使用的计算资源。如何加强对云计算资源的访问控制,保护用户的敏感信息和密钥不受恶意服务器和外部攻击者的窃取成为重要的安全问题。生物特征在这方面具有显著优势,文中研究了如何使用生物特征实现云存储数据访问控制的方法。该方法结合模糊身份加密、生物特征认证和密钥隔离加密机制,加强了私钥管理的安全性。同时,当每次用户提出访问请求时,云服务器就更新对应的文件头,而该文件头只有合法用户才能够解密。 Cloud computing is an arresting emerging computing paradigm that offers users on demand network access to a large shared pool of computing resources.How to strengthen the access control of cloud computing resources and protect sensitive data along with private key confidential against malicious servers or other external attackers,have been an important security problem.Biometric possesses notable advantage in this field,and hence this paper focused on leveraging biometric identity to achieve access control in cloud.We exploited and combined techniques of fuzzy identity based encryption(FIBE),biometric measurement,and key insulated encryption which enables augmenting the security of private key management.Specifically,we based on the idea that when every time legal user or malicious one makes the request of accessing data of his interest,and the cloud severs will update the corresponding header file which only the legal user has the ability to decrypt.
出处 《计算机科学》 CSCD 北大核心 2014年第B11期250-251,267,共3页 Computer Science
关键词 云计算 访问控制 基于身份的模糊加密 密钥隔离加密 生物特征 Cloud computing Access control Fuzzy identity based encryption Key insulated encryption Biometric
  • 相关文献

参考文献9

  • 1Shamir A. Identity-Based cryptosystems and signature schemes [C] // Procedings of the Crypto 1984. volume 196 of LNCS, 1984:47-53.
  • 2Itkis G, Reyzin L. SiBIR.. Signer-base intrusion-resilient signa- tures [C] // Procedings of the Crypto 2002. volume 2442 of LNCS, 2002 : 499-514.
  • 3Dodis Y, Katz J, Xu S, et al. Key-Insulated Public-Key Crypto- systems[C]//Procedings of EUROCRYPT 2002. volume 2332 of LNCS, 2002 : 65-82.
  • 4Bellare M, Palacio. Protecting against key exposure: Strongly key-insulated eneryption with optimal threshold [ EB/OL]. [2002]http://eprint. iacr. org/2002/064.
  • 5Hanaoka, Imai. Parallel key-insulated public key encryption [C// Proeedings of the PKC 2006. volume 3958 of LNCS,2006:105-122.
  • 6Katz D, Xu Yung. Strong key-insulated signature schemes [ C ]// Procedings of the PKC 2003. volume 2567 of LNC,2003= 130-144.
  • 7Le Z,Ouyang Y, Ford J, et al. hierarchical key-insulated signa- ture scheme in the CA trust model [M] // Information Security and Cryptology. Springer, 2006.
  • 8Zhou Y, Cao Z, Chai Z. Identity based key insulated signature [C] // Procedings of the ISPEC 2006. volume 3903 of LNCS, 2006 : 226-234.
  • 9Sahai A,Waters 13. Fuzzy Identity Based Encryption [C]//Pro- ceedings of EUROCRYPT 2005. volume 3494 o{ LNCS, 2005: 457-473.

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部