期刊文献+

基于可截取签名和属性加密的云存储访问控制方案 被引量:7

An access control scheme in cloud storage based on content extraction signature and attribute encryption
下载PDF
导出
摘要 现有的云存储访问控制方案只能根据用户属性的不同发送不同的消息,因而消息利用率不高。针对这一缺陷,首先设计了一个基于ElGamal的可截取签名方案,然后基于该可截取签名方案结合属性加密体制提出了一种新的云存储访问控制方案。新方案在实现数据加密的同时,提供了细粒度的访问控制,将符合属性的子消息发送给相应的用户,提高了消息的利用率,具有更强的应用性。 Existing access control schemes in cloud storage can only send different messages according to users' attributes, which leads to low utilization rate. In order to overcome this shortcoming, firstly, we design a content extraction signature scheme based on ElGamal; secondly, we propose a new access control scheme in cloud storage based on content extraction signature and attribute encryption system. The proposed scheme combines access control with attribute encryption and realizes fine-grained access control at the same time. The scheme can send sub-messages to corresponding users depending on users' attributes; it improves the utilization of the message and has better applicability.
出处 《计算机工程与科学》 CSCD 北大核心 2015年第2期238-244,共7页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61163038 61262057) 甘肃省自然科学基金资助项目(1308RJYA039) 兰州市科技计划项目(2013-4-22) 甘肃省高等学校科研项目(2013A-014) 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-12-32) 西北师范大学青年教师基金资助项目(NWNU-LKQN-13-12)
关键词 云存储 访问控制 可截取签名 属性加密 离散对数问题 cloud storage access control content extraction signature attribute encryption discrete logarithm problem
  • 相关文献

参考文献2

二级参考文献14

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展.2010.
  • 4Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM SIGACT News ,2009,40(2) :81-86.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryptionfor fine-grained access control of encrypted data[DB/OL]. [2012-01-09]. http://dl, acre. org/ci- ration, c fro? id= 1180418.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ DB/OL ]. [ 2012-02-11 ]. http://ieeexplore, ieee. org/xpls/abs_ all. jsp? at- number=4223236.
  • 7Fu K. Group Sharing and Random Access in Crypto- graphic Storage File Systems [D]. Massachusetts: MIT,1999.
  • 8Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[DB/OL]. [2012-02- 28]. http://www, springerlink, com/content/b730- 83628wvr1865.
  • 9WANG Q,WANG C,REN K.Enabling public auditability and datadynamics for storage security in cloud computing. IEEE Transac-tions on Parallel and Distributed Systems . 2011
  • 10GOYAL V,PANDEY O,SAHAI A,et al.Attribute based encryptionfor fine-grained access control of encrypted data. ACM conferenceon Computer and Communications Security . 2006

共引文献64

同被引文献17

引证文献7

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部