期刊文献+

高效可撤销的雾协同云访问控制方案

Efficient and Revocable Fog-Assisted Cloud Access Control Scheme
下载PDF
导出
摘要 密文策略属性加密技术在实现基于云存储的物联网系统中数据细粒度访问控制的同时,也带来了用户与属性的撤销问题。然而,在现有的访问控制方案中,基于时间的方案往往撤销并不即时,基于第三方的方案通常需要大量重加密密文,效率较低且开销较大。为此,基于RSA密钥管理机制提出了一种高效的支持用户与属性即时撤销的访问控制方案,固定了密钥与密文的长度,借助雾节点实现了用户撤销,同时将部分加解密工作从用户端卸载到临近的雾节点,降低了用户端的计算负担。基于aMSE-DDH假设的安全性分析结果表明,方案能够抵抗选择密文攻击。通过理论分析和实验仿真表明,所提方案能够为用户属性变更频繁且资源有限的应用场景提供高效的访问控制。 Ciphertext-policy attribute-based encryption not only realizes the fine-grained access control of data in IoT system based on cloud storage,but also brings the problem of user and attribute revocation.However,in the existing access control schemes,the time-based schemes are difficult to achieve immediate revocation,and the third-party-based schemes usually require a large number of re-encrypted ciphertexts,the efficiency is low and the cost is large.Therefore,an efficient access control scheme supports immediate revocation of user and attribute based on RSA key management mechanism is proposed.The length of the keys and ciphertexts are fixed.With the help of fog nodes,user revocation is realized.At the same time,part of the encryption and decryption work is unloaded from the client to the nearby fog node,which reduces the computing burden of the client.The results of security analysis based on aMSE-DDH hypothesis show that the scheme can resist chosen-ciphertext attack.Theoretical analysis and experiments prove that the proposed scheme can provide efficient access control for application scenarios with frequent user and attribute changes and limited resources.
作者 孙枭 王峥 李玲 SUN Xiao;WANG Zheng;LI Ling(College of Information and Computer,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China)
出处 《计算机工程与应用》 CSCD 北大核心 2022年第13期112-118,共7页 Computer Engineering and Applications
基金 国家自然科学基金(61872261)。
关键词 雾计算 访问控制 用户与属性撤销 密钥与密文定长 外包 fog computing access control user and attribute revocation constant-size keys and ciphertexts outsourcing
  • 相关文献

参考文献5

二级参考文献43

  • 1Sahai A, Waters B. Fuzzy identity-based eneryption [G] //LNCS 3494: Proc of EUROCRYPT'05. Berlin.. Springer, 2005 : 457-473.
  • 2Cheung L, Newport C. Provably secure ciphertext policy ABE [C] //Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:456-465.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C] //Proc of IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2007: 321- 334.
  • 4Pirretti M, Traynor P, McDaniel P, et al. Secure attribute based systems [J]. Journal of Computer Security, 2010, 18 (5) : 799-837.
  • 5Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation [C]//Proc of the 15th ACM Conf on Computer and Commurdcations Security. New York: ACM, 2008:417-426.
  • 6Hut J, Noh D K. Attribute-based access control with efficient revocation in data outsoureing systems [J]. IEEE Trans on Parallel and Distributed Systems, 2011, Z2 (7): 1214-1221.
  • 7Wang Guojun, Liu Qin, Wu Jie. Hierarchical attribute-base encryption for fine-grained access control in cloud storage services [C] //Proc of the 17th ACM Conf on Computer and Communications Security. New York: ACM, 2010:735-737.
  • 8Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation [C] //Proc of the 5th ACM Symp on Inforraation, Computer and Communications Security. New York: ACM, 2010:261-270.
  • 9Zhu Jun, Zhang Futai, Song Xiaodong. A new certificateless proxy re-encryption scheme [C] //Proc of IEEE Int Conf on Web Information Systems and Mining. Piscataway, NJ: IEEE, 2010:53-58.
  • 10Ihraimi L, Petkovic M, Nikova S, et al. Mediated ciphertext-policy attribute based encryption and its application [G]n LNCS 5932: Proc of Information Security Applications. Berlin: Springer, 2009:309-323.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部