期刊文献+

用于PHR云存储的属性密文访问控制方案 被引量:4

Attribute-based Cipher-text Access Control Scheme Used in Cloud Storage of PHR
下载PDF
导出
摘要 为适应在云环境下外包个人健康记录的安全需求,文章提出一个用于个人健康记录云存储的属性密文访问控制方案。在密文策略属性基加密和对称加密算法(如AES等)的基础上,根据个人健康记录数据服务存在层级用户的特点,结合层级访问控制机制及用户访问目的优化密文策略属性基加密的访问结构,使得访问控制策略和密钥管理过程更加简洁;同时结合代理重加密技术和懒惰重加密由云服务提供商实现权限撤销,以便减轻数据拥有者的计算负荷。 This paper proposes a cryptographic access control scheme based on attribute in cloud storage for PHR .The symmetric crypto system(such as AES) is used to encrypt the original data by the Data Owner ,and the cipher-text attribute-based encryption algorithm is used to encrypt the symmetric key. According that the service of PHR Data has hierarchical users, purpose of accessing to PHR and hierarchical access control mechanism are combined to construct simple and efficient access tree of CP-ABE, while simplifying the procedure of key management. By utilizing proxy re-encryption and lazy re-encryption, privileges are revoked by the cloud service provider, which can largely reduce computation tasks of DO.
出处 《信息网络安全》 2014年第5期15-20,共6页 Netinfo Security
基金 国家自然科学基金[61075022] 福建省科技厅重点资助项目[2012H0025]
关键词 云存储 基于属性的加密 PHR访问控制 重加密 CP—ABE算法 cloud storage attribute-based encryption PHR access control re-encryption CP-ABE algorithm
  • 相关文献

参考文献1

二级参考文献14

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199. 被引量:1
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53. 被引量:1
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229. 被引量:1
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473. 被引量:1
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98. 被引量:1
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334. 被引量:1
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286. 被引量:1
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265. 被引量:1
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112. 被引量:1
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270. 被引量:1

共引文献33

同被引文献26

  • 1张琼瑶,黄基,李倩文,林兰.基于人工智能的大数据治理平台实践与探索[J].中国数字医学,2021,16(10):31-36. 被引量:16
  • 2张琼瑶,王晟,陈礼团.智能语音技术在门诊电子病历中的应用实践[J].中国数字医学,2021,16(8):12-16. 被引量:6
  • 3SHAMIR A. Identity-based Cryptosystems and Signature Schemes[EB/OL]. http://xueshu.baidu.com/s?wd=pape ruri%3A%28b3c4ef36 lf1358c0814a5f7e50d77db 1%29&fi lter=sc_long sign&tn=SE_xueshusource 2kduw22v&sc_ vurl=http%3A%2F%2Flink.springer.com%2F 10.1007%2F3-540- 39568-7_5&ie=utf-8, 2015-11-20. 被引量:1
  • 4SAHAI A, WATERS B. Fuzzy Identity Based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer-Verlag, 2005: 457-473. 被引量:1
  • 5GOYAL V, PANDEY O, SAHAI A, et al. Attribute Based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. 13th ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, VA, USA. New York: ACM, 2006: 89-98. 被引量:1
  • 6BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Oakland, Califormia, USA. New |ersey: IEEE, 2007: 321-334. 被引量:1
  • 7DAMIANI E, VIMEI~CATI S D C D, FORESTI S, et al. Selective Data Encryption in Outsourced Dynamic Environments[J]. Electronic Notes in Theoretical Computer Science, 2007, 168(1): 127-142. 被引量:1
  • 8HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Computer Research and Development, 2010, 47(zl): 259-265. 被引量:1
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 10洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79

引证文献4

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部