期刊文献+

云计算中基于密文策略属性基加密的数据访问控制协议 被引量:8

Data Access Control Protocol for the Cloud Computing based on Ciphertext-policy Attribute based Encryption(CP-ABE)
下载PDF
导出
摘要 云计算提供一种新兴的数据交互模式,实现了用户数据的远程存储、共享和计算。由于云计算的系统复杂性、网络开放性、资源集中性以及数据敏感性等特点,使得用户与云服务器的交互过程面临着严峻的安全威胁,成为云计算安全领域亟待解决的关键问题。文章首先介绍了云计算系统的系统组件、信任模型和攻击模型,针对云计算系统中的数据安全访问问题,提出了基于密文策略属性基加密的访问控制协议。该协议利用切比雪夫映射的半群特性实现了用户身份的合法性认证,并设计轻量级的属性加密算法实现用户数据的可靠性授权。同时,该协议主要引入身份认证、访问控制和前向安全性机制,实现用户身份真实性认证和数据可靠性访问。通过协议存储需求分析,表明该协议在数据属性集和密钥存储方面具有固定的存储空间需求,避免海量数据交互中用户存储空间的线性增长。通过分析,表明该协议具有较强的可靠性、灵活性和扩展性,适应于云环境中大规模数据交互的应用场景。 Cloud computing provides an emerging data interactive paradigm, and realizes users’ data remote storage, sharing and computing. Due to the system complexity, network openness, resource concentration, and data sensitivity, the process of the user accessing the cloud server is suffering from severe security threats, which make that the cloud data protection becomes an important issue. This work first introduces the system components, trust model, and attack model, and proposes a ciphertext-policy attribute based encryption (CP-ABE) based data access control protocol to achieve data protection. The proposed protocol applies the semi-group property of Chebyshev chaotic map for authentication, and adopts lightweight CP-ABE scheme for authorization. Meanwhile, the security mechanisms including authentication, access control, and forward security are applied to achieve user identification and data access control. According to the storage requirement analysis, the protocol owns fixed storage requirements in the attribute set and key, avoiding the linear growth of massive data interaction. It turns out that the protocol is secure, reliable and flexible for the large-scale data interactions in the cloud environments.
出处 《信息网络安全》 2014年第7期57-60,共4页 Netinfo Security
基金 国家科技支撑项目[2012BAH38B04 2012BAH38B04] 国家高科技研究发展计划[2012AA013002]
关键词 云计算 大数据 密文策略属性基加密 访问控制 cloud computing big data CP-ABE access control
  • 相关文献

参考文献12

  • 1Liu H. Big Data Drives Cloud Adoption in Enterprise[J].IEEE Internet Computing,2013,(04):68-71. 被引量:1
  • 2王伟,高能,江丽娜.云计算安全需求分析研究[J].信息网络安全,2012(8):75-78. 被引量:30
  • 3Moreno-Vozmediano R,Montero R S,Llorente I M. Key Chal enges in Cloud Computing to Enable the Future Internet of Services[J].IEEE Internet Computing,2013,(04):18-25. 被引量:1
  • 4李玮.云计算安全问题研究与探讨[J].电信工程技术与标准化,2012,25(4):44-49. 被引量:14
  • 5Liu X F,Zhang Y Q,Wang B Y. Mona:Secure Multi-owner Data Sharing for Dynamic Groups in the Cloud[J].IEEE Transactions on Paral el and Distributed Systems,2013,(06):1182-1191. 被引量:1
  • 6马强,艾中良.面向云计算环境的访问控制模型[J].计算机工程与设计,2012,33(12):4487-4492. 被引量:13
  • 7Nabeel M,Shang N. Privacy Preserving Policy Based Content Sharing in Public Clouds[J].IEEE Transactions on Knowledge and Data Engineering,2013,(11):2602-2614. 被引量:1
  • 8Yang K,Jia X H. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing[J].IEEE Transactions on Paral el and Distributed Systems,2013,(09):1717-1726. 被引量:1
  • 9Wang Q,Wang C,Ren K. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J].IEEE Transactions on Paral el and Distributed Systems,2011,(05):847-859. 被引量:1
  • 10冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1069

二级参考文献51

  • 1韩若飞,汪厚祥.基于任务-角色的访问控制模型研究[J].计算机工程与设计,2007,28(4):800-802. 被引量:33
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3王庆波,金滓,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2009. 被引量:80
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1131

同被引文献73

引证文献8

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部