期刊文献+

云存储环境下属性基加密综述 被引量:12

Survey of attribute-based encryption in cloud storage environment
在线阅读 下载PDF
导出
摘要 属性基加密作为一种新型的密码方案,将用户私钥和密文与属性相关联,为解决云存储环境下数据安全共享、细粒度访问控制和安全存储等问题提供了一种解决思路。在对密钥策略属性基加密、密文策略属性基加密和混合策略属性基加密深入研究后,根据不同的功能扩展,针对隐藏访问结构、多授权机构、复杂计算安全外包、可搜索加密机制、属性撤销、叛徒追踪等重点难点问题进行了深入探讨研究。最后总结了现有研究工作的不足,并指出了未来的研究方向。 As a new type of cryptography scheme,attribute-based encryption(ABE)associates the ciphertext and user’s secret key with attributes,and provides a solution for the security sharing,fine-grained access control and security storage of data in cloud storage environment.Based on the study of key-policy ABE,ciphertext-policy ABE and dual-policy ABE,according to the different function expansion,this paper elaborated the related works of ABE,including hidden access structure,multi-authorities,security outsourcing of complex computing,searchable encryption mechanism,attribute revocation,traitor tracing.Finally,this paper summarized the shortcomings of existing works and pointed out the future research directions.
作者 赵志远 王建华 朱智强 孙磊 Zhao Zhiyuan;Wang Jianhua;Zhu Zhiqiang;Sun Lei(Information Engineering University,Zhengzhou 450001,China;Electronic Technology Institute of Air Force,Beijing 100195,China;Zhengzhou Xinda Institute of Advanced Technology,Zhengzhou 450001,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第4期961-968,973,共9页 Application Research of Computers
基金 国家重点研发计划资助项目(2016YFB0501900) 国家"973"计划资助项目(2013CB338000)
关键词 云计算 属性基加密 访问结构 细粒度访问控制 cloud computing attribute-based encryption access structure fine-grained access control
  • 相关文献

参考文献8

二级参考文献145

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1203

同被引文献110

引证文献12

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部