基于屬性加密的云存儲方案研究
doi: 10.11999/JEIT160064
-
1.
(解放軍信息工程大學(xué) 鄭州 450001) ②(空軍電子技術(shù)研究所 北京 100195)
基金項目:
國家高技術(shù)研究發(fā)展計劃(2012AA012704),鄭州市科技領(lǐng)軍人才項目(131PLJRC644)
Research on Cloud Storage Scheme with Attribute-based Encryption
-
1.
(PLA Information Engineering University, Zhengzhou 450001, China)
-
2.
(Electronic Technology Institute of Air Force, Beijing 100195, China)
Funds:
The National High-tech RD Program of China (2012AA012704), The Science and Technology Leading Talent Project of Zhengzhou (131PLJRC644)
-
摘要: 云存儲中往往采用屬性加密方案來實現(xiàn)細(xì)粒度的訪問控制,為了進一步保護訪問控制策略中的敏感信息,并解決授權(quán)中心單獨為用戶生成密鑰而產(chǎn)生的密鑰托管問題。該文對訪問控制策略中的屬性進行重新映射,以實現(xiàn)其隱私性。另外在密鑰生成算法中設(shè)計一個雙方計算協(xié)議,由用戶產(chǎn)生密鑰的部分組件,與授權(quán)中心共同生成密鑰以解決密鑰托管問題。最后在標(biāo)準(zhǔn)模型下對方案進行了安全證明,并進行了性能分析與實驗驗證,實驗結(jié)果表明,與已有相關(guān)方案相比,雖然為了實現(xiàn)訪問控制策略隱藏并且解決密鑰托管問題增加了額外的計算負(fù)載, 但是由于該文將大部分解密工作授權(quán)給云存儲中心來執(zhí)行,因此數(shù)據(jù)訪問者的計算負(fù)載較小。Abstract: Attribute-Based Encryption (ABE) is often used in cloud storage to achieve fine-grained access control. In order to further protect the sensitive information of access control policy and solve the key escrow caused by the authority center generating the private key for users alone. In this paper, the attributes of access control policy are remapped to achieve its privacy. Additionally, a two-party computing protocol in which the user generates partial private key component is devised to solve the problem of key escrow. At last, the security of this scheme is proved in the standard model, and the performance analysis and experiment validation are conducted, which show that although some additional computation overhead is added for achieving the privacy of access control policy and solving the problem of key escrow, the receiver in proposed scheme has smaller computation overhead compared with the existing related schemes because most of the decryption is delegated to the storage center to carry out.
-
SAHAI A and WATERS B. Fuzzy Identity-Based Encryption [M]. Heidelberg, Berlin, Springer, 2005: 457-473. doi: 10.1007 /11426639_27. YADAV U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]. 2015 IEEE International Advance Computing Conference (IACC), Bangalore, India, 2015: 6-10. doi: 10.1109/IADCC.2015.7154664. NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13. WANG H, YANG B, and WANG Y. Server aided ciphertext- policy attribute-based encryption[C]. IEEE International Conference on Advanced Information Networking Applications Workshops, Gwangju, Korea, 2015: 440-444. doi: 10.1109/WAINA.2015.11. QI L, MA J, RUI L, et al. Large universe decentralized key- policy attribute-based encryption[J]. Security Communi- cation Networks, 2015, 8(3): 501-509. WANG X, ZHANG J, SCHOOLER E M, et al. Performance evaluation of attribute-based encryption: Toward data privacy in the IoT[C]. IEEE International Conference on Communications (ICC), Sydney, Australia, 2014: 725-730. KAPADIA A, TSANG P P, and SMITH S W. Attribute- based publishing with hidden credentials and hidden policies [C]. Network and Distributed System Security Symposium, NDSS 2007, San Diego, CA, USA, 2007: 179-192. NISHIDE T, YONEYAMA K, and OHTA K. Attribute- based Encryption with Partially Hidden Encryptor-specified Access Structures[M]. Heidelberg, Berlin, Springer, 2008: 111-129. doi: 10.1007/978-3-540-68914-0_7. LAI J, DENG R H, and LI Y. Fully secure cipertext-policy hiding CP-ABE[J]. Lecture Notes in Computer Science, 2011, 6672: 24-39. 王海斌, 陳少真. 隱藏訪問結(jié)構(gòu)的基于屬性加密方案[J]. 電子與信息學(xué)報, 2012, 34(2): 457-461. WANG Haibin and CHEN Shaozhen. Attribute-based encryption with hidden access structures[J]. Journal of Electronics Information Technology, 2012, 34(2): 457-461. HUR J. Attribute-based secure data sharing with hidden policies in smart grid[J]. IEEE Transactions on Parallel Distributed Systems, 2013, 24(11): 2171-2180. doi: 10.1109/ TPDS.2012.61. 宋衍, 韓臻, 劉鳳梅, 等. 基于訪問樹的策略隱藏屬性加密方案[J]. 通信學(xué)報, 2015, 36(9): 119-126. SONG Yan, HAN Zhen, LIU Fengmei, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126. LUAN Ibraimi, QIANG Tang, PITER Hartel, et al. Efficient and Provable Secure Ciphertext-policy Attribute-Based Encryption Schemes. Information Security Practice and Experience[M]. Heidelberg, Berlin, Springer, 2009: 1-12. CHASE M and CHOW S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009: 121-130. doi: 10.1145/1653662. 1653678. YANG M, LIU F, HAN J L, et al. An efficient attribute based encryption scheme with revocation for outsourced data sharing control[C]. 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, 2011: 516-520. LIU Z, CAO Z, and WONG D. Traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 76-88. BONEH D and BOYEN X. Short signatures without random oracles[C]. Advances in Cryptology-EUROCRYPT 2004, Switzerland, 2004: 56-73. ZAVATTONI E, PEREZ L J D, MITSUNARI S, et al. Software implementation of an attribute-based encryption scheme[J]. IEEE Transactions on Computers, 2015, 64(5): 1429-1441. [19] CHEUNG L and NEWPORT C. Provably secure ciphertext policy ABE[C]. Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, USA, 2007: 456-465. doi: 10.1145/1315245.1315302. LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption[M]. Heidelberg, Berlin, Springer, 2010: 62-91. doi: 10.1007/978-3-642-13190- 5_4. BELENKIY M, CAMENISCH J, CHASE M, et al. Randomizable Proofs and Delegatable Anonymous Credentials[M]. Heidelberg, Berlin, Springer, 2009: 108-125. doi: 10.1007/978-3-642-03356-8_7. -
計量
- 文章訪問數(shù): 1449
- HTML全文瀏覽量: 144
- PDF下載量: 725
- 被引次數(shù): 0