|
基于属性的分布式云访问控制方案
Attribute-based Distributed Access Control Scheme in Cloud
查看参考文献11篇
文摘
|
云服务中现有访问控制方案对可信第三方具有强烈依赖性。针对该问题,提出一个基于属性的分布式云访问控制方案。建立云访问控制模型,采用ABE的加密树方式构造访问控制策略,并给出用户撤销及策略更新方法。安全性分析表明,该方案能够抵抗共谋攻击,具有数据保密性以及后向前向保密性。 |
其他语种文摘
|
Now existing access control scheme has the strong dependence to trusty third party in cloud.With regard to this problem,this paper proposes an access control scheme based on attribute.It designs an access control model in cloud,constructs an access control policy which adopts the way of Attribute-based Encryption(ABE) tree,and presents a method of user revocation and policy updates.Security analysis indicates that the scheme has the features of collusion-resistance,data confidentiality and backward and forward secrecy. |
来源
|
计算机工程
,2012,38(11):1-4 【核心库】
|
关键词
|
基于属性的加密
;
云计算
;
访问控制
;
访问树
;
CP-ABE算法
;
KP-ABE算法
|
地址
|
西北师范大学数学与信息科学学院, 兰州, 730070
|
语种
|
中文 |
文献类型
|
研究性论文 |
ISSN
|
1000-3428 |
学科
|
自动化技术、计算机技术 |
基金
|
国家自然科学基金
|
文献收藏号
|
CSCD:4564945
|
参考文献 共
11
共1页
|
1.
Crampton J. On Key Assignment for Hierar-chical Access Control.
Proc. of the 19th IEEE Computer Security Foundations Workshop,2006
|
CSCD被引
1
次
|
|
|
|
2.
Damiani E. An Experimental Evaluation of Multi-key Strategies for Data Outsourcing.
Proc. of SEC'07,2007
|
CSCD被引
1
次
|
|
|
|
3.
Goyal V. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data.
Proc. of the 13th ACM Conf. on Computer and Communications Security,2006
|
CSCD被引
1
次
|
|
|
|
4.
Bethencourt J. Ciphertext-policy Attribute-based Encryption.
Proc. of IEEE Symposium on Security and Privacy,2007
|
CSCD被引
1
次
|
|
|
|
5.
Chang Yancheng. Privacy Preserving Keyword Searches on Remote Encrypted Data.
Proc. of ACNS'05,2005
|
CSCD被引
1
次
|
|
|
|
6.
Malek B. Combining Attribute-based and Access Systems.
Proc. of the 12th IEEE International Conference on Computational Science and Engineering,2009
|
CSCD被引
1
次
|
|
|
|
7.
Ostrovsky R. Attribute-based Encryption with Non-monotonic Access Structures.
Proc. of ACM Conf. on Computer and Communications Security,2007
|
CSCD被引
1
次
|
|
|
|
8.
Yu Shucheng. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks,2009
|
CSCD被引
1
次
|
|
|
|
9.
洪澄. AB-ACCS:一种云存储密文访问控制方法.
计算机研究与发展,2010,47(Z1):259-265
|
CSCD被引
29
次
|
|
|
|
10.
Hur J. Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems.
IEEE Trans. on Parallel and Distributed Systems,2011,22(7):1214-1221
|
CSCD被引
113
次
|
|
|
|
11.
Sahai A. Fuzzy Identity Based Encryption.
Proc. of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques,2005
|
CSCD被引
1
次
|
|
|
|
|
|