帮助 关于我们

返回检索结果

基于属性的分布式云访问控制方案
Attribute-based Distributed Access Control Scheme in Cloud

查看参考文献11篇

文摘 云服务中现有访问控制方案对可信第三方具有强烈依赖性。针对该问题,提出一个基于属性的分布式云访问控制方案。建立云访问控制模型,采用ABE的加密树方式构造访问控制策略,并给出用户撤销及策略更新方法。安全性分析表明,该方案能够抵抗共谋攻击,具有数据保密性以及后向前向保密性。
其他语种文摘 Now existing access control scheme has the strong dependence to trusty third party in cloud.With regard to this problem,this paper proposes an access control scheme based on attribute.It designs an access control model in cloud,constructs an access control policy which adopts the way of Attribute-based Encryption(ABE) tree,and presents a method of user revocation and policy updates.Security analysis indicates that the scheme has the features of collusion-resistance,data confidentiality and backward and forward secrecy.
来源 计算机工程 ,2012,38(11):1-4 【核心库】
关键词 基于属性的加密 ; 云计算 ; 访问控制 ; 访问树 ; CP-ABE算法 ; KP-ABE算法
地址

西北师范大学数学与信息科学学院, 兰州, 730070

语种 中文
文献类型 研究性论文
ISSN 1000-3428
学科 自动化技术、计算机技术
基金 国家自然科学基金
文献收藏号 CSCD:4564945

参考文献 共 11 共1页

1.  Crampton J. On Key Assignment for Hierar-chical Access Control. Proc. of the 19th IEEE Computer Security Foundations Workshop,2006 被引 1    
2.  Damiani E. An Experimental Evaluation of Multi-key Strategies for Data Outsourcing. Proc. of SEC'07,2007 被引 1    
3.  Goyal V. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. Proc. of the 13th ACM Conf. on Computer and Communications Security,2006 被引 1    
4.  Bethencourt J. Ciphertext-policy Attribute-based Encryption. Proc. of IEEE Symposium on Security and Privacy,2007 被引 1    
5.  Chang Yancheng. Privacy Preserving Keyword Searches on Remote Encrypted Data. Proc. of ACNS'05,2005 被引 1    
6.  Malek B. Combining Attribute-based and Access Systems. Proc. of the 12th IEEE International Conference on Computational Science and Engineering,2009 被引 1    
7.  Ostrovsky R. Attribute-based Encryption with Non-monotonic Access Structures. Proc. of ACM Conf. on Computer and Communications Security,2007 被引 1    
8.  Yu Shucheng. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks,2009 被引 1    
9.  洪澄. AB-ACCS:一种云存储密文访问控制方法. 计算机研究与发展,2010,47(Z1):259-265 被引 29    
10.  Hur J. Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems. IEEE Trans. on Parallel and Distributed Systems,2011,22(7):1214-1221 被引 108    
11.  Sahai A. Fuzzy Identity Based Encryption. Proc. of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques,2005 被引 1    
引证文献 1

1 彭维平 基于信任度的跨域安全访问控制模型研究 计算机应用研究,2016,33(6):1791-1796
被引 1

显示所有1篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号