首页 | 本学科首页   官方微博 | 高级检索  
     

基于属性代理重加密技术与可容错机制相结合的数据检索方案
引用本文:刘新宇,李浪,肖斌斌.基于属性代理重加密技术与可容错机制相结合的数据检索方案[J].计算机科学,2018,45(7):162-166, 196.
作者姓名:刘新宇  李浪  肖斌斌
作者单位:衡阳师范学院计算机科学与技术学院 湖南 衡阳421002,衡阳师范学院计算机科学与技术学院 湖南 衡阳421002,暨南大学信息科学技术学院 广州510632
基金项目:本文受国家自然科学基金资助
摘    要:针对云服务器上用户信息的隐私问题,提出一种基于属性代理重加密技术与容错机制相结合的方案。该方案将用户存储的数据分为文件和文件的安全索引,将其分别进行加密后存储在不同的云服务器上。首先,利用倒排序结构构造文件的安全索引,并使用模糊提取器对关键字进行预处理,用户可以通过该安全索引进行容错的多关键字搜索;其次,设置访问控制树对解密密钥重加密,实现权限管理,即实现数据在云端的有效共享;最后,通过Complex Triple Diffle-Hellman难题证明该方案生成的系统主密钥是安全的,因此该方案在云环境下也是安全的。与已有的方案的对比分析表明,该方案可减少密钥重加密、解密 等的计算量,同时通过加入容错处理机制提高了数据检索的效率。

关 键 词:重加密技术  容错机制  多关键字  访问控制树  模糊提取器
收稿时间:2017/2/8 0:00:00
修稿时间:2017/4/10 0:00:00

Attribute-based Proxy Re-encryption Technology and Fault-tolerant Mechanism Based Data Retrieval Scheme
LIU Xin-yu,LI Lang and XIAO Bing-bing.Attribute-based Proxy Re-encryption Technology and Fault-tolerant Mechanism Based Data Retrieval Scheme[J].Computer Science,2018,45(7):162-166, 196.
Authors:LIU Xin-yu  LI Lang and XIAO Bing-bing
Affiliation:College of Computer Science and Technology,Hengyang Normal University,Hengyang,Hunan 421002,China,College of Computer Science and Technology,Hengyang Normal University,Hengyang,Hunan 421002,China and College of Information Science and Technology,Jinan University,Guangzhou 510632,China
Abstract:Aiming at the privacy of user information stored in the cloud server problem,a scheme based on property broker re-encryption and fault-tolerant mechanism was proposed.This scheme mainly divides the data stored by users into files and the security index of files,encrypts them separately and then stores them on different cloud servers.Firstly,the security index of file is constructed by using the inverted structure and the keywords are preprocessed by using the fuzzy extractor,so the users can search multi-keywords with fault tolerance through the security index.Secondly,the access control tree is used for re-encryption of decryption key to realize right management,namely,the effective sharing of data in cloud.Finally,the scheme is proved to be secure in cloud environment through Complex Triple Diffie-Hellman problem,proving that the system master key generated by this scheme is secure.Compared with the existing schemes,it is shown that the scheme can reduce the computational complexity of key re-encryption and decryption,and the fault-tolerant mechanism improves the efficiency of data retrieval.
Keywords:Re-encryption technology  Fault-tolerant mechanism  Multiple keywords  Access control tree  Fuzzy extractors
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号