首页 | 本学科首页   官方微博 | 高级检索  
     

云存储访问控制方案的安全性分析与改进
引用本文:王 冠,范 红,杜大海.云存储访问控制方案的安全性分析与改进[J].计算机应用,2014,34(2):373-376.
作者姓名:王 冠  范 红  杜大海
作者单位:公安部第一研究所,北京 100048
基金项目:国家发改委2012年信息安全专项
摘    要:对Tang等(TANG Y,LEE P,LUI J,et al. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing,2012,9(6):903-916)提出的一种云存储的细粒度访问控制方案进行安全性分析,发现其存在不能抵抗合谋攻击的问题,并给出了具体的攻击方法。针对该方案安全性方面的不足,利用基于属性的加密算法抗合谋攻击的特性,对使用访问树结构的密文策略加密(CP-ABE)算法进行改进,使改进后的算法能够直接运用到云存储访问控制方案中而不需要对云存储服务器进行任何修改,同时可实现细粒度的访问控制和用户数据的彻底删除。最后基于判断双向性Deffie-Hellman(DBDH)假设,证明了该方案在选择明文攻击下的安全性,并通过将方案运用到实际的云环境中进行分析后证明改进后的方案能够抵抗合谋攻击。

关 键 词:云存储  访问控制  密文策略的属性加密算法  合谋攻击  判断双向性Deffie-Hellman假设  
收稿时间:2013-08-15
修稿时间:2013-10-17

Security analysis and improvement of access control scheme for cloud storage
WANG Guan FAN Hong DU Dahai.Security analysis and improvement of access control scheme for cloud storage[J].journal of Computer Applications,2014,34(2):373-376.
Authors:WANG Guan FAN Hong DU Dahai
Affiliation:The First Research Institute of Ministry of Public Security, Beijing 100048, China
Abstract:An access control scheme for cloud storage proposed by Tang et al. (TANG Y,LEE P,LUI J,〖WTBX〗et al.〖WTBZ〗 Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing,2012,9(6):903-916) was analyzed and proved to be vulnerable to collusion attacks, and a detailed attack method was given. To address this problem of the given scheme, this paper took the advantage of the property of collusion attack resistant of the attribute based encryption algorithm and improved a ciphertext-policy attribute-based encryption (CP-ABE) algorithm which used the access tree. Then the improved algorithm could be used seamlessly into the access control and assured deletion scheme for cloud storage without changing the cloud server. Finally, the security against the chosen plaintext attack was proved under the Decision Bilinear Diffie-Hellman (DBDH) assumption, and the ability of resisting the collusion attack of the scheme was proved by analyzing a practical cloud situation.
Keywords:cloud storage                                                                                                                          access control                                                                                                                          CP-ABE algorithm                                                                                                                          collusion attack                                                                                                                          Decision Bilinear Diffie-Hellman (DBDH) assumption
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号