首页 | 本学科首页   官方微博 | 高级检索  
     

支持策略隐藏的加密云存储访问控制机制
引用本文:雷蕾,蔡权伟,荆继武,林璟锵,王展,陈波.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450.
作者姓名:雷蕾  蔡权伟  荆继武  林璟锵  王展  陈波
作者单位:中国科学院信息工程研究所,北京 100093;中国科学院数据与通信保护研究教育中心,北京 100093;中国科学院大学,北京 100049,中国科学院信息工程研究所,北京 100093;中国科学院数据与通信保护研究教育中心,北京 100093,中国科学院信息工程研究所,北京 100093;中国科学院数据与通信保护研究教育中心,北京 100093,中国科学院信息工程研究所,北京 100093;中国科学院数据与通信保护研究教育中心,北京 100093,中国科学院信息工程研究所,北京 100093;中国科学院数据与通信保护研究教育中心,北京 100093,宾州州立大学帕克分校信息科学与技术学院,宾州16802,美国
基金项目:国家重点基础研究发展计划(973) (2014CB340603); 国家高技术研究发展计划(863)(2013AA01A214); 中国科学院战略性先导专项(XDA06010702).
摘    要:使用密码技术对云存储数据实施机密性保护和访问控制,是当前云计算安全研究的重要内容.选择加密(Selective Encryption)技术根据访问控制策略产生密钥推导图来分发密钥,在保证云存储数据机密性和细粒度访问控制的前提下,具有简化文件存储加密、系统密钥量少的优势.然而,已有选择加密方案需要完全或部分地公开访问控制策略,以用于密钥推导;该信息反映了用户/文件之间的授权访问关系,泄露用户隐私.基于现有的研究工作,本文提出了一个新的访问控制策略隐藏机制,在支持加密云存储数据的细粒度访问控制和高效密钥分发的前提下,能更好地隐藏访问控制策略信息;而且在密钥获取计算速度上有明显优势.

关 键 词:云存储  访问控制  策略隐藏  选择加密  密钥分发
收稿时间:2015/8/15 0:00:00
修稿时间:2015/10/9 0:00:00

Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding
LEI Lei,CAI Quan-Wei,JING Ji-Wu,LIN Jing-Qiang,WANG Zhan and CHEN Bo.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J].Journal of Software,2016,27(6):1432-1450.
Authors:LEI Lei  CAI Quan-Wei  JING Ji-Wu  LIN Jing-Qiang  WANG Zhan and CHEN Bo
Affiliation:Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;Data Assurance and Communication Security Research Center, The Chinese Academy of Sciences, Beijing 100093, China;University of Chinese Academy of Sciences, Beijing 100049, China,Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;Data Assurance and Communication Security Research Center, The Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;Data Assurance and Communication Security Research Center, The Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;Data Assurance and Communication Security Research Center, The Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;Data Assurance and Communication Security Research Center, The Chinese Academy of Sciences, Beijing 100093, China and College of Information Sciences and Technology, The Pennsylvania State University, University Park, USA
Abstract:Enforcing access controls on cloud storage by cryptography is an important topic of cloud security. Based on access control policies, selective encryption builds key derivation graphs to distribute symmetric keys among users. Selective encryption can ensure the confidentiality and fine-grained access control of cloud storage data, while simplifying data encryption procedure and reducing the total number of keys. However, the existing selective encryption solutions have to fully or at least partially disclose the access control policies. This policy information unfortunately, is usually related to the authorization relation between users and files, leading to privacy leakage. Our work significantly improves the existing policy-hiding schemes (of selective encryption) with much less privacy leakage and much faster key derivation, while supporting fine-grained access control on encrypted cloud storage.
Keywords:cloud storage  access control  policy hiding  selective encryption  key distribution
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号