首页 | 本学科首页   官方微博 | 高级检索  
     

基于云雾计算的可追踪可撤销密文策略属性基加密方案
引用本文:陈家豪,殷新春. 基于云雾计算的可追踪可撤销密文策略属性基加密方案[J]. 计算机应用, 2021, 41(6): 1611-1620. DOI: 10.11772/j.issn.1001-9081.2020121955
作者姓名:陈家豪  殷新春
作者单位:1. 扬州大学 信息工程学院, 江苏 扬州 225127;2. 扬州大学广陵学院, 江苏 扬州 225128
基金项目:国家自然科学基金资助项目(61472343)。
摘    要:针对资源受限的边缘设备在属性基加密中存在的解密工作开销较大,以及缺乏有效的用户追踪与撤销的问题,提出了一种支持云雾计算的可追踪可撤销的密文策略属性基加密(CP-ABE)方案.首先,通过对雾节点的引入,使得密文存储、外包解密等工作能够放在距离用户更近的雾节点进行,这样既有效地保护了用户的隐私数据,又减少了用户的计算开销;...

关 键 词:密文策略属性基加密  云计算  雾计算  外包解密  用户可追踪  用户可撤销
收稿时间:2020-11-04
修稿时间:2021-03-29

Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
CHEN Jiahao,YIN Xinchun. Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620. DOI: 10.11772/j.issn.1001-9081.2020121955
Authors:CHEN Jiahao  YIN Xinchun
Affiliation:1. College of Information Engineering, Yangzhou University, Yangzhou Jiangsu 225127, China;2. Guangling College of Yangzhou University, Yangzhou Jiangsu 225128, China
Abstract:Focusing on the large decryption overhead of the resource limited edge devices and the lack of effective user tracking and revocation in attribute-based encryption, a traceable and revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme supporting cloud-fog computing was proposed. Firstly, through the introduction of fog nodes, the ciphertext storage and outsourcing decryption were able to be carried out on fog nodes near the users, which not only effectively protected users' private data, but also reduced users' computing overhead. Then, in response to the behaviors such as user permission changes, users intentionally or unintentionally leaking their own keys in the attribute-based encryption system, user tracking and revocation functions were added. Finally, after the identity of malicious user with the above behaviors was tracked through the algorithm, the user would be added to the revocation list, so that user's access right was cancelled. The performance analysis shows that the decryption overhead at the user end is reduced to one multiplication and one exponential operation, which can save large bandwidth and decryption time for users; at the same time, the proposed scheme supports the tracking and revocation of malicious users. Therefore, the proposed scheme is suitable for data sharing of devices with limited computing resources in cloud-fog environment.
Keywords:Ciphertext-Policy Attribute-Based Encryption (CP-ABE)  cloud computing  fog computing  outsourcing decryption  user traceable  user revocable  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号