Method of secure, scalable, and fine-grained data access control with efficient revocation in untrus

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:ontheroad2005
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Cloud computing is a developing computing paradigm in which resources of the computing infrastructure are provided as services over the network. Hopeful as it is, this paradigm also brings new challenges for data security and encryption storage when date owner stores sensitive data for sharing with untrusted cloud servers. When it comes to fine-grained data and scalable access control, a huge computation for key distribution and data management is required. In this article, we achieved this goal by exploiting and uniquely combining techniques of ciphertext-policy attribute-based encryption(CP-ABE), linear secret sharing schemes(LSSS), and counter(CTR) mode encryption. The proposed scheme is highly efficient by conducting the revocation on attribute level rather than on user level. The goals of data confidentiality and no collusion attack(even the cloud servers(CS) collude with users), as well as ones of fine-grainedness and scalability, are also achieved in our access structure. Cloud computing is a developing computing paradigm in which resources of the computing infrastructure are provided as services over the network. Hopeful as it is, this paradigm also brings new challenges for data security and encryption storage when date owner stores sensitive data for sharing with untrusted cloud servers. When it comes to fine-grained data and scalable access control, a huge computation for key distribution and data management is required. In this article, we achieved this goal by exploiting and uniquely combining techniques of ciphertext-policy attribute-based encryption ( CP-ABE), linear secret sharing schemes (LSSS), and counter (CTR) mode encryption. The proposed scheme is highly efficient by conducting the revocation on attribute level rather than on user level. The goals of data confidentiality and no collusion attack ( even the cloud servers (CS) collude with users), as well as fine-grainedness and scalability, are also achieved in our access structure.
其他文献
相亲时,他为什么一直在把玩手机?他为什么边说话边摸自己的鼻子?他对我有没有兴趣?我还要花多少时间和他谈下去?他有多大的诚意?这些问题徘徊在相亲过程中的每时每刻……    既怕表错情、耽误彼此的时间,又怕无意中放过真命天子,相亲是最讲求效率和技巧的社交,不但要展现自己最完美的一面,也要尽量收集对方的资料,短暂的会面后就要评估出他的“投资”价值,所以,他的一招一式、任何信息,你都不能放过。  人类学家
麻疹是一种以发热伴出疹症候群为主要临床表现的急性呼吸道传染病,主要是由麻疹病毒引起,多以呼吸道传播为主,具有很强的传染力[1]。我国自1965年使用小儿麻疹疫苗接种以来,
老公那么有责任心,既懂得疼人又能干,儿子也很努力,学习不用她操心,让人羡慕的淑云该是多么幸福的女人啊!可就在前不久传出一个让人意外的消息:淑云有了外遇,并且主动提出离
去年,免疫学家终于实现了鉴定T细胞识别抗原所需的受体分子的宿愿。这种受体分子的结构对于理解T-细胞如何执行其免疫功能,包括杀伤作为异物而识别的细胞及调节其它免疫细胞
地面爆破器材库照明为安全起见,往往采用探照灯投光照明。但爆破器材转入地下洞库储存后,因洞库长而拐弯,用上述方法解决照明就难以达到照明要求。只有在洞内装设电灯照明才
为除去混入油中的水份,日本前不久开发了水清除机DH系列。该系列有水份吸收型和油水分离型两种,这可根据水份混入量的多少来选择使用。水份吸收型的过滤元件是把表面水凝胶
根据国家新闻出版署颁布的《关于在出版行业开展岗位培训实施持证上岗制度的规定》,要在出版行业实施持证上岗制度。该《规定》说: “从1997年开始,凡新任出版社社长,总编辑
迄今,未见马媾疫锥虫(Trypanosoma equiperdam,简称TE)感染灵长类的报告。1985年12月,笔者将传代于昆明小白鼠体内的TE充斥血,用生理盐水稀释至每高倍视野1~5条的悬液,以0.2m
海峡文艺出版社自1984年成立以来。始终坚持正确的政治方向,坚决贯彻执行党和国家的出版方针政策,努力遵循出版业发展的内在规律,积极开拓进取,取得了较好的社 Channel Lit
鉴于国人距骨测量的资料甚少,本文报导了对成都地区出土的250例成人距骨的泓量。距骨各径的均值( ±SE)如下:距骨长:男50.60±0.30mm、女47.65±0.36mm;距骨投影宽:男39.76