通信学报 ›› 2018, Vol. 39 ›› Issue (7): 39-49.doi: 10.11959/j.issn.1000-436x.2018112

• 学术论文 • 上一篇    下一篇

面向移动云的属性基密文访问控制优化方法

刘建(),鲜明,王会梅,荣宏   

  1. 国防科技大学电子科学学院,湖南 长沙 410073
  • 修回日期:2018-04-04 出版日期:2018-07-01 发布日期:2018-08-08
  • 作者简介:刘建(1986-),男,山东泰安人,博士,国防科技大学讲师,主要研究方向为通信网信息安全、云计算与大数据安全、隐私保护等。|鲜明(1970-),男,四川南充人,博士,国防科技大学研究员,主要研究方向为网络安全评估、云计算系统安全与数据安全、数据挖掘及隐私保护技术等。|王会梅(1981-),女,河北行唐人,博士,国防科技大学讲师,主要研究方向为网络安全评估、云计算与大数据安全等。|荣宏(1988-),男,山西大同人,国防科技大学博士生,主要研究方向为数据挖掘及隐私保护技术。

Optimization method for attribute-based cryptographic access control in mobile cloud computing

Jian LIU(),Ming XIAN,Huimei WANG,Hong RONG   

  1. College of Electronic Science,National University of Defense Technology,Changsha 410073,China
  • Revised:2018-04-04 Online:2018-07-01 Published:2018-08-08

摘要:

针对移动云数据安全共享与访问控制问题,综合考虑当前密文访问控制机制的不足以及移动终端资源受限、网络带宽较低等特点,提出了一种面向移动云的属性基密文访问控制优化方法。通过引入属性基加密运算分割和双重加密机制,并结合多秘密共享技术进行改进,实现了移动用户数据发布和权限管理开销的大幅优化。理论和实验分析表明,所提方案在安全性、计算和网络开销等方面均能够满足移动云中的访问控制需求,具有良好的应用前景。

关键词: 移动云, 访问控制, 双重加密, 属性基加密, 优化

Abstract:

For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.

Key words: mobile cloud, access control, two-layer encryption, attribute-based encryption, optimization

中图分类号: 

No Suggested Reading articles found!