ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture  被引量:1

ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture

在线阅读下载全文

作  者:SHI Jiaoli HUANG Chuanhe HE Kai SHEN Xieyang 

机构地区:[1]State Key Lab of Software Engineering,Computer School,Wuhan University [2]Collaborative Innovation Center of Geospatial Technology [3]Jiujiang University [4]Wuhan Textile University

出  处:《Chinese Journal of Electronics》2019年第1期52-61,共10页电子学报(英文版)

基  金:supported by the National Natural Science Foundation of China(No.61373040,No.61772385)

摘  要:Binding access policies to data,Ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of the most suitable access control methods in cloud storage system and gets the attention of extensive researches. In those researches, Hierarchical cryptography architecture(HCA) is often applied to improve the efficiency of the system. There exist two open issues: illegal leakage of symmetric keys and low efficiency of revocation of an attribute of a user. We propose an Access control scheme under Hierarchical cryptography architecture(ACS-HCA). In this scheme,key derivation mechanism and forward derivation function are used to avoid the leakage of symmetric keys, All-orNothing transform is used to prevent the illegal reuse of symmetric keys, and attribute revocation is realized without re-issuing other users' private keys. Analyses and simulations demonstrate that our scheme sustains less encrypting cost on each owner and less decrypting cost on each user, but gain high efficiency in revocation of an attribute of a user.Binding access policies to data,Ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of the most suitable access control methods in cloud storage system and gets the attention of extensive researches. In those researches, Hierarchical cryptography architecture(HCA) is often applied to improve the efficiency of the system. There exist two open issues: illegal leakage of symmetric keys and low efficiency of revocation of an attribute of a user. We propose an Access control scheme under Hierarchical cryptography architecture(ACS-HCA). In this scheme,key derivation mechanism and forward derivation function are used to avoid the leakage of symmetric keys, All-orNothing transform is used to prevent the illegal reuse of symmetric keys, and attribute revocation is realized without re-issuing other users' private keys. Analyses and simulations demonstrate that our scheme sustains less encrypting cost on each owner and less decrypting cost on each user, but gain high efficiency in revocation of an attribute of a user.

关 键 词:Cloud storage ACCESS control Ciphertext-policy ATTRIBUTE-BASED encryption HIERARCHICAL CRYPTOGRAPHY ARCHITECTURE Attribute revocation 

分 类 号:TN[电子电信]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象