[1]庞岩梅,李晓东,叶思水.基于代理重加密的云数据共享机制的研究与实现[J].南京理工大学学报(自然科学版),2015,39(01):84-88.
 Pang Yanmei,Li Xiaodong,Ye Sishui.Research and implementation of cloud data sharing mechanism based on proxy re-encryption[J].Journal of Nanjing University of Science and Technology,2015,39(01):84-88.
点击复制

基于代理重加密的云数据共享机制的研究与实现
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
39卷
期数:
2015年01期
页码:
84-88
栏目:
出版日期:
2015-02-28

文章信息/Info

Title:
Research and implementation of cloud data sharing mechanism based on proxy re-encryption
作者:
庞岩梅李晓东叶思水
北京电子科技学院 计算机学院,北京 100070
Author(s):
Pang YanmeiLi XiaodongYe Sishui
School of Computer,Beijing Electronic Science and Technology Institute,Beijing 100070
关键词:
代理重加密 云存储 数据授权 数据共享 双线性对 判定双线性Diffie-Hellman Hadoop
Keywords:
proxy re-encryption cloud storage data authorization data sharing bilinear paring decisional bilinear Diffie-Hellman Hadoop
分类号:
TH16
摘要:
为了使得云端数据能灵活安全地进行共享,该文对基于代理重加密的共享机制进行了研究。该文利用代理重加密实现代理授权,设计了一种云端数据授权共享方案。代理重加密算法使用了双线性对,其安全性基于判定双线性Diffie-Hellman(Decisional bilinear Diffie-Hellman,DBDH)假设。在该方案基础上,实现了一个基于Hadoop云存储平台的云端数据共享原型系统,对其进行了测试和分析。该系统的数据共享具有高效性和安全性。该文工作对代理重加密在云端数据共享中的应用具有借鉴价值。
Abstract:
To improve the flexibility and security of cloud data sharing,a proxy re-encryption based scheme is researched.A cloud data authorization and sharing solution is designed on proxy of data authorization through proxy re-encryption.The proxy re-encryption algorithm uses bilinear paring.The security is based on Decisional Bilinear Diffie-Hellman(DBDH)hypothesis.A cloud data sharing prototype system is implemented on a Hadoop cloud platform.The test and analysis show the data sharing is effective and secure.The work is valuable in application of proxy re-encryption in cloud data sharing.

参考文献/References:

[1] Blaze M,Bleumer G,Strauss M,et al.Divertible proto-cols and atomic proxy cryptography[A].EUROCRYPTc 98[C].Heidelberg:Springer,1998:127-144.
[2]Ateniese G,Fu K,Green M,et al.Improved proxy re-encryption schemes with applications to secure distributed storage[J].ACM Transactions on Informa-tion and System Security,2006,9(1):1-30.
[3]Ibraimi L,Tang Q,Hartel P,et al.A type-and-identity-based proxy re-encryption scheme and its application in healthcare[A].SDMc 08[C].Heidelberg:Springer,2008:185-198.
[4]Taban G,Cárdenas A A,Gligoret V D.Towards a secure and interoperable DRM architecture[A].Proceedings of the ACM Workshop on Digital Rights Management 2006[C].New York,USA:ACM,2006:69-78.
[5]王红兵.基于双线性配对的代理重加密的研究[D].上海:上海交通大学计算机科学与技术系,2013.
[6]李琳琳,姚超,王庆超,等.基于Web Service的软件资源共享方法研究[J].火力与指挥控制,2014,39(5):45-48.
Li Linlin,Yao Chao,Wang Qingchao,et al.Research on software resources sharing method based on Web Service[J].Fire Control & Command Control,2014,39(5):45-48.
[7]崔文斌,牟少敏,王云诚,等.Hadoop大数据平台的搭建与测试[J].山东农业大学学报(自然科学版),2013,44(4):550-555.
Cui Wenbin,Mu Shaomin,Wang Yuncheng,et al.The building and testing platform for hadoop distributed-architecture[J].Journal of Shandong Agricultural University(Natural Science),2013,44(4):550-555.
[8]李双江,郝克刚,葛玮.一种基于Axis2的SOAP安全传输模型的研究[J].计算机技术与发展,2008,18(11):142-145.
Li Shuangjiang,Hao Kegang,Ge Wei.Research on a SOAP security model based on Axis2[J].Computer Technology and Development,2008,18(11):142-145.
[9]熊光彩,慕徳俊,张新家,等.基于Axis2的web服务安全框架设计与实现[J].计算机工程与设计,2012,33(5):1729-1733.
Xiong Guangcai,Mu Dejun,Zhang Xinjia,et al.Design and implementation of web service security framework based on Axis2[J].Computer Engineering and Design,2012,33(5):1729-1733.

备注/Memo

备注/Memo:
收稿日期:2014-07-11 修回日期:2014-12-12
基金项目:中央高校基本科研业务费专项资金资助(YZDJ1201,2013)
作者简介:庞岩梅(1978-),女,讲师,主要研究方向:信息安全,E-mail:pym@besti.edu.cn。
引文格式:庞岩梅,李晓东,叶思水.基于代理重加密的云数据共享机制的研究与实现[J].南京理工大学学报,2015,39(1):84-88.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2015-02-28