[1]闫玺玺,胡前伟,李子臣,等.密文数据库中支持快速密钥更新的数据共享方案[J].南京理工大学学报(自然科学版),2017,41(04):412.[doi:10.14177/j.cnki.32-1397n.2017.41.04.003]
 Yan Xixi,Hu Qianwei,Li Zichen,et al.Data sharing scheme supporting fast key updatingin the encrypted database[J].Journal of Nanjing University of Science and Technology,2017,41(04):412.[doi:10.14177/j.cnki.32-1397n.2017.41.04.003]
点击复制

密文数据库中支持快速密钥更新的数据共享方案()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
41卷
期数:
2017年04期
页码:
412
栏目:
出版日期:
2017-08-31

文章信息/Info

Title:
Data sharing scheme supporting fast key updatingin the encrypted database
文章编号:
1005-9830(2017)04-0412-08
作者:
闫玺玺1胡前伟1李子臣2汤永利1
1.河南理工大学 计算机科学与技术学院,河南 焦作 454003; 2.北京印刷学院 信息工程学院,北京 102600
Author(s):
Yan Xixi1Hu Qianwei1Li Zichen2Tang Yongli1
1.School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China; 2.Beijing Institute of Graphic Communication,Beijing 102600,China
关键词:
密文数据库 属性基加密 数据共享 密钥更新
Keywords:
encrypted database attribute-based encryption data share data updating
分类号:
TP309
DOI:
10.14177/j.cnki.32-1397n.2017.41.04.003
摘要:
云环境中常采用属性基加密机制进行一对多的数据共享,这种方式会影响到系统效率,数据拥有者在更新加密密钥时操作复杂。针对此问题,提出一种支持快速密钥更新的数据分享方案。数据拥有者使用属性基加密数据密钥并传送给数据中心,重加密机制支持密钥的快速更新,降低了用户和服务器的工作量,并提高系统安全性。方案基于判定双线性Diffie-Hellman(Decision bilinear Diffie-Hellman,DBDH)假设,在标准模型下满足自适应选择明文攻击安全。通过与其他方案对比,该方案中属性密钥长度、密文长度有所优化,数据分享和读取数据计算开销有所减少,适用于移动终端云环境数据分享的性能需求。
Abstract:
Attribute-based encryption(ABE)is an optimal choice for one-to-many data sharing in the cloud environment,and is not very efficient when data owner updates the content key dynamically.In order to solve this problem,data sharing scheme supporting fast key updating in the encrypted database is proposed.In the scheme,the data owner encrypts the data key with attribute-based encryption mechanism.In addition,re-encryption mechanism is used to support the rapid updating of the data key.In this way,it can reduce the user and server workload and improve system security.The scheme is secure against chosen plaintext attack under the decision bilinear Diffie-Hellman(DBDH)assumption in the standard model.Compared with other schemes,the length of the attribute keys and ciphertext are optimized in the scheme.The cost of data sharing and accessing is reduced,which is more suitable for the practical application of cloud environment.

参考文献/References:

[1] Wang Weichao,Li Zhiwei,Owens R,et al.Secure and efficient access to outsourced data[C]//Proceedings of ACM Cloud Computing Security Workshop.New York,USA:ACM Press,2009:55-66.
[2]Vimercati S D C D,Foresti S,Jajodia S,et al.Preserving confidentiality of security policies in data outsourcing[C]//Proceedings of ACM Workshop on Privacy in the Electronic Society.USA:ACM Press,2008:75-84.
[3]Vijayalakshmi T,Suresh N.Secure multi-owner data sharing for dynamic groups in the cloud[J].IEEE Transactions on Parallel & Distributed Systems,2013,24(6):1182-1191.
[4]Varun I,Mohan B V.An efficient secure multi owner data sharing for dynamic groups in cloud computing[J].International Journal of Computer Science & Mobile Computing,2014,3(6):730-734.
[5]Li Jingwei,Li Jin,Liu Zheli,et al.Enabling efficient and secure data sharing in cloud computing[J].Concurrency and Computation:Practice and Expe-rience,2014,26(5):1052-1066.
[6]Aarthi D,Indira N.Enabling efficient and protected sharing of data in cloud computing[C]//Proceedings of International Conference on Information Commu-nication and Embedded Systems.Piscataway,USA:IEEE Press,2016:1-5.
[7]Ibtissam E,Youness T,Abdelhamid B.Securing shared data in cloud computing by using cryptographic schemes[J].International Journal of Computer Applications,2016,146(14):28-32.
[8]Abhishek C,Sahadev G,Richa K,et al.Secure sharing of data in cloud computing with secret sharing algorithm[J].International Journal of Emerging Trend in Engineering and Basic Sciences(IJEEBS),2015,2(1):665-671.
[9]Gentry C,Halevi S.Implementing Gentry’s fully-homomorphic encryption scheme[C]//Proceedings of International Conference on the Theory and Appli-cations of Cryptographic Techniques.Berlin:Springer-Verlag,2011:129-148.
[10]Samanthula B K,Howser G,Elmehdwi Y,et al.An efficient and secure data sharing framework using homomorphic encryption in the cloud[C]//Proceedings of the 1st International Workshop on Cloud Inte-lligence.New York,USA:ACM Press,2012:1-8.
[11]Sahai A,Waters B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473.
[12]Ibraimi L,Tang Q,Hartel P,et al.Efficient and provable secure ciphertext-policy attribute-based encryption schemes[M].Information Security Practice and Experience,Berlin:Springer Berlin Heidelberg,2009:1-12.
[13]Dong Xin,Yu Jiadi,Luo Yuan,et al.Achieving an effective,scalable and privacy-preserving data sharing service in cloud computing[J].Computers & Security,2013,42(5):151-164.
[14]Huang Qinlong,Ma Zhaofeng,Yang Yixian,et al.EABDS:Attribute-based secure data sharing with efficient revocation in cloud computing[J].Chinese Journal of Electronics,2015,24(4):862-868.
[15]张星,文子龙,沈晴霓,等.可追责并解决密钥托管问题的属性基加密方案[J].计算机研究与发展,2015,52(10):2293-2303.
Zhang Xing,Wen Zilong,Shen Qingni,et al.Accountable attribute-based encryption scheme without key escrow[J].Journal of Computer Research and Development,2015,52(10):2293-2303.
[16]Fu Jingyi,Huang Qinlong,Ma Zhaofeng,et al.Secure personal data sharing in cloud computing using attribute-based broadcast encryption[J].Journal of China Universities of Posts & Telecommunications,2014,21(6):45-51.
[17]张丽娜,杨波,周彦伟,等.适于任意深度电路结构的紧致属性基广播加密方案[J/OL].计算机学报,2016,39:在线出版号No.180.
Zhang Lina,Yang Bo,Zhou Yanwei,et al.Compact Attribute-based broadcast encryption scheme for general circuits with arbitrary depthp[J/OL].Chinese Journal of Computers,2016,39:Online Publishing No.180.
[18]He H,Li R,Dong X,et al.Secure,efficient and fine-grained data access control mechanism for p2p storage cloud[J].IEEE Transactions on Cloud Computing,2014,2(4):471-484.
[19]Lu Yang.Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds[J].Ksii Transactions on Internet & Information Systems,2015,9(7):2703-2718.
[20]姚文斌,韩司,李小勇.云存储环境下的密文安全共享机制[J].通信学报,2015,36(10):1-8.
Yao Wenbin,Han Si,Li Xiaoyong.Security sharing scheme for encrypted data in cloud storage[J].Journal on Communications,2015,36(10):1-8.
[21]Waters B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//International Workshop on Public Key Crypto-graphy 2011.Berlin:Springer-Verlay,2011:53-70.

备注/Memo

备注/Memo:
收稿日期:2016-12-21 修回日期:2017-06-03基金项目:国家自然科学基金(61300216); 河南省科技厅项目(132102210123); 河南省教育厅科研项目(16A520013); 河南理工大学2015年青年骨干教师资助项目
作者简介:闫玺玺(1985-),女,博士,讲师,主要研究方向:网络与信息安全、数字版权管理和数字内容安全,E-mail:yanxx@hpu.edu.cn。
引文格式:闫玺玺,胡前伟,李子臣,等.密文数据库中支持快速密钥更新的数据共享方案[J].南京理工大学学报,2017,41(4):412-419.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2017-08-31