云外包數(shù)據(jù)安全共享的等級密鑰管理與屬性基加密方法研究
[Abstract]:With the explosive growth of data, the problem of data storage becomes more and more independent and difficult. The storage service in the cloud computing is just to cater to this market opportunity to provide an outsourced storage solution to a resource limited multi tenant. In the cloud storage, the user stores the data on a remote cloud server and is provided by a cloud service provider. However, the benefit of cloud service providers is driven to work in a semi trusted or malicious mode, which makes it urgent for the user to have the privacy protection function of the cloud storage system to prevent unauthorized sharing of outsourced data in the outsourced storage. Efficient and flexible data security sharing has become an urgent problem to be solved. This paper studies the above problems from two methods of hierarchical key management and attribute based encryption in cipher domain access control. The main achievements are as follows: (1) the fine granularity of cloud outsourced data for the dynamic changes of the user shared privileges. In addition, the hierarchical key management solution also requires the data owner to communicate one to one communication with the users involved in the various access groups through the secure channel. Once access to the group, the data owner is required to access the group. In order to avoid this defect, we propose an autonomous hierarchical key management scheme for outsourced data sharing. This scheme combines multiple rights group key management and hierarchical key management in each design. The main feature is that the data owner manages the hierarchical structure of each access group only through the public parameters of the system, and the users in each of the access groups obtain the symmetric encryption key corresponding to the group by the group key negotiation based on the multilinear mapping. Users and users of the corresponding high level access groups can publish update information for users in the low level access group involved. After obtaining this update, these low-level access groups can independently compute the new symmetric encryption keys corresponding to their groups. (2) currently, it is safe and has a direct key derivative. The hierarchical key management scheme needs to encrypt the public information in the system. This will increase the computing overhead of the system establishment and dynamic key management. By using the vector product in linear geometry to process the hierarchical structure between groups, we give a solution for the security sharing of cloud outsourced data based on the hierarchical key management. In this scheme, the data owner exposes a vector for each access group, and the matrix of all the vectors is the main public parameter of the system. At the same time, the data owner assigns the corresponding private information to the group for each user. Through the private information, the users in the group can calculate the corresponding privacy of the group. There is a vector. Then we calculate the inner product of the private key vector and the public vector corresponding to the group. The users in the group can get the symmetric encryption keys corresponding to the group. If two groups of access groups do not have a hierarchical relationship, the vectors associated with them will have orthogonality, that is, the inner product of the vectors is zero. If the two The access group has a hierarchical relationship, and the private vector of the high level access group and the inner product of the public vector of the low level access group correspond to an indirect key. Using this indirect key, the users in the high level access group can obtain the symmetric plus secret key of the low level access group corresponding to the key pipe of the dynamic sharing rights. On the other hand, the data owner only needs to update the public matrix in the system. Through the security analysis and simulation results, we can see that the scheme is safe and efficient. (3) in the face of the cloud storage system in the multi authorization center, we propose a dual factor outsourcing data sharing solution. This scheme integrates the identity base. Two techniques of encryption and cipher based attribute based encryption. One user can obtain the shared data of the owner of the data. Besides the access control strategy in the ciphertext, the user also requires that the user obtain the authorization key from the data owner. Furthermore, the proposed scheme also has a fixed cipher length. By using cloud server aided re encryption technology, the scheme implements a double decker revocation mechanism: attribute layer revocation corresponding to attribute authorization center and user layer cancellation corresponding to data owner. And the revocation process is completed under the open channel, and can resist the channel eavesdropping attack of the revocation user. Security analysis, performance The comparison and simulation results show that the scheme is effective in solving the problem of cloud outsourcing data security sharing under multiple authorization centers.
【學(xué)位授予單位】:華南理工大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2016
【分類號】:TN918.4
【相似文獻】
相關(guān)期刊論文 前10條
1 劉曉艷;;一種基于身份認證的多智體密鑰管理方法[J];山西財經(jīng)大學(xué)學(xué)報;2007年S2期
2 王燕;陳燕俐;曹曉梅;楊庚;;無線網(wǎng)絡(luò)中一種新型密鑰管理[J];信息網(wǎng)絡(luò)安全;2009年11期
3 石強;張欣;;可信存儲的密鑰管理[J];中國科技信息;2011年09期
4 趙華偉;郭強;舒明雷;呂家亮;黃太波;;軀感網(wǎng)密鑰管理特征及研究現(xiàn)狀分析[J];計算機應(yīng)用與軟件;2012年07期
5 黃江憑,張克騫;單密鑰算法中的密鑰管理問題[J];中國金融電腦;1999年06期
6 戴瓊海,覃毅力,張瑩;組播通信的訪問控制和密鑰管理[J];電子學(xué)報;2002年S1期
7 王國明;侯整風(fēng);;信息隱藏技術(shù)在密鑰管理中的應(yīng)用研究[J];計算機工程與設(shè)計;2008年18期
8 孫磊;戴紫珊;郭錦娣;;云計算密鑰管理框架研究[J];電信科學(xué);2010年09期
9 龔敏;陸萍;;基于城市通卡的發(fā)卡與密鑰管理研究[J];福建電腦;2012年05期
10 顧冠群 ,朱艷琴 ,徐永南;密鑰管理的設(shè)計與實現(xiàn)[J];電信科學(xué);1992年02期
相關(guān)會議論文 前7條
1 劉鵬;趙戰(zhàn)生;荊繼武;戴英俠;;批發(fā)銀行業(yè)環(huán)境中的密鑰管理[A];第十次全國計算機安全學(xué)術(shù)交流會論文集[C];1995年
2 王潮;張振華;應(yīng)仲平;徐拾義;牛志華;;WSN中基于身份的分散密鑰管理研究[A];第六屆中國測試學(xué)術(shù)會議論文集[C];2010年
3 馬春光;戴膺贊;;無線傳感器網(wǎng)絡(luò)動態(tài)密鑰管理方案綜述[A];黑龍江省計算機學(xué)會2009年學(xué)術(shù)交流年會論文集[C];2010年
4 劉文遠;裴繼輝;王永栓;;PKI密鑰管理系統(tǒng)的研究與設(shè)計[A];2007年全國第十一屆企業(yè)信息化與工業(yè)工程學(xué)術(shù)會議論文集[C];2007年
5 王繪麗;李冰;張曉慧;孫斌;;Ad Hoc虛擬骨干網(wǎng)中密鑰管理的研究[A];2006通信理論與技術(shù)新進展——第十一屆全國青年通信學(xué)術(shù)會議論文集[C];2006年
6 徐瑩;徐福緣;李生琦;;層級結(jié)構(gòu)中基于一元hash函數(shù)的存取控制方法研究[A];全國第十屆企業(yè)信息化與工業(yè)工程學(xué)術(shù)年會論文集[C];2006年
7 張軼北;高寶成;;基于簇結(jié)構(gòu)分布式認證的Shamir機制研究[A];中國電子學(xué)會第十五屆信息論學(xué)術(shù)年會暨第一屆全國網(wǎng)絡(luò)編碼學(xué)術(shù)年會論文集(上冊)[C];2008年
相關(guān)重要報紙文章 前3條
1 ;眾多存儲企業(yè)關(guān)注密鑰管理[N];人民郵電;2007年
2 宋家雨;密鑰管理之秘訣[N];網(wǎng)絡(luò)世界;2007年
3 江信q,
本文編號:2165439
本文鏈接:http://www.lk138.cn/shoufeilunwen/xxkjbs/2165439.html