登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
云计算中一种安全的电子文档自毁方案
  • 摘要

    针对长期存储在云端定时发布的电子文档容易导致隐私信息泄露的问题,提出基于身份的定时发布加密文档自毁方案.该方案首先采用对称密钥加密电子文档,其密文经过提取算法变为提取密文和封装密文;然后采用基于身份定时发布加密(identity-based timed-release encryption,ITE)算法加密对称密钥,其密文结合提取密文产生密文分量并分发到分布式Hash表(distributed Hash table,DHT)网络,封装密文被封装成电子文档自毁对象后存储在云端.仅当到达预订的发布时间时,授权用户才能访问受保护的电子文档;且当超过一定的时间期限时,分布式Hash表网络将自动丢弃所存密文分量,使得原始密钥不可恢复,实现电子文档安全自毁.安全分析表明,该方案能够同时抵抗来自云端的密码分析攻击和来自DHT网络的Sybil攻击;实验结果表明,该方案的计算代价要小于已有方案,具有较高的效率.

  • 作者

    姚志强  熊金波  马建峰  李琦  刘西蒙  Yao Zhiqiang  Xiong Jinbo  Ma Jianfeng  Li Qi  Liu Ximeng 

  • 作者单位

    西安电子科技大学计算机学院 西安 710071;福建师范大学软件学院 福州 350108/福建师范大学软件学院 福州 350108/西安电子科技大学计算机学院 西安 710071/西安电子科技大学通信工程学院 西安 710071

  • 刊期

    2014年7期 ISTIC EI PKU

  • 关键词

    云计算  电子文档  安全自毁  基于身份的定时发布加密  分布式Hash表  cloud computing  electronic document  secure self-destruction  identity-based timed release encryption  distributed Hash table 

参考文献
  • [1] 熊金波,姚志强,马建峰,李凤华,刘西蒙. 面向网络内容隐私的基于身份加密的安全自毁方案. 计算机学报, 2014,1
  • [2] 张逢喆,陈进,陈海波,臧斌宇. 云计算中的数据隐私性保护与自我销毁. 计算机研究与发展, 2011,7
  • [3] Reardon J;Basin D;Capkun S. Sok:Secure data deletion. Piscataway,NJ:IEEE, 2013
  • [4] Zeng Lingfang;Chen Shibin;Wei Qingsong. Sedas:A self-destructing data system based on active storage framework. IEEE Transactions on Magnetics, 2013,06
  • [5] Rivest R L;Shamir A;Wagner D A. Time-lock puzzles and timed-release crypto. http://dl.acm.org/citation.cfm?id=888615, 2014-02-14
  • [6] Chan A F;Blake I F. Scalable,server-passive,user anonymous timed release cryptography. Piscataway,NJ:IEEE, 2005
  • [7] Chalkias K;Hristu-Varsakelis D;Stephanides G. Improved anonymous timed-release encryption. Berlin:Springer-Verlag, 2007
  • [8] Dent A W;Tang Q. Revisiting the security model for timed release encryption with pre-open capability. Berlin:Springer-Verlag, 2007
  • [9] Kikuchi R;Fujioka A;Okamoto Y. Strong security notions for timed release public-key encryption revisited. Berlin:Springer-Verlag, 2012
  • [10] Chow S S;Yiu S M. Timed-release encryption revisited. Berlin:Springer-Verlag, 2008
  • [11] Takabi H;Joshi J B D;Ahn G J. Security and privacy challenges in cloud computing environments. IEEE SECURITY & PRIVACY, 2010,06
  • [12] Perlman R. File system design with assured delete. Piscataway,NJ:IEEE, 2005
  • [13] Tang Y;Lee P P;Lui J C. Fade:Secure overlay cloud storage with file assured deletion. Berlin:Springer-Verlag, 2010
  • [14] Lynn B. Pairing-based cryptography library. http://crypto.stanford.edu/pbc/, 2014-02-14
  • [15] Bethencourt J;Sahai A;Waters B. Ciphertext-policy attribute-based encryption toolkit. http://acsc.cs.utexas.edu/cpabe/, 2014-02-14
  • [16] Perlman R. The ephemerizer:Making data disappear. Journal ot Information Systems Security, 2005,01
  • [17] Tang Y;Lee P P;Lui J C. Secure overlay cloud storage with access control and assured deletion. IEEE Trans on Dependable and Secure Computing, 2012,06
  • [18] Geambasu R;Kohno T;Levy A. Vanish:Increasing data privacy with self-destructing data. Berkeley:USENIX Association, 2009
  • [19] Zeng Lingfang;Shi Zhan;Xu Shengjie. SafeVanish:An improved data self-destruction for protecting data privacy. Piscataway,NJ:IEEE, 2010
  • [20] Wang Guojun;Yue Fengshun;Liu Qin. A secure self-destructing scheme for electronic data. Journal of Computer and System Sciences, 2013,02
  • [21] Xiong Jinbo;Yao Zhiqiang;Ma Jianfeng. A secure document self-destruction scheme with identity based encryption. Piscataway,NJ:IEEE, 2013
查看更多︾
相似文献 查看更多>>
3.214.184.196