基于屬性加密的云存儲訪問控制研究
發(fā)布時間:2018-11-28 14:05
【摘要】:云存儲技術(shù)迅猛發(fā)展的同時也引起諸多安全問題,在云存儲環(huán)境中,數(shù)據(jù)被外包給云服務(wù)器而處于用戶控制之外,如何實施新穎可信的訪問控制技術(shù)就變得非常關(guān)鍵。作為一類新興的公鑰加密技術(shù),基于屬性的加密算法以其靈活性被廣泛應(yīng)用在云存儲訪問控制方案的設(shè)計中。文章提出了一種基于屬性加密的云存儲訪問控制方案,方案可以實現(xiàn)安全的云存儲,系統(tǒng)采用基于角色的訪問控制技術(shù)實現(xiàn)身份驗證、對屬性的加密/解密以及對非敏感數(shù)據(jù)的訪問。最后通過仿真實驗證明該方案是一種可以保證數(shù)據(jù)完整性和機密性的云存儲訪問控制。
[Abstract]:With the rapid development of cloud storage technology, it also causes many security problems. In cloud storage environment, data is outsourced to cloud server and outside user control, so how to implement new and trusted access control technology becomes very important. As a new kind of public key encryption technology, attribute-based encryption algorithm is widely used in the design of cloud storage access control scheme for its flexibility. This paper presents an access control scheme for cloud storage based on attribute encryption, which can realize secure cloud storage. The system adopts role-based access control technology to implement authentication. Encryption / decryption of properties and access to non-sensitive data. Finally, the simulation results show that this scheme is a cloud storage access control which can guarantee the integrity and confidentiality of data.
【作者單位】: 西安工業(yè)大學(xué)計算機科學(xué)與工程學(xué)院;
【基金】:西安工業(yè)大學(xué)校長基金(XAGDXJJ1216)
【分類號】:TP333;TP309
,
本文編號:2363060
[Abstract]:With the rapid development of cloud storage technology, it also causes many security problems. In cloud storage environment, data is outsourced to cloud server and outside user control, so how to implement new and trusted access control technology becomes very important. As a new kind of public key encryption technology, attribute-based encryption algorithm is widely used in the design of cloud storage access control scheme for its flexibility. This paper presents an access control scheme for cloud storage based on attribute encryption, which can realize secure cloud storage. The system adopts role-based access control technology to implement authentication. Encryption / decryption of properties and access to non-sensitive data. Finally, the simulation results show that this scheme is a cloud storage access control which can guarantee the integrity and confidentiality of data.
【作者單位】: 西安工業(yè)大學(xué)計算機科學(xué)與工程學(xué)院;
【基金】:西安工業(yè)大學(xué)校長基金(XAGDXJJ1216)
【分類號】:TP333;TP309
,
本文編號:2363060
本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2363060.html
最近更新
教材專著