计算机应用 ›› 2016, Vol. 36 ›› Issue (1): 216-221.DOI: 10.11772/j.issn.1001-9081.2016.01.0216

• 网络空间安全 • 上一篇    下一篇

具有访问权限撤销的外包数据加密方案

李程文, 王晓明   

  1. 暨南大学 信息科学技术学院, 广州 510632
  • 收稿日期:2015-07-29 修回日期:2015-09-15 出版日期:2016-01-10 发布日期:2016-01-09
  • 通讯作者: 王晓明(1960-),女,重庆人,教授,博士,主要研究方向:计算机网络安全、现代密码学
  • 作者简介:李程文(1991-),男,重庆人,硕士研究生,主要研究方向:密码学、信息安全。
  • 基金资助:
    国家自然科学基金资助项目(61070164,61272415);广东省自然基金资助项目(S2012010008767);广东省科技计划项目(2013B010401015,2012B091000136)。

Outsourced data encryption scheme with access privilege revocation

LI Chengwen, WANG Xiaoming   

  1. College of Information Science and Technology, Jinan University, Guangzhou Guangdong 510632, China
  • Received:2015-07-29 Revised:2015-09-15 Online:2016-01-10 Published:2016-01-09
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61070164, 61272415), the Natural Science Foundation of Guangdong Province (S2012010008767) and the Science and Technology Planning Project of Guangdong Province (2013B010401015, 2012B091000136).

摘要: 对Zhou等提出的方案(ZHOU M, MU Y, SUSILO W, et al. Privacy enhanced data outsourcing in the cloud. Journal of network and computer applications, 2012, 35(4): 1367-1373)进行分析,指出了该方案无法实现对用户访问权限进行撤销的问题。针对该方案的不足,提出一种具有撤销用户访问权限的外包数据加密方案。首先,把数据分成多个数据块并分别对每个数据块加密;其次,通过密钥导出的方法减少数据拥有者管理和保存密钥的数量;最后,对同一个加密数据构造多个解密密钥,实现对某些用户的访问权限撤销,而未被撤销用户无需进行密钥更新。与Zhou等的方案相比,所提方案不仅保持该方案中的外包数据隐私保护优点,而且还实现了用户访问权限的撤销。分析结果表明,在离散对数困难问题(DLP)假设下,所提方案是安全的。

关键词: 外包数据, 用户撤销, 数据加密, 密钥管理, 多解密密钥

Abstract: The scheme proposed by Zhou et al. (ZHOU M, MU Y, SUSILO W, et al. Privacy enhanced data outsourcing in the cloud. Journal of network and computer applications, 2012, 35(4): 1367-1373) was analyzed, and the shortcoming of no access privilege revocation was shown. To address the shortcoming, an outsourced data encryption scheme with revoking access privilege was proposed. Firstly, the data were divided into several data blocks, and each data block was encrypted separately. Secondly, with the key derivation method, the number of keys stored and managed by the data owner was reduced. Finally, multiple decryption keys were constructed on an encrypted data to revoke access privileges of some users, without affecting the legitimate users. Compared with Zhou's scheme, the proposed scheme not only maintains the advantage of privacy protection to the outsourced data in the scheme, but also realizes access privilege revocation for users. The analysis results show that the proposed scheme is secure under the assumption of the Discrete Logarithm Problem (DLP).

Key words: outsourced data, user revocation, data encryption, key management, multiple decryption key

中图分类号: