计算机应用 ›› 2016, Vol. 36 ›› Issue (7): 1822-1827.DOI: 10.11772/j.issn.1001-9081.2016.07.1822

• 网络空间安全 • 上一篇    下一篇

混合云环境下基于属性的密文策略加密方案

陈亮, 杨庚, 屠袁飞   

  1. 南京邮电大学 计算机学院, 南京 210003
  • 收稿日期:2015-12-24 修回日期:2016-03-30 出版日期:2016-07-10 发布日期:2016-07-14
  • 通讯作者: 杨庚
  • 作者简介:陈亮(1990-),男,江苏盐城人,硕士研究生,主要研究方向:网络与信息安全、访问控制、大数据隐私保护;杨庚(1961-),男,江苏建湖人,教授,博士,CCF高级会员,主要研究方向:网络与信息安全、分布与并行计算、大数据隐私保护;屠袁飞(1984-),男,江苏南京人,博士研究生,主要研究方向:数据隐私保护、访问控制。
  • 基金资助:
    国家自然科学基金资助项目(61272084);国家自然科学基金面上项目(61572263)。

Ciphertext-policy attribute-based encryption scheme in hybrid clouds

CHEN Liang, YANG Geng, TU Yuanfei   

  1. College of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing Jiangsu 210003, China
  • Received:2015-12-24 Revised:2016-03-30 Online:2016-07-10 Published:2016-07-14
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61272084), the Surface Program of National Natural Science Foundation of China (61572263).

摘要: 针对现有云存储的数据和访问控制的安全性不高,从而造成用户存储的敏感信息被盗取的现象,结合现有的基于密文策略属性加密(CP-ABE)方案和数据分割的思想,提出了一个基于混合云的高效数据隐私保护模型。首先根据用户数据的敏感程度将数据合理分割成不同敏感级别的数据块,将分割后的数据存储在不同的云平台上,再根据数据的安全级别,进行不同强度的加密技术进行数据加密。同时在敏感信息解密阶段采取“先匹配后解密”的方法,并对算法进行了优化,最后用户进行一个乘法运算解密得到明文。在公有云中对1 Gb数据进行对称加密,较单节点提高了效率一倍多。实验结果表明:该方案可以有效保护云存储用户的隐私数据,同时降低了系统的开销,提高了灵活性。

关键词: 访问控制, 混合云, 云存储, 数据分割, 属性, 敏感级别

Abstract: Focusing on inefficient data security and access control in the existed cloud storage, which results in sensitive information to be stolen, combined with the existed Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and data partition,an efficient data privacy protection model based on the hybrid cloud was proposed. First of all, according to the data sensitive degree, the data were divided into data blocks based on different sensitivity levels, and then data blocks were stored on different cloud platforms. According to the security level of the data, data were encrypted by using the different intensity encryption technologies. At the same time, the scheme of "first match after decryption" was adopted in the decryption stage and the algorithm was optimized. Finally, user decrypted ciphertext by the multiplication. Compared with the single node algorithm, for encrypting 1 Gb data, the efficiency of symmetric encryption algorithm more than doubled in the public clouds. The experimental results show that the proposed scheme can protect the privacy data of cloud storage user, reduces the system cost and improves the system flexibility.

Key words: access control, hybrid cloud, cloud storage, data partition, attribution, sensitivity level

中图分类号: