• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Ye, Tao (Ye, Tao.) | Cai, Yongquan (Cai, Yongquan.) (学者:蔡永泉) | Zhao, Xu (Zhao, Xu.) | Yang, Yongli (Yang, Yongli.) | Wang, Wei (Wang, Wei.) (学者:王伟) | Zhu, Yi (Zhu, Yi.)

收录:

EI Scopus

摘要:

The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.

关键词:

Access control Cost benefit analysis Cryptography

作者机构:

  • [ 1 ] [Ye, Tao]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 2 ] [Ye, Tao]College of Computer, Qinghai Nationalities University, Xining, China
  • [ 3 ] [Cai, Yongquan]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 4 ] [Zhao, Xu]College of Applied Sciences, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Yang, Yongli]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 6 ] [Wang, Wei]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 7 ] [Zhu, Yi]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China

通讯作者信息:

  • [zhao, xu]college of applied sciences, beijing university of technology, beijing; 100124, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

International Journal of Wireless and Mobile Computing

ISSN: 1741-1084

年份: 2019

期: 1

卷: 16

页码: 41-49

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:1448/2902205
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司