Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Intelligent Computer and Applications》 2019-04
Add to Favorite Get Latest Update

A design of data security sharing model in cloud storage environment

ZENG Desheng;LUO Jinwei;GAO Jing;LIU Beixiong;CHEN Mengxiang;School of Information Engineering,Guangdong Innovative Technical College;Guangdong Education Cloud PaaS Platform Engineering Technology Research Center;Guangdong Hengdian Information Technology Co.,Ltd.;Department of Mechanical and Electrical Engineering,Guangdong Polytechnic of Environmental Protection Engineering;  
With the development of cloud computing,more and more users store data in the cloud. The traditional plaintext storage method is not suitable for open environment,and the symmetric encryption is also not suitable for cloud data sharing and collaborative work. Aiming at the user's demand for data security sharing in cloud storage,this paper proposes the use of hierarchical identity-based encryption(HIBE),provides standardized identification management,improves private key generation efficiency and key security management. And imported version number for private key,the method improves the CP-ABE algorithm and improves the efficiency of attribute revocation. Samkumar's HIBE and John Bethencourt's cp-abe toolset is utilized,and after the test and analysis,the model has better security. The experimental results showthat the scheme has better performance.
【Fund】: 广东省教育厅重点平台及科研项目立项(2017GkQNCX130 2017GKTSCX042 2017GKTSCX112 2018GkQNCX065 2018GkQNCX111)
【CateGory Index】: TP309.2;TP333
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 6 Hits
1 FU Ying-Xun;LUO Sheng-Mei;SHU Ji-Wu;Department of Computer Science and Technology, Tsinghua University;Zhongxing Telecom Equipment Corporation;;Secure Online Storage System Based on Cloud Storage Environment[J];软件学报;2014-08
2 FENG Deng-Guo;CHEN Cheng;Institute of Software Chinese Academy of Sciences;Beijing Academy of Information Science and Technology;;Research on Attribute-based Cryptography[J];密码学报;2014-01
3 WANG Peng-Pian 1,2+,FENG Deng-Guo 1,ZHANG Li-Wu 1,2 1(State Key Laboratory of Information Security(Institute of Software,The Chinese Academy of Sciences),Beijing 100190,China) 2(National Engineering Research Center of Information Security,Beijing 100190,China);CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J];软件学报;2012-10
4 LIANG Pan1,2,FENG Chao-sheng2(1.Department of Electronic Information,ABA Teachers College,Chengdu 611741,China;2.School of Computer Science,Sichuan Normal University,Chengdu 610066,China);Security solution of E-government system based on HIBE[J];计算机工程与设计;2011-03
5 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];软件学报;2011-01
6 HU Liang CHU Jian-Feng LIN Hai-Qun YUAN Wei ZHAO Kuo(College of Computer Science and Technology,Jilin University,Changchun 130012);The Key Management Mechanism of IBE System[J];计算机学报;2009-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Jianping;ZHANG Minqing;Postgraduate Brigade,Engineering University of PAP;College of Cryptographic Engineering,Engineering University of PAP;;A Cryptographic Domain Reversible Data Hiding Algorithm Based on Code Division Multiple Access[J];武警工程大学学报;2018-04
2 GAN Hong;PAN Dan;Guangzhou City Construction College;;Under the Cloud-Based ECC Dynamic Password Authentication Scheme Design[J];江西科学;2015-06
3 Guo Baoping;Cheng Jian;Liu Weiping;Air Force Engineering University;Baoji Municipal Public Security Bureau Network Security Detachment;;Information Assurance Framework of Military Cloud[J];电信科学;2015-12
4 Liu Jie;Yun Lei;Wang Jing-pei;Information Security Research Center,China CEPREI Laboratory;;Trusted Testing Program Based on Third-Party of Cloud Platform[J];电子质量;2015-12
5 Li Xun;Ding Jianhua;Yang Tao;Key Laboratory of Information Network Security,Third Research Institute of Ministry of Public Security;;A KIND OF CLOUD COMPUTING SERVICE AUTHORISATION MECHANISM BASED ON TOKEN-KEY[J];计算机应用与软件;2015-12
6 YAO Wei;SHA Feng-jie;LIN Xiao-nan;School of Computer and Information,Hohai University;;CP-ABE Scheme with Efficient Attribute Revocation[J];计算机与现代化;2015-12
7 Wang Jia-Ling;Tongling University;;A Reliable Cloud Storage Scheme Based on Recursive Secret Sharing[J];铜陵学院学报;2015-06
8 ZHU Jian-ming;WANG Qin;School of Information, Central University of Finance and Economics;;Analysis of cyberspace security based on game theory[J];网络与信息安全学报;2015-01
9 XIAO Chuanqi;CHEN Mingzhi;College of Mathematics and Computer Science, Fuzhou University;Key Lab of Information Security of Network System in Fujian Province;;Research on User Behavior Trust Model Based on IFAHP in Cloud Computing Environment[J];信息网络安全;2015-12
10 TANG Guo-Chun;Department of Information,Qiongtai Teachers College;;Assessment model for cloud security based on multi-level fuzzy set[J];信息技术;2015-11
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 LI Qiang;FENG Deng-Guo;ZHANG Li-Wu;GAO Zhi-Gang;Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences;;Enhanced Attribute-Based Authenticated Key Agreement Protocol in the Standard Model[J];计算机学报;2013-10
2 WANG Peng-Pian 1,2+,FENG Deng-Guo 1,ZHANG Li-Wu 1,2 1(State Key Laboratory of Information Security(Institute of Software,The Chinese Academy of Sciences),Beijing 100190,China) 2(National Engineering Research Center of Information Security,Beijing 100190,China);CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J];软件学报;2012-10
3 XUE Wei 1,2 , SHU JiWu 1,2 , LIU Yang 1 & XUE Mao 1 1 Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China; 2 Tsinghua National Laboratory for Information Science and Technology, Tsinghua University,;Corslet: A shared storage system keeping your data private[J];Science China(Information Sciences);2011-06
4 SU Jin-Shu,CAO Dan,WANG Xiao-Feng,SUN Yi-Pin,HU Qiao-Lin (School of Computer,National University of Defense Technology,Changsha 410073,China);Attribute-Based Encryption Schemes[J];软件学报;2011-06
5 Liang Pan1,2,Feng Chaosheng2(1.Department of Electronic Information,ABA Teachers College,Pixian 611741,China;2.School of Computer Science,Sichuan Normal University,Chengdu 610066,China);The solution for information security of educational administration system based on hierarchical identify-based encryption[J];桂林电子科技大学学报;2010-03
6 MAO Xiao-ling,ZHANG Peng-zhu (Antai College of Economy and Management,Shanghai Jiaotong University,Shanghai 200052,P.R.China);Research and design of inter-AS private network plan for E-government based on MPLS VPN[J];重庆邮电大学学报(自然科学版);2009-03
7 HU Liang CHU Jian-Feng LIN Hai-Qun YUAN Wei ZHAO Kuo(College of Computer Science and Technology,Jilin University,Changchun 130012);The Key Management Mechanism of IBE System[J];计算机学报;2009-03
8 Hu De-bin,Wang Jin-ling,Yu Meng-tao,Lin Yu,Hu Liang (College of Computer Science and Technology,Jilin University,Changchun 130012,China);ID alias IBE scheme with a trusted third party[J];吉林大学学报(工学版);2008-02
9 LIN Chuang 1 WANG Yuan-zhuo 1,2 TIAN Li-qin 1 (1.Department of Computer Science and Technology, Tsinghua University, Beijing 1000841, China; 2.Information Engineering School, University of Science and Technology Beijing, Beijing 100083, China; 3.North China Institute of Science and Technology, Beijing 101601, China);Development of Trustworthy Network and Facing Scientific Challenges[J];中兴通讯技术;2008-01
10 NING Hong-zhou,Engineer HUA Gang JIN Duan-feng(Academy of Digital Technology,Aisino Corporation Inc.,Beijing100097,China);Trust Problem in PKI Application and Its Secure Solution[J];中国安全科学学报;2007-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved