版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Univ Wollongong Ctr Comp & Informat Secur Res Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia Nanjing Univ Finance & Econ Jiangsu Prov Key Lab E Business Nanjing 210003 Jiangsu Peoples R China
出 版 物:《IEEE TRANSACTIONS ON COMPUTERS》 (IEEE Trans Comput)
年 卷 期:2014年第63卷第4期
页 面:941-953页
核心收录:
学科分类:0808[工学-电气工程] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:Smart Services Cooperative Research Centre (CRC) University of Wollongong ARC [FT0991397] Australian Research Council [FT0991397] Funding Source: Australian Research Council
主 题:Distributed data storage identity-based system access control security
摘 要:Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG);(2) For one query, a receiver can only access one file, instead of all files of the owner;(3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner s secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.