作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (6): 38-43. doi: 10.19678/j.issn.1000-3428.0060063

• 热点与综述 • 上一篇    下一篇

基于雾节点的分布式属性基加密方案

马佳佳1, 张志强1, 曹素珍1, 窦凤鸽1, 丁晓晖1, 王彩芬2   

  1. 1. 西北师范大学 计算机科学与工程学院, 兰州 730070;
    2. 深圳技术大学 大数据与互联网学院, 广东 深圳 518118
  • 收稿日期:2020-11-20 修回日期:2021-01-12 发布日期:2021-01-22
  • 作者简介:马佳佳(1997-),女,硕士研究生,主研方向为属性基加密;张志强,硕士研究生;曹素珍,副教授、硕士;窦凤鸽、丁晓晖,硕士研究生;王彩芬,教授、博士。

Distributed Attribute-Based Encryption Scheme Based on Fog Nodes

MA Jiajia1, ZHANG Zhiqiang1, CAO Suzhen1, DOU Fengge1, DING Xiaohui1, WANG Caifen2   

  1. 1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China;
    2. College of Big Data and Internet, Shenzhen University of Technology, Shenzhen, Guangdong 518118, China
  • Received:2020-11-20 Revised:2021-01-12 Published:2021-01-22
  • Contact: 国家自然科学基金(61662069,61662071)。 E-mail:576342353@qq.com

摘要: 为解决云存储中对用户访问数据权限划分笼统、细粒度化控制访问权限受限以及单授权机构中存在的单点失效问题,提出基于雾节点的分布式密文策略属性基加密方案。将数据的部分解密运算外包给雾节点,减少终端用户的计算开销,并由不同的属性授权机构为用户生成属性密钥,以适用于细粒度的访问控制要求,使用全局身份将属于特定用户的各种属性进行“捆绑”,防止各属性机构间的共谋攻击,同时引入权重属性简化访问结构,节省系统的存储空间。实验结果表明,基于判定性q-parallel BDHE问题证明了该方案的安全性,与基于区块链的多授权机构访问控制方案和mHealth中可追踪多授权机构基于属性的访问控制方案相比,该方案终端用户在解密阶段具有更小的计算开销。

关键词: 雾计算, 分布式授权, 密文策略, 权重属性, 解密外包

Abstract: The existing cloud storage schemes have multiple limitations, including the general division of user rights to access data, fine-grained control access permissions, and single point of failure in single authority.This paper proposes a distributed ciphertext-policy attribute-based encryption scheme based on fog nodes.In the scheme, part of the data decryption operations are outsourced to the fog nodes, reducing the computing overhead of the end users.Different attribute authorities generate attribute keys for users to meet the fine-grained access control requirements, and the attributes of a specific user are bundled together by using the global identity, which effectively prevents collusion attacks among various attribute agencies.At the same time, the introduction of the weight attribute simplifies the access structure and saves system storage space.The scheme is tested with the q-parallel BDHE deterministic problem, and the results have verified the security of the scheme.Compared with the blockchain-based multi-authority access control scheme and the attribute-based access control scheme of mHealth that can track multiple authorities, the proposed scheme reduces the computing overhead of the end users in the decryption phase.

Key words: fog computing, distributed authorization, ciphertext-policy, weight attribute, decryption outsourcing

中图分类号: