计算机工程

• 安全技术 • 上一篇    下一篇

一种面向社交网络的细粒度密文访问控制方案

李春梅,杨小东,周思安,李 燕,王彩芬   

  1. (西北师范大学计算机科学与工程学院,兰州730070)
  • 收稿日期:2014-03-21 出版日期:2015-02-15 发布日期:2015-02-13
  • 作者简介:李春梅(1987 - ),女,硕士研究生,主研方向:网络安全;杨小东,副教授、博士;周思安、李 燕,硕士研究生;王彩芬, 教授、博士生导师。
  • 基金项目:
    国家自然科学基金资助项目(61262057,61163038,61063041);国家档案局科技计划基金资助项目(2014-X-33);甘肃省科技计 划基金资助项目(1308RJYA039);兰州市科技计划基金资助项目(2013-4-22);西北师范大学青年教师科研能力提升计划基金资助项目 (NWNU-LKQN-12-23)。

A Fined-grained Cryptograph Access Control Scheme for Social Network

LI Chunmei,YANG Xiaodong,ZHOU Sian,LI Yan,WANG Caifen   

  1. (College of Computer Science & Engineering,Northwest Normal University,Lanzhou 730070,China)
  • Received:2014-03-21 Online:2015-02-15 Published:2015-02-13

摘要: 针对社交网络的隐私保护问题,采用属性基加密算法,提出一种安全、高效、细粒度的社交网络访问控制方案,并建立社交网络体系结构。通过引入线性秘密共享方案构造访问控制策略,实现灵活的访问控制结构,利用重加密技术,将部分重加密工作转移给社交网络平台执行,在保证用户数据安全的前提下,降低用户的计算代价,通过分析非授权成员与授权成员之间的关系,判定非授权成员的访问权限,进而实现访问权限的传递,并分析方案的安全性和有效性。分析结果表明,与现有基于加密技术的隐私保护方案相比,该方案能提高访问结构的表达能力和解密效率。

关键词: 社交网络, 属性加密, 线性秘密共享方案, 访问控制, 代理重加密, 权限传递性

Abstract: A secure,efficient and fined-grained access control scheme using the attribute-based encryption algorithm is proposed to solve the problem of privacy protection in social network,and an architecture is designed in social network.The proposed scheme utilizes a Linear Secret Sharing Scheme(LSSS) to construct the access policies in order to achieve flexible access structure. The technique transfers most of computing overwork involved in re-encryption to social network platform,which greatly reduces the computational cost of users while keeping the data security. The social network platform analyzes the relationship between the unauthorized users and authorized users to determine the access rights of unauthorized users. The proposed scheme can achieve the transitivity of the access rights. Finally,the performance and security of the proposed scheme are analyzed. Analysis results show that,compared with existing privacy protection schemes based on encryption technique,this scheme can improve efficiency in expression and decryption efficiency.

Key words: social network, attribute encryption, Linear Secret Sharing Scheme ( LSSS ), access control, proxy reencryption, permission transitivity

中图分类号: