高级检索
    姚志强, 熊金波, 马建峰, 李 琦, 刘西蒙. 云计算中一种安全的电子文档自毁方案[J]. 计算机研究与发展, 2014, 51(7): 1417-1423.
    引用本文: 姚志强, 熊金波, 马建峰, 李 琦, 刘西蒙. 云计算中一种安全的电子文档自毁方案[J]. 计算机研究与发展, 2014, 51(7): 1417-1423.
    Yao Zhiqiang, Xiong Jinbo, Ma Jianfeng, Li Qi, Liu Ximeng. A Secure Electronic Document Self-Destructing Scheme in Cloud Computing[J]. Journal of Computer Research and Development, 2014, 51(7): 1417-1423.
    Citation: Yao Zhiqiang, Xiong Jinbo, Ma Jianfeng, Li Qi, Liu Ximeng. A Secure Electronic Document Self-Destructing Scheme in Cloud Computing[J]. Journal of Computer Research and Development, 2014, 51(7): 1417-1423.

    云计算中一种安全的电子文档自毁方案

    A Secure Electronic Document Self-Destructing Scheme in Cloud Computing

    • 摘要: 针对长期存储在云端定时发布的电子文档容易导致隐私信息泄露的问题,提出基于身份的定时发布加密文档自毁方案.该方案首先采用对称密钥加密电子文档,其密文经过提取算法变为提取密文和封装密文;然后采用基于身份定时发布加密(identity-based timed-release encryption, ITE)算法加密对称密钥,其密文结合提取密文产生密文分量并分发到分布式Hash表(distributed Hash table, DHT)网络,封装密文被封装成电子文档自毁对象后存储在云端.仅当到达预订的发布时间时,授权用户才能访问受保护的电子文档;且当超过一定的时间期限时,分布式Hash表网络将自动丢弃所存密文分量,使得原始密钥不可恢复,实现电子文档安全自毁.安全分析表明,该方案能够同时抵抗来自云端的密码分析攻击和来自DHT网络的Sybil攻击;实验结果表明,该方案的计算代价要小于已有方案,具有较高的效率.

       

      Abstract: The timed-released electronic documents stored in cloud servers for a long time become increasingly easy to leak privacy information to the Internet. To overcome this problem, we develop a novel two-step scheme for self-destructing electronic document by using identity-based timed-release encryption (ITE), referred to as ESITE. In the first step, we use symmetric key to encrypt the electronic document. Thus, we can obtain an extracted ciphertext and an encapsulated ciphertext by using an extraction algorithm. Secondly, we use ITE algorithm to encrypt the symmetric key. On one hand, we get the ciphertext shares and distribute it into the distributed Hash table (DHT) network by combining key’s ciphertext and the extracted ciphertext. On the other hand, the encapsulated ciphertext is stored in cloud servers after being encapsulated into a self-destructing object. There are two advantages for the proposed scheme. First, we can only access the protected electronic document when the desired release time arrived . Second, the original decryption key cannot be recovered after a certain period of time. The reason is that DHT network will discard the stored ciphertext shares automatically, so the function of self-destruction is implemented safely. Security analysis shows that the proposed ESITE scheme is able to resist against cryptanalysis attacks from the cloud servers and the Sybil attacks from the DHT network. Experimental results demonstrate that the computational overheads of the proposed scheme is much lower than existing schemes.

       

    /

    返回文章
    返回