GAO Jian, ZENG Kang, JIN Heng-zhan, ZHOU Fu-cai. Data Access Control Scheme Based on CP-ABE in Cloud Storage[J]. Journal of Northeastern University:Natural Science, 2015, 36(10): 1416-1421.
[1]Cachin C,Keidar I,Shraer A.Trusting the cloud[J].ACM SIGACT News,2009,40(2):81-86. [2]Sahai A,Waters B.Fuzzy identity-based encryption[M].Heidelberg:Springer, 2005:457-473. [3]Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98. [4]Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//IEEE Symposium on Security and Privacy.Piscataway:IEEE,2007:321-334. [5]王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816.(Wang Peng-pian,Feng Deng-guo,Zhang Li-wu.CP-ABE scheme supporting fully fine-grained attribute revocation[J].Journal of Software,2012,23(10):2805-2816.) [6]Hohenberger S,Waters B.Attribute-based encryption with fast decryption[M].Berlin:Springer,2013:162-179. [7]Douceur J R,Adya A,Bolosky W J,et al.Reclaiming space from duplicate files in a serverless distributed file system[C]// The 22nd International Conference on Distributed Computing Systems.Piscataway:IEEE,2002:617-624. [8]Shamir A.How to share a secret[J].Communications of the ACM,1979,24(11):612-613.(上接第1415页)语义,索引策略及两种查询算法,并设计了基于分值剪枝及空间剪枝策略的优化机制,最后通过基于多个真实数据集的实验验证了所提算法的有效性.