Vol.5 No.3 (June 2015)
An Access Control Method Based on HABE Applying in Smart Grid
There will be huge amount of real-time sensing data in the smart grid system, which would be a huge burden in storing and processing them for the data center, and the property of cloud compu-ting could just fix it up, so the integration of cloud computing and smart grid makes sense. There is private and sensitive information which can’t be known or falsified by a third party including the cloud servers in the data center, so the paper proposed an access control method that is based on the Hierarchical Attribute Based Encryption (HABE), which can control the access of the sensitive data storing on the cloud servers effectively.
谢远鹏 , 文 红 (2015) 应用于智能电网中的基于层次属性加密访问控制方法。 智能电网， 5， 93-99. doi: 10.12677/SG.2015.53012
 余贻鑫, 栾文鹏 (2009) 智能电网. 电网与清洁能源, 1, 7-11.
 Horwitz, J. and Lynn, B. (2002) Toward hierar-chical identity-based encryption. Advances in Cryptology—EUROCRYPT 2002, Springer Berlin Heidelberg, 466-481.
 Bethencourt, J., Sahai, A. and Waters, B. (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy, 2007. SP'07, IEEE, 321-334.
 Shamir, A. (1985) Identity-based cryptosystems and signature schemes. Advances in Cryptology, Springer Berlin Heidelberg, 47-53.
 王小明, 付红, 张立臣 (2010) 基于属性的访问控制研究进展. 电子学报, 7, 1660-1667.
 Goyal, V., Pandey, O., Sahai, A., et al. (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and Communications Security. ACM, 89-98.
 Gentry, C. and Silverberg, A. (2002) Hierarchical ID-based cryptography. Advances in Cryptology—ASIACRYPT 2002, Springer Berlin Heidelberg, 548-566.
 Müller, S., Katzenbeisser, S. and Eckert, C. (2009) Distributed attribute-based encryption. Information Security and Cryptology—ICISC 2008, Springer Berlin Heidelberg, 20-36.