应用于智能电网中的基于层次属性加密访问控制方法
An Access Control Method Based on HABE Applying in Smart Grid

作者: 谢远鹏 , 文 红 :电子科技大学通信抗干扰国家级重点实验室,四川 成都;

关键词: 智能电网访问控制层次属性加密Smart Grid Access Control HABE Encryption

摘要:
智能电网系统拥有海量的实时采集数据,这会给电网数据中心带来巨大的存储和计算负担,而云计算的特点正是拥有强大的存储和计算能力,因此智能电网和云计算的结合能极大提高智能电网的数据存储能力和计算的有效性。由于电网数据中有隐私敏感信息,不能被包括云服务器在内的第三方窥伺和篡改。本文提出一种基于层次属性加密(HABE)的访问控制方法,能有效地实现对存放在云平台的敏感电网数据的访问控制。

Abstract: There will be huge amount of real-time sensing data in the smart grid system, which would be a huge burden in storing and processing them for the data center, and the property of cloud compu-ting could just fix it up, so the integration of cloud computing and smart grid makes sense. There is private and sensitive information which can’t be known or falsified by a third party including the cloud servers in the data center, so the paper proposed an access control method that is based on the Hierarchical Attribute Based Encryption (HABE), which can control the access of the sensitive data storing on the cloud servers effectively.

文章引用: 谢远鹏 , 文 红 (2015) 应用于智能电网中的基于层次属性加密访问控制方法。 智能电网, 5, 93-99. doi: 10.12677/SG.2015.53012

参考文献

[1] 余贻鑫, 栾文鹏 (2009) 智能电网. 电网与清洁能源, 1, 7-11.

[2] Horwitz, J. and Lynn, B. (2002) Toward hierar-chical identity-based encryption. Advances in Cryptology—EUROCRYPT 2002, Springer Berlin Heidelberg, 466-481.

[3] Bethencourt, J., Sahai, A. and Waters, B. (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy, 2007. SP'07, IEEE, 321-334.

[4] Shamir, A. (1985) Identity-based cryptosystems and signature schemes. Advances in Cryptology, Springer Berlin Heidelberg, 47-53.

[5] 王小明, 付红, 张立臣 (2010) 基于属性的访问控制研究进展. 电子学报, 7, 1660-1667.

[6] Goyal, V., Pandey, O., Sahai, A., et al. (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and Communications Security. ACM, 89-98.

[7] Gentry, C. and Silverberg, A. (2002) Hierarchical ID-based cryptography. Advances in Cryptology—ASIACRYPT 2002, Springer Berlin Heidelberg, 548-566.

[8] Müller, S., Katzenbeisser, S. and Eckert, C. (2009) Distributed attribute-based encryption. Information Security and Cryptology—ICISC 2008, Springer Berlin Heidelberg, 20-36.

分享
Top