收稿:2025-08-07,
修回:2025-11-03,
录用:2025-12-02,
移动端阅览
面向可信数据空间的基于属性加密的数据安全托管方案[J/OL]. 电信科学, 2026.
A Data Security Hosting Scheme Based on Attribute-Based Encryption for Trusted Data Space[J/OL]. Telecommunications Science, 2026.
面向可信数据空间的基于属性加密的数据安全托管方案[J/OL]. 电信科学, 2026. DOI: 10.11959/j.issn.1000-0801.170.
A Data Security Hosting Scheme Based on Attribute-Based Encryption for Trusted Data Space[J/OL]. Telecommunications Science, 2026. DOI: 10.11959/j.issn.1000-0801.170.
可信数据空间是促进数据流通利用,充分释放数据要素价值的重要基础设施。可信数据空间的构建面临可信数据空间运营方、数据托管方、数据提供方、数据使用方等多个参与方之间的协同问题,数据以外包方式流通过程中的隐私保护问题,以及数据“三权”(数据持有权、数据使用加工权、数据产品经营权)分置在可信数据空间中的实现问题。针对上述问题,本文提出了一种面向可信数据空间的基于属性加密的数据安全托管方案。方案设计了可信数据运营方对数据托管方的授权机制,并将数据托管方授权证书嵌入基于属性加密的访问控制过程中,在访问控制过程中实现对数据托管方的认证;在基于属性访问控制的基础上增加基于权限的访问控制结构,实现可信数据空间中的“三权”分置。安全性分析及实验证明,本方案实现开销较小且能够提供不低于CP-ABE的安全性,具备在可信数据空间中良好的应用价值。
The trusted data space is an important infrastructure for promoting data circulation and utilization
and fully releasing the value of data elements. The construction of trusted data spaces faces issues such as coordination among multiple participants including trusted data space operators
data custodians
data providers and data users; privacy protection in the process of data circulation through outsourcing; and the implementation of “the separation of three rights” (right to hold data resources
right to use and process data
right to operate data products) of data in trusted data spaces. To address the above issues
this paper proposes an attribute-based encryption (ABE)-based data security custody scheme for trusted data spaces. The scheme designs an authorization mechanism for trusted data operators to data custodians
and embeds the data custodian's authorization certificate into the access control process based on ABE
thereby realizing the authentication of data custodians during access control. In addition
on the basis of attribute-based access control
a permission-based access control structure is added to realize the separation of three rights in the trusted data space. Security analysis and experiments show that the proposed scheme has low implementation overhead
can provide security not lower than that of CP-ABE
and has good application value in trusted data spaces.
吴国威 , 樊宁 , 汪来富 , 等 . 云环境下基于属性加密体制算法加速方案 [J]. 电信科学 , 2019 , 35 ( 11 ): 7 . DOI: 10.11959/j.issn.1000-0801.2019145 http://dx.doi.org/10.11959/j.issn.1000-0801.2019145 .
潘洁 , 侯慧芳 , 陈曦 , 等 . 面向算力网络的多方安全协同线性回归研究 [J]. 电信科学 , 2024 , 40 ( 8 ): 162 - 171 . DOI: 10.11959/j.issn.1000-0801.2024204 http://dx.doi.org/10.11959/j.issn.1000-0801.2024204 .
V.Goyal , O.Pandey , A.Sahai , B.Waters , “ Attribute-based encryption for fine grained access control of encrypted data ,” CCS. , 89–98,2006.
J.Bethencourt , A.Sahai , B.Waters , “ Ciphertext-policy attribute-based encryption ,” IEEE S&P. , 321–334, 2007.
M. Chase , “ Multi-authority attribute based encryption ,” Theory of Cryptography ,pp. 515 – 534 , 2007
M. Chase and S. Chow , “ Improving privacy and security in multiauthority attribute-based encryption ,” in Proceedings of the 16th ACM conference on Computer and communications security , 2009, pp. 121 – 130 .
Ming Li , Shucheng Yu , Yao Zheng , Kui Ren , and Wenjing Lou , “ Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption ,” IEEE Transactions on parallel and distributed systems , Volume 24, No. 1 , 2013.
Thakur A , Ranga V , Agarwal R . Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain [J]. Concurrency & Computation: Practice & Experience , 2025 , 37 . DOI: 10.1002/cpe.70064 http://dx.doi.org/10.1002/cpe.70064 .
Luo W , Lv Z , Yang L , et al . FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things [J]. IEEE sensors journal , 2024 ( 18 ): 24 . DOI: 10.1109/JSEN.2024.3432276 http://dx.doi.org/10.1109/JSEN.2024.3432276 .
Zhou T , Tang Z , Zeng S , et al . Deduplication-enabled CP-ABE with revocation [J]. Peer-to-Peer Networking and Applications , 2025 , 18 ( 2 ). DOI: 10.1007/s12083-024-01863-z http://dx.doi.org/10.1007/s12083-024-01863-z .
Sensors , Journal of . Retracted: Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain [J]. Journal of Sensors , 2023 . DOI: 10.1155/2023/9865746 http://dx.doi.org/10.1155/2023/9865746 .
徐小龙 , 张栖桐 , 周静岚 . NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems [J]. 中南大学学报:英文版 , 2017 , 24 ( 4 ): 12 . DOI: 10.1007/s11771-017-3483-z http://dx.doi.org/10.1007/s11771-017-3483-z .
Li J , Yao W , Han J , et al . User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J]. IEEE Systems Journal , 2017 : 1 - 11 . DOI: 10.1109/JSYST.2017.2667679 http://dx.doi.org/10.1109/JSYST.2017.2667679 .
Wang H , He D , Shen J , et al . Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps [J]. Soft Computing , 2017 . DOI: 10.1007/s00500-017-2488-8 http://dx.doi.org/10.1007/s00500-017-2488-8 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621