CHEN Wei, WANG Yi, QIN Zhi-guang, LIU Xin-zhong. Research on Timed Access of Sensitive Data Based on Dual Encryption[J]. Journal of University of Electronic Science and Technology of China, 2017, 46(3): 588-593. doi: 10.3969/j.issn.1001-0548.2017.03.018
Citation:
|
CHEN Wei, WANG Yi, QIN Zhi-guang, LIU Xin-zhong. Research on Timed Access of Sensitive Data Based on Dual Encryption[J]. Journal of University of Electronic Science and Technology of China, 2017, 46(3): 588-593. doi: 10.3969/j.issn.1001-0548.2017.03.018
|
Research on Timed Access of Sensitive Data Based on Dual Encryption
- Received Date: 2015-12-18
- Rev Recd Date:
2016-05-09
- Publish Date:
2017-06-15
-
Abstract
A timed access solution of sensitive data based on dual encryption scheme is proposed to solve the problem of timed deletion of shared sensitive data stored in outsourcing storage. In our solution, the shared sensitive data file is encrypted by symmetric encryption, and the encrypted file is randomly divided to form the extracted cipher component and the encapsulated cipher component. Then, the attribute based timed encryption algorithm is used to encrypt the symmetric key and extracted cipher component, which can generate access control object. Finally, the encapsulated cipher component is combined with the access control object and sent into the cloud server. By this scheme, the authorized user can decrypt the access control object in the time limitation, obtain the symmetric key and extract cipher component, compose the original ciphertext, and recover the plaintext. Once access windows period expire, any users are unable to decrypt the access control object, get the symmetric key, recover the plaintext, so as to realize the timed destruction of sensitive data. The security of the scheme is analyzed and proved by the adversary attack model.
-
References
[1]
|
GEAMBASU R, KOHNO T, LEVY A, et al. Vanish: Increasing data privacy with self-destruction data[C]//Prof of 18th USENIX Security Symp. Berkeley, USA: USENIX Association, 2009: 299-315. |
[2]
|
ZENG Ling-fang, SHI Zhan, XU Sheng-jie, et al. SafeVanish: an improved data self-destruction for protecting data privacy[C]//Prof of the 2nd Int Conf on Cloud Computing Technology and Science. Piscataway, NJ: IEEE, 2010: 521-528. |
[3]
|
WANG Guo-jun, YUE Fang-shun, LIU Qin. A secure selfdestructing shemefor electronic data[J]. Journal of Computer and System Sciences, 2013, 79(2): 279-290. doi: 10.1016/j.jcss.2012.05.008 |
[4]
|
XIONG Jin-bo, YAO Zhi-qiang, MA Jian-feng, et al. A secure document self-destruction scheme with identity based encryption[C]//Prof of the 5th Int Conf on the Intelligent Networking and Collaboratives Systems. Piscataway, NJ: IEEE, 2013: 239-243. |
[5]
|
熊金波, 姚志强, 马建峰, 等.面向网络内容隐私的基于身份加密的安全自毁方案[J].计算机学报, 2014, 37(1): 139-150. http://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201401012.htm
XIONG Jin-bo, YAO Zhi-qiang, MA Jian-feng. et al. A secure self-destruction scheme with IBE for the internet content privacy[J]. Chinese Journal of Computers, 2014, 37(1): 139-150. http://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201401012.htm |
[6]
|
姚志强, 熊金波, 马建峰, 等.云计算中一种安全的电子文档自毁方案[J].计算机研究与发展, 2014, 51(7): 1417-1423. doi: 10.7544/issn1000-1239.2014.20131870
YAO Zhi-qiang, XIONG Jin-bo, MA Jian-feng, et al. A secure electronic document self-destruction scheme in cloud computing[J]. Journal of Computer Reseach and Development, 2014, 51(7): 1417-1423. doi: 10.7544/issn1000-1239.2014.20131870 |
[7]
|
RIVEST R L, SHAMIR A, WAGNER D A. Time-lock puzzles and timed-released crypto[EB/OL]. [2015-02-14].http://dl.acm.org/citation.cfm?id=888615. |
[8]
|
CHAN A F, BLAKE I F. Scalable, server-passive, useranonymous timed release cryptography[C]//Proc of the 25th on Distributed Computing Systems. Piscataway, NJ: IEEE, 2055: 504-513. |
[9]
|
CHALKIAS K, HRISTU-VARSAKELIS D, STEPHANIDES G. Improved anonymous timed-release encryption[C]// LNCS 4734: Proc of the 12th European Symp on Research in Computer Security. Berlin: Springer, 2007: 311-326. |
[10]
|
DENT A W, TANG Q. Revisiting the security model for timed-release encryption with pre-open capability[C]// LNCS 4779: Proc of the Information Security. Berlin: Springer, 2007: 158-174. |
[11]
|
KIKUCHI R, FUJIOKA A, OKAMOTO Y, et al. Strong security notions for timed-release public-key encryption revisited[C]//LNCS 5324: Proc of the Provable Security. Berlin: Springer, 2012: 88-108. |
[12]
|
CHOW S S, YIU S M. Timed-release encryption revisited[C]//LNCS 5324: Proc of the Provable Security. Berlin: Springer, 2008: 38-51. |
[13]
|
LIU Qin, WANG Guo-jun, WU Jie. Timed-based proxy re-encryption scheme for secure data sharing in a cloud computing environment[J]. Information Sciences, 2014, 258(3): 355-370. |
-
-
Proportional views
-