• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Privacy Protection Based Access Control Scheme in Cloud-Based Services

    2017-05-08 11:31:35KaiFanQiongTianJunxiongWangHuiLiYintangYang
    China Communications 2017年1期
    關(guān)鍵詞:華東政法副館長(zhǎng)上海師范大學(xué)

    Kai Fan, Qiong Tian, Junxiong Wang, Hui Li, Yintang Yang

    1 State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, 710071, China

    2 Key Lab.of the Minist.of Educ.for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi’an, 710071, China

    * The corresponding author, email: kfan@mail.xidian.edu.cn

    I.INTRODUCTION

    With the rapid development of cloud computing, big data and public cloud services have been widely used.Users can store their data in the cloud service and rely on the cloud service provider to give data access to other users.However, the cloud service provider can no longer be fully trusted.Because it may give data access to some illegal users or attackers for profit gain.For users, it is necessary to take full advantage of cloud storage service,and also to ensure data privacy.Therefore,the study of access control scheme to protect users’ privacy in cloud environment is of great significance.Since traditional access control strategy [1] cannot effectively solve the security problems that exist in data sharing, various schemes to achieve encryption and decryption of data sharing have been proposed.In 2007, Bethencourt et al.[2] first proposed the ciphertext policy attribute-based encryption(CP-ABE).However, this scheme does not consider the revocation of access permissions.Attrapadung et al.[3, 4] came up with two user-revocable ABE scheme.However, they are not applicable in the outsourcing environment.In 2011, Hur et al.[5] put forward a finegrained revocation scheme, but it can easily cause key escrow issue.Lewko et al.[6] used multi-authority ABE (MA-ABE) to solve key escrow issue.But the access policy is not flexible.Later, Li et al.[7] presented a data sharing scheme based on systemic attribute encryption,which endows different access permissions to different users.However, it lacks of efficiency.Xie et al.[8] presented a revocable CPABE scheme.Compared with Hur’s scheme,in the key update phase, the computation load of the data service manager will be reduced by half.Liang et al.[9] proposed a CP-ABE proxy encryption scheme which supports any monotonic access structures.However, their construction which is built in the composite order bilinear group cannot be converted to the prime order bilinear group.In 2014, Chu et al.[10] proposed Key-Aggregate Encryption algorithm, which effectively shortens the length of the ciphertext and the key, but only for the situation where the data owner knows user’s identity.The above schemes only focus on one aspect of the research, and do not have a strict uniform standard either.In this paper,we present a more systematic, flexible and efficient access control scheme.To this end, we make the following main contributions:

    1) We propose a novel access control system called PS-ACS, which is privilege separation based on privacy protection.To achieve read access permission, in PRD, the Key-Aggregate Encryption (KAE) scheme which greatly improves access efficiency is adopted.And in PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it.

    2) Compared with the MAH-ABE scheme which does not refer to the write access control, we exploit an Improved Attribute-based Signature (IABS) [11-13] scheme to enforce write access control in PRD.In this way, the user can pass the cloud server’s signature verification without disclosing the identity, and successfully modify the file.

    3) We provide security and performance analysis of our proposed PS-ACS scheme.The functionality and simulation results provide data security in acceptable performance impact, and prove the feasibility of the scheme.

    The remaining of this paper is organized as follows.We first provide some preliminaries in Section 2.In Section 3, we give the definition of the system model.Then, we present the access control scheme in PRD in Section 4 and the access control scheme in PUD in Section 5.Section 6 gives the security and the performance analysis of our scheme.Finally,the conclusion is given in Section 7.

    In this paper, the authors proposed an access control system(PS-ACS), which is privilege separation based on privacy protection.

    I.PRELIMINARIES

    In this section, we briefly describe some fundamental backgrounds used in this paper,including bilinear maps, access structure and linear secret sharing schemes (LSSS).

    2.1 Bilinear maps

    Definition 1 (Bilinear Maps)Letbe three cyclic groups of prime orderp.A bilinear map is a mapwith the following properties:

    2) Non-degeneracy: there existssuch that

    3) Computability: there is an efficient algorithm to computefor anyand

    2.2 Access structure

    Definition 2 (Access Structure [14])Letbe a set of parties.A collectionis monotone ififandthenAn access structure(respectively, monotone access structure) is a collection (respectively, monotone collection)of non-empty subsets ofThe sets inare called the authorized sets, and the sets not inare called the unauthorized sets.

    2.3 Linear secret sharing schemes

    Definition 3 (Linear Secret-Sharing Schemes (LSSS) [14])Letbe a secret sharing scheme over a set of partieswith realizing an access structure.We say thatis a linear secret sharing scheme overif:

    1) the piece of each party is a vector over

    2) during the generation of the pieces, the dealer chooses independent random variables, denoted, each one distributed uniformly overEach coordinate of the piece of every party is a linear combination ofand the secrets.That is, letMdenotes a matrix withlrows andncolumns.For the vectorand any authorized set, there exist constantssuch that, ifare valid shares of any secretsaccording to, thenwhere

    Table I Notations

    Fig.1 System framework

    III.SYSTEM MODEL

    As shown in Fig.1, our system model consists of Data owners, users in PRD, and users in PUD, a global certificate authority (CA), attribute authorities (AA) and the cloud service provider, which are defined as follows.

    1) The cloud service provider consists of two parts: data storage server and data service management.Data storage server is responsible for storing confidential data files, and data service management is in charge of controlling external users’ access to secret data and returning the corresponding ciphertext.

    2) In the actual cloud environment, CA manages multiple AAs, and each AA manages attributes in their own field.The attributes owned by the user are issued by different authorities.

    3) Users in private domain (PRD) have special privileges, such as family, personal assistant, close friends and partners.This domain has a small number of users and small scale attributes, and the data owner knows users’identities, which is easy to manage.

    4) In public domain (PUD), there exist a huge number of users with unknown identities and a lot of attributes owned by the user.

    5) Data Owner can develop different access control strategies based on the characteristics of users in public and personal domain, encrypt uploaded files using the corresponding encryption method and then send them to the cloud server.

    IV.ACCESS CONTROL SCHEME IN PRD

    Before introducing our proposed secure authentication protocol, we first make a statement for the notations used in the later, all of which are listed in Table 1.

    4.1 Read access control

    The PRD has a small number of users, and their identities are known to the owner.In general,the data owner only wants the users to access or modify parts of data files, and different users can access and modify different parts of the data.For example, the blogger can allow his friend to browse part of his private photos;enterprises can also authorize employees to access or modify part of sensitive data.This requires the data owner to grant users read or write access permission to some data.In Chen’s[15] MAH-ABE scheme, the CP-ABE is used to achieve the read access permission, but there are some defects to be considered.Firstly, since in PRD, each user has a close relationship with the owner and the number is small, there is no need to use the CP-ABE which is applicable to the scenario which has a lot of users, and their identities are unknown to the owner, while the KAE scheme is set for the small users with certain identities.Besides, the distribution and management of keys and attributes, encryption and decryption process of CP-ABE are much more complex compared with the KAE scheme.Therefore, the KAE scheme is adopted to achieve the read access permission which improves the access efficiency.

    Based on the above analysis, the paper uses the Key-Aggregate Encryption scheme to encrypt the data files to achieve different read access control.The specific application process of the KAE algorithm is as follows.

    1) System setup and file encryption.The system first runsSetupof KAE to establish the public system parameter and master key.Each owner classified the file by its data attribute, such as “photo files”, “blog files” and “game files”.Fig.2 shows the way to classify the files.Choose and label the files, denoted bynote that a file class i cannot be the subset of another file classThen the owner’s client application runs Encrypt of KAE using the public key and the number of classification file to encrypt the PHR files and sends them to the cloud.

    2) Access and key distribution.When the user sends access request to the cloud server,and his file index number is i , then the cloud server returns the corresponding encrypted classification file to the user.The owner authorized users access permission with the file index number denoted by j and sent the collection S of all the index number j to CA, CA generate an aggregate decryption key for a set of ciphertext classes via Extract of KAE and sent it to the corresponding user, Finally, any user with an aggregate key can decrypt any ciphertext whose class is contained in the aggregate key via Decrypt of KAE.

    Setup().The Setup algorithm takes as input a security parameterand the number of ciphertext typesn.The CA first chooses a random numberand forit computesThen it publishesas the public parameters.Each type of ciphertext is expressed with an index numberi, where

    KeyGen.The authority first randomly selects a numberand then outputs the public key asand keepsits master secret key.

    EncryptOn input the public parameterPP, the public keyPK, the file index numberi, the data filemand a random numberthe data owner computes the ciphertext as and then sends the ciphertext to the cloud server.

    Extract().The Extract algorithm is executed by the authority.On input the mastersecret keyMSKand a collectionSof the file index number which are authorized the access permission by the data owner.It outputs the aggregate key as

    Fig.2 Data file classification

    DecryptThe decryption algorithm takes as input the aggregate keythe setS, the file index numberiand the ciphertextCT.It recoversmas

    4.2 Write access control

    As Chen’s MAH-ABE scheme does not refer to the write access control, and in PRD some cases exist, for example, the owner needs his friends to modify his file after he read it.So we proposed the write access permission in PRD.For the user, the public key and file class label are all known, he can use the algorithm to encrypt the files after he modified, and then upload them to the cloud.But whether the cloud server saves the modified file is decided by the write access control policy.On the one hand, in the complex cloud environment, if a user’s modification operations are very frequent, maybe he is very important to the user,so that the user may be stricken from outside attacks.Therefore, the user worries the leak of identity after the signature.On the other hand, in the data sharing scheme, the separate access of read and write to the file is extremely important.In PRD, not all users who have read permissions also have write permissions to the files.Whether the user has write permissions to the file is decided by the data owner.Therefore, this paper selects the improved attribute-based signature (IABS) to determine the user’s write permission.

    The main structure of the scheme includes five parts: an authentication center (CA), the data owner, users, mediator and cloud servers.The CA is responsible for generating master key which is sent to the owner and system parameters which are shared for all users.The mediator holds part components of the signature keys and is responsible for the validity check of attributes and users.The data owner produces the signature tree and sends it directly to the cloud server.The user encrypts the modified files and signs them using the attribute-based signature, then uploads them to the cloud server.The cloud server verifies the attribute-based signature, if the authentication is successful, the user has permission to modify files and the cloud server stores the file.Own to the limited space we will omit the specific description of the IABS scheme in PRD.

    V.ACCESS CONTROL SCHEME IN PUD

    5.1 Overview

    The PUD is characterized by a huge number of users, a lot of attributes owned by the user,complexity management, and indefinite users’identity.In view of the above characteristics,the user can only have the read access permission.Although the attribute-based encryption scheme (CP-ABE) can achieve access control,it cannot meet the needs of complex cloud environment.In traditional CP-ABE scheme, there is only one attribute authority responsible for the management of attributes and distribution of keys.The authority may be a university registrar’s office, the company’s HR department or government educational organizations and so on.The data owner defines access policies and encrypts the data files in accordance with this policy.Each user is distributed a key related to his attribute.As long as the user’s attributes meet the access policy he can decrypt the file.However, if there is only one authority in the system and all public and private keys are issued by the authority.Two problems will appear in the practical application:

    1) In the practical cloud environment, there are a lot of authorities and each authority in their own field manages part of users’ attributes.The attributes owned by the user are issued from different authorities.For example,a data owner may want to share his medical data with a user who owns the doctor attribute issued by medical institutions and the medical researcher attribute by the clinic practice man-agement.Therefore, exploiting multi authority is more realistic in the practical scenarios.

    2) If there is only one authority, all the distribution of the keys are handed over by one trusted authority.The frequent interaction between the user and trust authority will not only bring bottlenecks for the system load capacity,but also increase the potential security risks.Therefore, multi authority ABE (MA-ABE) is used in this paper.

    To reduce the computation overhead of users in PUD, we propose an outsourcing decryption MA-ABE scheme.Firstly the data owner uploads the attribute-based encrypted data files to the cloud server.When a user requests the encrypted data from the cloud server, the cloud server will first check his transformation key.Only if the corresponding attributes satisfy the access structure, will the cloud server output a partially decrypted ciphertext and then sends it to the user.Finally,upon receiving the partially decrypted ciphertext, the user can use his private key to recover the message.The framework of this area is shown in Fig.3.

    5.2 Our construction

    Global SetupThe Global Setup algorithm takes as inputs a security parameterand a universe descriptionU.Letandbe the multiplicative groups with the same prime orderp, andbe the bilinear map.Letbe the generator ofandbe the generator ofLetbe a hash function such that the security will be modeled in the random oracle.The CA chooses a random numberand publishes the public parameters as

    Authority Setup(PP).EachAAfirst chooses two random exponentsthen publishes its public key asand keepsas its master secret key.Letdenote the set of all attributes managed byAA.For each attributechooses anIDnumberand then generates the public attribute keys as

    EncryptThe encryption algorithm takes as inputs the public parametersPP, the public keyPK, the relevant public attribute keysthe messagemand an LSSS access structureover all the selected attributes from the involved authorities.The encrypt algorithm first chooses a random encryption exponentand a random vectorwithsas its first entry, whereare used to share the encryption exponents.For, it computeswhereis the vector corresponding to thei-th row ofM.Then it randomly choosesand computes the ciphertext as

    KeyGenEach authority runs the key generation algorithm.On input the public parameterPP, the relevant public attribute keysthe master secret keyMSKand a set of attributes managed by the authorityS, it outputs the transformation keys as

    Transform.The transformation algorithm takes as input the transformation keyTKand a ciphertextCT.IfSdoes not satisfy the access structure, it outputs.Oth-erwise it chooses a set of constantssuch that ifare valid shares of the secretsaccording toM, thenwhereThen the cloud server computes

    Fig.3 Access control framework of PUD

    and sends the partially decrypted ciphertextto the corresponding user.

    本次比賽得到了各參賽館的高度重視,中共上海市委黨校圖書館館長(zhǎng)唐月娥和副館長(zhǎng)李敏、上海財(cái)經(jīng)大學(xué)圖書館書記戴洪霞、上海對(duì)外經(jīng)貿(mào)大學(xué)圖書館館長(zhǎng)王群、上海中醫(yī)藥大學(xué)圖書館黨總支書記兼副館長(zhǎng)石德響、復(fù)旦大學(xué)圖書館副書記史衛(wèi)華、同濟(jì)大學(xué)圖書館副書記危紅、華東師范大學(xué)圖書館副館長(zhǎng)周健、華東政法大學(xué)圖書館副館長(zhǎng)吳志鴻、上海師范大學(xué)圖書館副館長(zhǎng)莊雷、上海工程技術(shù)大學(xué)圖書館副館長(zhǎng)盛芳和王鎮(zhèn)、上海健康醫(yī)學(xué)院圖書館副館長(zhǎng)柳麗花、奉賢區(qū)圖書館副館長(zhǎng)浦颯、松江區(qū)圖書館副館長(zhǎng)奚建治等出席并擔(dān)任各獎(jiǎng)項(xiàng)頒獎(jiǎng)嘉賓。

    DecryptThe decryption algorithm takes as input the partially decrypted ciphertextand a user private keySK.It computes

    Notice that since the ciphertext is already partially decrypted by the cloud server, the user only needs one exponentiation operation to recover the message.

    RekeyUpdateThe involved authority first generates a newIDnumberIt then computes the public attribute update key asAfter that, it appliesto compute the transformation update key asfor each non-revokeduser who has the attributeand the ciphertext update key asThen the authority updates the public attribute key of the revoked attribute asand broadcast a message for all data owners such that they can get the updated public attribute key of the revoked attribute.Thenandare sent to the cloud server to updateTKandCT.

    Table II Comparison of security

    Table III Notations for performance analysis

    TKUpdate.Upon receiving the transformation update keythe cloud server runs the transformation key update algorithm to update the corresponding transformation keys asfor each non-revoked user who has the attribute

    Thus the transformation keyTKcan be updated as

    ReEnc.Upon receiving the ciphertext update keythe cloud server runs the ciphertext re-encryption algorithm to update the corresponding ciphertext as

    VI.ANALYSIS OF OUR SCHEME

    In this section, we present the security analysis and performance analysis of our access control system (PS-ACS).

    6.1 Security analysis

    In PRD, users can only decrypt the files corresponding to the received aggregate keys and do not have access to other files, thus the data owner controls the users’ access permissions.When the data file is modified, although CA is trusted, the system parameters and revocation instructions are generated by the CA.The signature policy is formulated by the data owner and is sent directly to the cloud server.The CA does not know the signature policy.Assuming that CA cannot give itself authorization, as long as the attributes of CA cannot satisfy the access policy, it is not valid to modify the file.Thus, the write access permissions still belong to the data owner.In the process of the users’signature, the signature key is only related to the users’ attributes, so the user’s identity is secure.On the whole, the IABS scheme can protect users’ identity privacy.

    In addition, our scheme also achieves forward and backward security.When a user is revoked, his transformation keys will be deleted by the cloud server.Thus, he can no longer receive the partially decrypted ciphertext and cannot recover the original message.On the other hand, when a new user joins to share the outsourced data, the ciphertext will be re-encrypt by the cloud server so that he can also decrypt the cipthertext.Therefore, the forward and backward security of the outsourced data can be guaranteed.

    We compare our scheme with several existing multi-authority CP-ABE schemes in Table 2 in terms of the access structure type, user domains, the security against collusion attack and the support of revocation.

    From Table 2, we can conclude that our scheme achieves high efficiency of privacy protection.Compared with other schemes, we adopt outsourcing decryption method to reduce the overhead in user decryption phase.In our system, the transformation keys are stored on the cloud server, the collusion among users and between users and authorities both need to be considered.In our scheme, eachTKcontains a unique parameterzwhich is bind with the user.As eachzis different and it is kept secret to other users, different users cannot share theirTKsto make collusion attack.Thus, our scheme can prevent users’ collusion attack.On the other hand, although the cloud server transforms the ciphertext into an El-Gamal-style ciphertext, as the ciphertext is associated withzwhich he does not know, he still learns nothing about the original message.Therefore, our scheme can prevent the server attack.On the whole, our scheme can achieve privacy protection in PUD.

    6.2 Performance analysis

    We first make a statement for the notations used in the performance analysis, which are listed in Table 3.

    In our KAE scheme in the PRD, the system parameters are generated by the trusted authority, which is not within our consideration.Moreover,can be calculated in the system setup phase.In addition, the aggregate key only needs one pairing operation, and to calculate a pairing operation is very fast, the specific comparison can be seen in Fig.4.

    In Fig.4, the attribute-based encryption algorithm of the MAH-ABE scheme spent much more time than the KAE algorithm used in our scheme.If the attribute revocation occurs,the ABE algorithm will be more time-consuming.More importantly, the growth rate of time spent with the number of file attributes is much higher than KAE algorithm.The simu-lation results show the high efficiency of our scheme.

    Table IV Comparison of communication cost and computing time

    Fig.5 The signature and authenticationtime of IABS

    In Fig.5, the user only needs a very short time to sign the modified files.While, the authentication time only makes up a small part,so the process of signature and authentication consume a very small time.Therefore, from the client’s perspective, the program is efficient.

    In PUD, we adopt outsourcing decryption method.We compare our scheme with Ruj’s scheme, and the results are shown in Table 4.Combined with Table 4, the performance analysis is given in the following aspects.

    ? Since the cloud server uses a set of transformation keys to transform the ABE ciphertext into a constant-size ElGamal-style ciphertext which is much smaller and easier to decrypt than an ABE ciphertext, the user only needs one exponential operation to recover the message.From Table 4, it is obvious that the method can greatly reduce the overhead of users.

    ? Our scheme supports efficient user and attribute revocation without updating users’ private keys.For user revocation, we do not need to re-encrypt the ciphertext and update all non-revoked users’ private keys.Instead, we only need to delete the user’s transformation keys.Without the transformation key, he can no longer decrypt the ciphertext.On the other hand, when attribute revocation occurs, private keys of all non-revoked users will not be updated, only the transformation keys which are stored in the cloud server and the involved ciphertext need to be updated.Thus, the effi-ciency of revocation can be greatly improved.

    We implemented our construction in Charm[18], a framework developed to facilitate the rapid prototyping of cryptographic schemes and protocols.It is based on the Python language which allows the programmer to write code similar to the theoretical implementations.However, the routines that implement the dominant group operations use the PBC library [19](written natively in C) and the time overhead imposed by the use of Python is usually less than 1%.Charm also provides routines for applying and using LSSS schemes needed for Attribute-Based systems.For more information on Charm we refer the reader to [18, 20].All our implementations are executed on an Intel?Pentium? CPU G630@270GHz with 4.00GB RAM running Ubuntu14.04 and Python2.7.

    We compared the computing time incurred in encryption and decryption.In Fig.6, the number of authorities is set to 10.It is obvious that our scheme requires less time for encryption and decryption than Ruj’s scheme, especially for decryption.Since in the decryption phase,major computation overhead is delegated to the cloud, user only needs one exponentiation operation to recover the original message.

    Therefore, the decryption time for users can be greatly reduced.Computing cost for transformation is shown in Fig.7.On the whole, it can be concluded that our scheme’s computation efficiency is much better than Ruj’s scheme.

    VII.CONCLUSION

    In this paper, we proposed an access control system (PS-ACS), which is privilege separation based on privacy protection.Through the analysis of cloud environment and the characteristics of the user, we divide users into personal domain (PRD) and public domain(PUD) logically.In PRD, we set read and write access permissions for users respectively.To achieve read access permission, the KAE scheme which can improve the access efficiency is adopted.A high degree of patient privacy is guaranteed simultaneously by using IABS scheme which can determine users’write access permission.For users in PUD, we constructed a new multi-authority ciphertext policy attribute-based encryption (CP-ABE)scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it.The analysis and the simulation result show that the PSACS scheme is feasible and superior to protect the privacy of data in cloud-based services.

    ACKNOWLEDGEMENT

    This work has been financially supported by the National Natural Science Foundation of China (No.61303216, No.61272457, No.U1401251, and No.61373172), the National High Technology Research and Development Program of China (863 Program) (No.2012AA013102), and National 111 Program of China B16037 and B08038.

    Fig.6 Comparison of Encryption and Decryption Time

    Fig.7 Computing cost for transformation

    Reference

    [1] YU SH, WANG C, REN K, “Achieving Secure,Scalable, and Fine-Grained Data Access Control in Cloud Computing”,Proceedings of IEEE Con-ference on Information Communications 2010,pp.1-9, 2010.

    [2] BETHENCOURT J, SAHAI A, WATERS B, “Ciphertext-Policy Attribute-based Encryption”,IEEE Symposium on Security and Privacy, vol.2008,no.4, pp.321-334, 2007.

    [3] ATTRAPADUNG N, IMAI H, “Conjunctive Broadcast and Attribute-Based Encryption”,Proceedings of Pairing-based Cryptography - Pairing 2009, vol.5671, pp.248-265, 2009.

    [4] ATTRAPADUNG N, IMAI H, “Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes”,Proceedings of Cryptography and Coding 2009, pp.278-300, 2009.

    [5] HUR J, NOH D K, “Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems”,IEEE Transactions on Parallel and Distributed Systems, vol.22, no.7, pp.1214-1221, 2011.

    [6] LEWKO A, WATERS B, “Decentralizing Attribute-based Encryption”,Proceedings of Advances in Cryptology-EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques,pp.568-588, 2011.

    [7] LI M, YU SH, ZHENG Y, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-based Encryption”,IEEE Transactions on Parallel and Distributed System, vol.24, no.1, pp.131-143, 2013.

    [8] XIE X, MA H, LI J, et al, “New Ciphertext-Policy Attribute-based Access Control with Efficient Revocation”,Proceedings ofInformation and Communication Technology 2013, pp.373-382,2013.

    [9] LIANG K, MAN H A, SUSILO W, et al, “An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing”,Information Security Practice and Experience, pp.448-461, 2014.

    [10] CHU C K, CHOW S S M, TZENG W G, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”,IEEE Transactions on Parallel and Distributed Systems, vol.25, no.2, pp.468-477, 2014.

    [11] LI J, KIM K, “Hidden Attribute-based Signatures without Anonymity Revocation”,Information Sciences, vol.180, no.9, pp.1681-1689, 2010.

    [12] MAJI H K, PRABHAKARAN M, ROSULEK M, “Attribute-based Signatures”,Proceedings of RSA Conference 2011, pp.376-392, 2011.

    [13] KUMAR S, AGRAWAL S, BALARAMAN S, et al, “Attribute based Signatures for Bounded Multi-level Threshold Circuits”,Proceedings of Public Key Infrastructures, Services and Applications-European Workshop, Europki 2010, pp.141-154, 2010.

    [14] BEIMEL A, “Secure Schemes for Secret Sharing and Key Distribution”,International Journal ofPure & Applied Mathematics, Research Thesis,1996.

    [15] CHEN D, SHAO J, FAN X, “MAH-ABE based Privacy Access Control in Cloud Computing”,Chinese Journal of Electronics, vol.42, no.4, pp.821-827, 2014.

    [16] NARAYAN S, GAGNé M, SAFAVI-NAINI R,“Privacy Preserving EHR System Using Attribute-based Infrastructure”,Proceedings of ACM Cloud Computing Security Workshop 2010, pp.47-52, 2010.

    [17] RUJ S, NAYAK A, STOJMENOVIC I, “DACC: Distributed Access Control in Clouds”,Proceedings of Trust, Security and Privacy in Computing and Communications 2011, pp.91-98, 2011.

    [18] AKINYELE J A, GREEN M, RUBIN A D, “Charm: A Framework for Rapidly Prototyping Cryptosystems”,Journal of Cryptographic Engineering, vol.3, no.2, pp.111-128, 2011.

    [19] LYNN B, “The Stanford Pairing based Crypto Library”, http://crypto.stanford.edu/pbc.

    [20] Charm, http://www.charm-crypto.com.

    猜你喜歡
    華東政法副館長(zhǎng)上海師范大學(xué)
    春日暖陽
    苗語典型存在動(dòng)詞初探
    發(fā)展教育,讓每一位師生都得到充分和諧的發(fā)展——上海師范大學(xué)附屬中學(xué)
    華東政法大學(xué) 大學(xué)只是我們成人之后的一個(gè)起點(diǎn)
    繪聲繪色 喝彩祖國
    ——2019“博看杯”朗讀大賽決賽在上海師范大學(xué)舉行
    上海師范大學(xué)學(xué)生篆刻作品入選全國大展
    網(wǎng)絡(luò)共同犯罪的刑法應(yīng)對(duì)及完善思路
    林怡副會(huì)長(zhǎng)會(huì)見新任印度駐華使館副館長(zhǎng)林凡
    友聲(2017年1期)2017-06-20 08:05:32
    圈套
    歲月(2016年11期)2016-05-30 10:48:04
    échange humain sous le contexte de la mondialisation
    男女下面进入的视频免费午夜| 久久99热6这里只有精品| 欧美成人精品欧美一级黄| 国产又黄又爽又无遮挡在线| 亚洲色图av天堂| 男女啪啪激烈高潮av片| 一级毛片电影观看 | 久久九九热精品免费| 欧美极品一区二区三区四区| 特级一级黄色大片| 国产三级在线视频| 欧美性猛交╳xxx乱大交人| 男插女下体视频免费在线播放| 一级黄片播放器| 成人一区二区视频在线观看| 久久久久久九九精品二区国产| av免费在线看不卡| 亚洲精品国产av成人精品| 欧美极品一区二区三区四区| www.av在线官网国产| 村上凉子中文字幕在线| 舔av片在线| 国产精品一区www在线观看| 最近最新中文字幕大全电影3| 成年版毛片免费区| 男人舔女人下体高潮全视频| 国产成人a∨麻豆精品| 精品日产1卡2卡| 午夜免费男女啪啪视频观看| 日韩欧美 国产精品| 91麻豆精品激情在线观看国产| 亚洲婷婷狠狠爱综合网| 亚洲国产精品国产精品| 成年女人看的毛片在线观看| 中文精品一卡2卡3卡4更新| 亚洲精品久久国产高清桃花| 国产又黄又爽又无遮挡在线| 99久久久亚洲精品蜜臀av| 美女黄网站色视频| 日韩欧美精品免费久久| 久久精品国产鲁丝片午夜精品| 黄色配什么色好看| 久久这里只有精品中国| 亚洲精品国产av成人精品| 国内久久婷婷六月综合欲色啪| 不卡视频在线观看欧美| 男女做爰动态图高潮gif福利片| 69人妻影院| 欧美丝袜亚洲另类| 看免费成人av毛片| 成人国产麻豆网| 女人十人毛片免费观看3o分钟| 国产v大片淫在线免费观看| 国产伦理片在线播放av一区 | 国内揄拍国产精品人妻在线| 91久久精品国产一区二区成人| 亚洲欧美精品综合久久99| 一个人看视频在线观看www免费| 2022亚洲国产成人精品| 国产黄色小视频在线观看| 成年免费大片在线观看| 色综合色国产| 婷婷六月久久综合丁香| 美女cb高潮喷水在线观看| 中文字幕人妻熟人妻熟丝袜美| 国产老妇女一区| 国产成人91sexporn| 毛片一级片免费看久久久久| 国产精品蜜桃在线观看 | 久久精品综合一区二区三区| 青春草国产在线视频 | 中文精品一卡2卡3卡4更新| 99久国产av精品国产电影| 国产亚洲av片在线观看秒播厂 | 午夜久久久久精精品| 变态另类成人亚洲欧美熟女| 亚洲18禁久久av| 国产精品久久久久久精品电影小说 | 一卡2卡三卡四卡精品乱码亚洲| 两性午夜刺激爽爽歪歪视频在线观看| 日本与韩国留学比较| 听说在线观看完整版免费高清| 人妻系列 视频| 国产精品人妻久久久久久| 日韩精品青青久久久久久| 舔av片在线| 色视频www国产| 国产伦一二天堂av在线观看| 色综合亚洲欧美另类图片| 中国美女看黄片| 九九爱精品视频在线观看| 国产精品一区二区在线观看99 | 国产亚洲av片在线观看秒播厂 | 高清毛片免费观看视频网站| 色视频www国产| 日韩一区二区视频免费看| 在线观看66精品国产| 亚洲自拍偷在线| 少妇的逼好多水| 一个人免费在线观看电影| 老司机影院成人| 欧洲精品卡2卡3卡4卡5卡区| 国产亚洲精品av在线| 寂寞人妻少妇视频99o| 不卡一级毛片| 91午夜精品亚洲一区二区三区| 日韩欧美精品v在线| 九色成人免费人妻av| 亚洲精品影视一区二区三区av| 成人av在线播放网站| 天堂影院成人在线观看| 亚洲在久久综合| 99久久久亚洲精品蜜臀av| 菩萨蛮人人尽说江南好唐韦庄 | 一区福利在线观看| 青春草亚洲视频在线观看| 春色校园在线视频观看| 国产v大片淫在线免费观看| 亚洲在线自拍视频| 中文字幕av成人在线电影| 91久久精品国产一区二区三区| 国产一区二区在线av高清观看| 精品久久国产蜜桃| 1024手机看黄色片| 人妻久久中文字幕网| 91狼人影院| 中文欧美无线码| 观看美女的网站| 亚洲成a人片在线一区二区| 国产精品野战在线观看| 高清午夜精品一区二区三区 | 亚洲av免费高清在线观看| 国产 一区 欧美 日韩| 少妇熟女aⅴ在线视频| 久久人人精品亚洲av| 欧美日韩乱码在线| 国产v大片淫在线免费观看| 国内精品一区二区在线观看| 18禁黄网站禁片免费观看直播| 欧美性猛交╳xxx乱大交人| 久久久久网色| 特大巨黑吊av在线直播| 国产在线男女| 日本黄色视频三级网站网址| 婷婷色综合大香蕉| 久久综合国产亚洲精品| 国产真实乱freesex| 亚洲精品乱码久久久v下载方式| 久久久久久久久久成人| 国产极品天堂在线| 国国产精品蜜臀av免费| 六月丁香七月| 欧美极品一区二区三区四区| 搞女人的毛片| 午夜福利在线在线| 一边亲一边摸免费视频| 好男人在线观看高清免费视频| 欧洲精品卡2卡3卡4卡5卡区| 身体一侧抽搐| 日韩强制内射视频| 一卡2卡三卡四卡精品乱码亚洲| 成人特级黄色片久久久久久久| 色综合站精品国产| 级片在线观看| av在线观看视频网站免费| 久久韩国三级中文字幕| 午夜久久久久精精品| 欧美最新免费一区二区三区| 成人特级av手机在线观看| 欧美3d第一页| 12—13女人毛片做爰片一| 免费观看人在逋| 国产大屁股一区二区在线视频| 国产爱豆传媒在线观看| 99久久无色码亚洲精品果冻| 看黄色毛片网站| 美女大奶头视频| 美女cb高潮喷水在线观看| 午夜免费男女啪啪视频观看| 日韩精品有码人妻一区| 秋霞在线观看毛片| 免费观看在线日韩| 亚洲欧美日韩卡通动漫| 小蜜桃在线观看免费完整版高清| 久久精品国产自在天天线| 欧美激情在线99| 成年av动漫网址| 一边摸一边抽搐一进一小说| 精品人妻偷拍中文字幕| 我的女老师完整版在线观看| 免费观看人在逋| 免费在线观看成人毛片| 可以在线观看毛片的网站| 高清午夜精品一区二区三区 | 好男人在线观看高清免费视频| 天堂影院成人在线观看| 成人特级黄色片久久久久久久| 成年女人永久免费观看视频| 久久精品久久久久久久性| 国产精品不卡视频一区二区| 日产精品乱码卡一卡2卡三| 国产一区二区在线av高清观看| 日韩亚洲欧美综合| 亚洲在线观看片| 边亲边吃奶的免费视频| 床上黄色一级片| 国产淫片久久久久久久久| 啦啦啦韩国在线观看视频| 悠悠久久av| 18禁在线播放成人免费| 又黄又爽又刺激的免费视频.| 久久久午夜欧美精品| 亚洲av第一区精品v没综合| 亚洲在线自拍视频| 日韩精品有码人妻一区| 久久精品国产亚洲网站| 国产精品一区二区性色av| 69人妻影院| 99精品在免费线老司机午夜| 国产私拍福利视频在线观看| 国产91av在线免费观看| av在线观看视频网站免费| 一本久久中文字幕| 国产伦理片在线播放av一区 | 特大巨黑吊av在线直播| 亚洲激情五月婷婷啪啪| 在现免费观看毛片| av天堂中文字幕网| 成人午夜高清在线视频| 中文资源天堂在线| 有码 亚洲区| 色尼玛亚洲综合影院| 99国产极品粉嫩在线观看| 最近手机中文字幕大全| 三级经典国产精品| 亚洲av第一区精品v没综合| 精品国内亚洲2022精品成人| 高清日韩中文字幕在线| 亚洲av电影不卡..在线观看| 日产精品乱码卡一卡2卡三| 亚洲va在线va天堂va国产| 伦精品一区二区三区| 又粗又硬又长又爽又黄的视频 | 国产精品无大码| 久久九九热精品免费| 少妇熟女aⅴ在线视频| 久久久久久国产a免费观看| 级片在线观看| 亚洲美女视频黄频| 嘟嘟电影网在线观看| 边亲边吃奶的免费视频| 久久九九热精品免费| 国产精品国产高清国产av| 97在线视频观看| 亚洲天堂国产精品一区在线| 久久这里只有精品中国| 国产一级毛片在线| 在线观看av片永久免费下载| 亚洲四区av| 国产白丝娇喘喷水9色精品| 国产一区二区三区在线臀色熟女| 国产欧美日韩精品一区二区| 亚洲国产欧美在线一区| 乱码一卡2卡4卡精品| 哪个播放器可以免费观看大片| 午夜爱爱视频在线播放| 天堂中文最新版在线下载 | 在线国产一区二区在线| 日韩欧美三级三区| 高清在线视频一区二区三区 | 爱豆传媒免费全集在线观看| 精品久久久久久久久久久久久| 黄片无遮挡物在线观看| 欧美色欧美亚洲另类二区| 日本-黄色视频高清免费观看| 丝袜美腿在线中文| 少妇熟女aⅴ在线视频| 91久久精品国产一区二区三区| 观看免费一级毛片| 国产精品久久久久久精品电影| 日韩亚洲欧美综合| 欧美最新免费一区二区三区| 毛片一级片免费看久久久久| 亚洲最大成人中文| 青青草视频在线视频观看| 免费一级毛片在线播放高清视频| 长腿黑丝高跟| 国产日韩欧美在线精品| 国产成年人精品一区二区| 亚洲精品乱码久久久v下载方式| 91aial.com中文字幕在线观看| 熟女人妻精品中文字幕| 一区二区三区高清视频在线| 男人和女人高潮做爰伦理| 国语自产精品视频在线第100页| 免费大片18禁| 国产亚洲精品av在线| 国产一区二区在线av高清观看| 久久人妻av系列| 亚洲欧洲国产日韩| 99热这里只有精品一区| 美女大奶头视频| 日韩一区二区三区影片| 蜜臀久久99精品久久宅男| 久久久国产成人免费| 全区人妻精品视频| 18禁裸乳无遮挡免费网站照片| 国产精品国产高清国产av| 超碰av人人做人人爽久久| 亚洲三级黄色毛片| 亚洲自偷自拍三级| 国产成人精品一,二区 | 成人综合一区亚洲| 国产精品人妻久久久影院| 国产在视频线在精品| 最新中文字幕久久久久| 女的被弄到高潮叫床怎么办| 亚洲成人精品中文字幕电影| a级毛色黄片| 欧美一区二区精品小视频在线| 中国美女看黄片| 九草在线视频观看| 国产精品久久久久久av不卡| 两性午夜刺激爽爽歪歪视频在线观看| 国产视频首页在线观看| 亚洲精华国产精华液的使用体验 | 欧美激情国产日韩精品一区| 午夜亚洲福利在线播放| 国产探花极品一区二区| 亚洲七黄色美女视频| 久久久久久久久久成人| 国产黄片视频在线免费观看| 看免费成人av毛片| 99久久无色码亚洲精品果冻| .国产精品久久| 色播亚洲综合网| 黄色一级大片看看| 亚洲精品影视一区二区三区av| 黄色配什么色好看| 国国产精品蜜臀av免费| 天堂av国产一区二区熟女人妻| 亚洲一级一片aⅴ在线观看| 国产精品久久电影中文字幕| 3wmmmm亚洲av在线观看| 精品日产1卡2卡| 国产精品无大码| 久久精品夜色国产| 免费看a级黄色片| 韩国av在线不卡| 久久精品人妻少妇| 韩国av在线不卡| 欧美又色又爽又黄视频| 少妇人妻精品综合一区二区 | 一级二级三级毛片免费看| 小蜜桃在线观看免费完整版高清| 久久久久久大精品| 国产亚洲精品av在线| 亚洲精品国产成人久久av| 午夜精品一区二区三区免费看| 菩萨蛮人人尽说江南好唐韦庄 | 欧美潮喷喷水| 丰满乱子伦码专区| 国产精品不卡视频一区二区| 观看美女的网站| 特级一级黄色大片| 欧美在线一区亚洲| 小说图片视频综合网站| 国产亚洲精品久久久com| 国产熟女欧美一区二区| 给我免费播放毛片高清在线观看| 边亲边吃奶的免费视频| 中文字幕精品亚洲无线码一区| 久久热精品热| 久久99热6这里只有精品| 免费看a级黄色片| 夜夜夜夜夜久久久久| 亚洲欧美精品专区久久| 亚洲av电影不卡..在线观看| 日韩欧美一区二区三区在线观看| 老师上课跳d突然被开到最大视频| 99热网站在线观看| 亚洲av成人精品一区久久| 国产高清视频在线观看网站| 亚洲av中文字字幕乱码综合| 欧美性感艳星| 久久久久国产网址| 久久午夜福利片| 国产老妇女一区| 男插女下体视频免费在线播放| 亚洲第一区二区三区不卡| 日韩亚洲欧美综合| 亚洲精品日韩在线中文字幕 | 免费av毛片视频| 在线播放国产精品三级| 国产高清视频在线观看网站| 午夜视频国产福利| 青青草视频在线视频观看| 日本熟妇午夜| 亚洲五月天丁香| 亚洲人成网站在线播放欧美日韩| 久久午夜亚洲精品久久| 91午夜精品亚洲一区二区三区| 韩国av在线不卡| 中文欧美无线码| 如何舔出高潮| 久久久久久久久大av| 国产精品麻豆人妻色哟哟久久 | 亚洲综合色惰| 大又大粗又爽又黄少妇毛片口| 国产一区二区激情短视频| 欧美最黄视频在线播放免费| 国产精品精品国产色婷婷| 国产免费男女视频| 少妇猛男粗大的猛烈进出视频 | 久久人人爽人人片av| 2021天堂中文幕一二区在线观| 国产精品伦人一区二区| 日韩精品有码人妻一区| 久久久久久久亚洲中文字幕| 国产精品三级大全| 日韩成人伦理影院| 99久久无色码亚洲精品果冻| 国产午夜福利久久久久久| av女优亚洲男人天堂| 欧美+亚洲+日韩+国产| 国产亚洲欧美98| 少妇被粗大猛烈的视频| 丝袜喷水一区| 一级毛片电影观看 | 在线天堂最新版资源| 欧美色视频一区免费| 欧美+亚洲+日韩+国产| 国产69精品久久久久777片| 看非洲黑人一级黄片| 午夜久久久久精精品| 天堂√8在线中文| 国产精品人妻久久久久久| 精品免费久久久久久久清纯| 亚洲成人av在线免费| 1024手机看黄色片| 亚洲乱码一区二区免费版| 欧美极品一区二区三区四区| av免费在线看不卡| 波多野结衣巨乳人妻| 免费看美女性在线毛片视频| 精品一区二区免费观看| 亚洲久久久久久中文字幕| 99热网站在线观看| a级一级毛片免费在线观看| 18禁在线播放成人免费| 黄色日韩在线| 麻豆成人午夜福利视频| 91aial.com中文字幕在线观看| 九九爱精品视频在线观看| 爱豆传媒免费全集在线观看| 97超碰精品成人国产| 岛国在线免费视频观看| 国产老妇女一区| 国产精品一区www在线观看| 2021天堂中文幕一二区在线观| 亚洲人成网站在线播| 我的女老师完整版在线观看| 小蜜桃在线观看免费完整版高清| 成人午夜高清在线视频| 国产精品久久久久久久电影| 最近2019中文字幕mv第一页| 3wmmmm亚洲av在线观看| 丝袜喷水一区| 中国国产av一级| 国产精品.久久久| 日本欧美国产在线视频| 久久99精品国语久久久| 欧美高清性xxxxhd video| 日韩三级伦理在线观看| 人人妻人人看人人澡| 久久6这里有精品| 黄色日韩在线| 夜夜爽天天搞| 久久久久久久久久久免费av| 亚洲七黄色美女视频| www.av在线官网国产| 男人的好看免费观看在线视频| 又粗又爽又猛毛片免费看| 如何舔出高潮| 中文精品一卡2卡3卡4更新| 国产伦理片在线播放av一区 | 天天一区二区日本电影三级| 午夜免费激情av| 日韩精品青青久久久久久| 欧美极品一区二区三区四区| 久久人人爽人人爽人人片va| 国产免费男女视频| 高清毛片免费观看视频网站| 日本五十路高清| 别揉我奶头 嗯啊视频| 久久人人爽人人爽人人片va| 免费看光身美女| 禁无遮挡网站| 91aial.com中文字幕在线观看| 级片在线观看| 亚洲精品国产成人久久av| 欧美不卡视频在线免费观看| 简卡轻食公司| 看非洲黑人一级黄片| 午夜精品一区二区三区免费看| 免费看美女性在线毛片视频| 全区人妻精品视频| 日本撒尿小便嘘嘘汇集6| 久久99热这里只有精品18| 美女被艹到高潮喷水动态| av在线播放精品| 精品一区二区三区人妻视频| 成人二区视频| 国产一区亚洲一区在线观看| 国产伦在线观看视频一区| 18禁黄网站禁片免费观看直播| 国产亚洲av片在线观看秒播厂 | 亚洲乱码一区二区免费版| 中文字幕制服av| 欧美精品国产亚洲| 亚洲最大成人中文| 日韩亚洲欧美综合| 美女大奶头视频| 成人美女网站在线观看视频| 嫩草影院新地址| 免费观看在线日韩| 干丝袜人妻中文字幕| 久久久久久久久久黄片| 日韩成人伦理影院| 国产成人影院久久av| 只有这里有精品99| 亚洲天堂国产精品一区在线| 美女xxoo啪啪120秒动态图| 人体艺术视频欧美日本| a级毛色黄片| 国产精品免费一区二区三区在线| 久久亚洲国产成人精品v| 国产成人影院久久av| 2021天堂中文幕一二区在线观| 老女人水多毛片| 在线观看美女被高潮喷水网站| 亚洲第一区二区三区不卡| 国产单亲对白刺激| 深夜精品福利| 亚洲国产精品合色在线| 成人性生交大片免费视频hd| 搡女人真爽免费视频火全软件| 成人午夜精彩视频在线观看| 男女视频在线观看网站免费| 波多野结衣高清无吗| 久久精品国产鲁丝片午夜精品| 激情 狠狠 欧美| 99视频精品全部免费 在线| 亚洲成a人片在线一区二区| 在线免费观看的www视频| 国产午夜精品论理片| 亚洲四区av| 亚洲精品成人久久久久久| 大又大粗又爽又黄少妇毛片口| 69av精品久久久久久| 中文字幕av成人在线电影| 国产乱人偷精品视频| 欧美一区二区亚洲| 免费观看在线日韩| 成年免费大片在线观看| 久久精品夜夜夜夜夜久久蜜豆| 日韩欧美国产在线观看| 综合色av麻豆| 全区人妻精品视频| 麻豆乱淫一区二区| 看非洲黑人一级黄片| 性欧美人与动物交配| 精品国产三级普通话版| 国产色爽女视频免费观看| 国产一区二区三区在线臀色熟女| 伦理电影大哥的女人| 一本一本综合久久| 亚洲精品亚洲一区二区| 亚洲欧美精品综合久久99| 亚洲综合色惰| 亚洲三级黄色毛片| 欧美在线一区亚洲| 亚洲精品久久久久久婷婷小说 | 日韩成人伦理影院| 一本一本综合久久| 最新中文字幕久久久久| 在线播放无遮挡| 男人和女人高潮做爰伦理| 国内揄拍国产精品人妻在线| 国产亚洲精品av在线| 在现免费观看毛片| 亚洲欧洲国产日韩| 国产伦理片在线播放av一区 | 熟女电影av网| 国产精品蜜桃在线观看 | 国内精品久久久久精免费| 超碰av人人做人人爽久久| 欧美精品一区二区大全| 久久精品国产亚洲av天美| 99九九线精品视频在线观看视频| av在线蜜桃| 国内久久婷婷六月综合欲色啪| 青青草视频在线视频观看| 久久久久久九九精品二区国产| 精品人妻一区二区三区麻豆| 嫩草影院新地址| 亚洲精品日韩在线中文字幕 | 在线观看美女被高潮喷水网站| 欧美精品一区二区大全| 天堂影院成人在线观看| 亚洲七黄色美女视频| 国产精品久久久久久亚洲av鲁大| 最近最新中文字幕大全电影3| 99国产精品一区二区蜜桃av| 久久99精品国语久久久|