信息网络安全 ›› 2016, Vol. 16 ›› Issue (5): 30-36.doi: 10.3969/j.issn.1671-1122.2016.05.005

• 技术研究 • 上一篇    下一篇

云计算环境下基于身份的分层加密管理系统研究

计海萍, 徐磊, 蔚晓玲, 许春根   

  1. 南京理工大学应用数学系,江苏南京 210094
  • 收稿日期:2016-04-18 出版日期:2016-05-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 计海萍(1992—),女,江苏,硕士研究生,主要研究方向为信息安全;徐磊(1990—),男,安徽,博士研究生,主要研究方向为信息安全与密码学;蔚晓玲(1991—),女,山西,博士研究生,主要研究方向为格密码学;许春根(1969—),男,安徽,教授,博士,主要研究方向为信息安全与密码技术应用。

  • 基金资助:
    基金项目: 江苏省自然科学基金[BK20141405、BK20131353]

Research on Hierarchical Identity-based Encryption Management System in Cloud Computing

Haiping JI, Lei XU, Xiaoling YU, Chungen XU   

  1. Department of Applied Mathematics, Nanjing University of Science and Technology, Nanjing Jiangsu 210094, China
  • Received:2016-04-18 Online:2016-05-20 Published:2020-05-13

摘要:

文章利用基于身份的分层加密算法构造了一个云计算环境下的基于身份的分层加密管理系统。该系统主要包括用户登录、数据库管理、密钥配置、文件加解密4个功能模块,其中密钥配置模块将用户分为多个层次,每一层用户都有一个与之相对应的私钥生成器,并且只为它的下一层用户产生私钥,通过分层密钥服务器解决私钥生成器负荷过重问题。系统是在云计算环境下利用Java语言编程,以具体图形用户界面的形式,结合具体的基于身份的分层加密算法设计的。文章首次实现了一种云计算环境下针对企业自身内部人员之间文件秘密传输的分层加密管理系统。

关键词: 基于身份的分层加密, 密钥管理, 数据库, Java, 云计算

Abstract:

This paper described a hierarchical encryption management system in cloud computing which was structured by the hierarchical identity-based encryption algorithm. This system mainly included four functional modules: the user login module, the database management module, the key distribution module, the file encryption and decryption module. The key distribution module divided users into different layers. Each user of different layers had a corresponding private key generator, and only provided its next user with private key. The problem that private key generator overload is solved by hierarchical key server. The system was designed by using java programming language in the form of specific graphical user interface and combing with the concrete hierarchical identity-based encryption algorithm. This paper realizes hierarchical encryption management system which documents are transmited secretly between internal staff of group for the first time in the cloud commputing.

Key words: hierarchical identity-based encryption, key management, database, Java, cloud computing

中图分类号: