为了管理动态存取控制并且威慑,在采购数据库上盗版攻击,有跟踪的一个动态存取控制计划被建议。在我们的计划,我们介绍跟踪想法进的叛徒采购数据库,并且作为构造加密和解密过程减少计算,通讯,和存储开销的基本工具采用多项式功能和过滤器功能。为采购数据库比作以前的存取控制计划,我们的计划不能仅仅保护敏感数据免受漏的伤害并且当组会员被换掉,而且规定 trace-and-revoke 特征时,没有装运采购数据回到数据主人,在服务器方面执行可伸缩的加密。当恶意的用户为利润克隆并且卖他们的解密钥匙时,我们的计划能跟踪解密钥匙到恶意的用户并且撤回他们。而且,我们的计划为建立在数据主人和用户之间的解密钥匙避免巨大的消息交换。比作跟踪计划的以前建议的 publickey 叛徒,我们的计划能同时完成完整的串通抵抗,完整的可恢复性,完整的撤回,和黑盒子的可描绘。安全的证明和我们的计划安全、有效的表演表演的分析。
To manage dynamic access control and deter pi- rate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter function as the basic means of constructing encryption and decryption procedures to reduce computation, communication, and storage overheads. Compared to previous access control schemes for outsourced databases, our scheme can not only protect sensitive data from leaking and perform scalable encryption at the server side without shipping the outsourced data back to the data owner when group membership is changed, but also provide trace-and-revoke features. When malicious users clone and sell their decryption keys for profit, our scheme can trace the decryption keys to the malicious users and revoke them. Furthermore, our scheme avoids massive message exchanges for establishing the decryption key between the data owner and the user. Compared to previously proposed publickey traitor tracing schemes, our scheme can simultaneously achieve full collusion resistance, full recoverability, full revocation, and black-box traceability. The proof of security and analysis of performance show that our scheme is secure and efficient.