Fine-grained access control method for data in cloud storage

A technology of access control and access control strategy, applied in transmission systems, electrical components, etc., to reduce encryption overhead, prevent huge overhead, and reduce overhead

Active Publication Date: 2013-06-26
HUAZHONG UNIV OF SCI & TECH
View PDF2 Cites 72 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In short, there is currently no fine-grained data access control scheme th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-grained access control method for data in cloud storage
  • Fine-grained access control method for data in cloud storage
  • Fine-grained access control method for data in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0071] Below at first explain and illustrate with regard to the technical terms of the present invention:

[0072] Data owner: refers to the owner of the file, who needs to store the file in the cloud and formulate access control policies for the file;

[0073] Trusted third party: In the attribute encryption mechanism, it is responsible for the generation and distribution of keys, and in the system, it is responsible for the proxy data owner's access control to users. In the actual system, the trusted third party can be concurrently performed by the data owner;

[0074] User: need to read the fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fine-grained access control method for data in cloud storage. The method includes the steps: firstly, a data owner blocking files and formulating an external access strategy of file blocks and an internal access strategy of the file blocks according an access control policy, and a trusted third party generating a public key and a master key according to an attribute password mechanism; the data owner utilizing a symmetric password mechanism to encipher the file blocks, utilizing the attribute password mechanism to encipher a symmetric key, and sending a cypher text of the file blocks and a cypher text of a secret key to the cloud; the data owner and the trusted third party utilizing the attribute password mechanism to authorize a user, and generating an attribute key and an attribute processed by an attribute encryption function for each attribute of the user; the data owner sending an user permission change statement to the trusted third party; and the trusted third party judging whether adding or deleting the user permission or not for the user according to the user permission change statement. Compared with the prior art, the method for the fine-grained data access control in the cloud storage has the access control with more fine-grained data under the condition of not increasing additional costs.

Description

technical field [0001] The invention belongs to the field of cloud storage and access control, and more particularly relates to a fine-grained access control method for data in cloud storage. Background technique [0002] In the cloud storage environment, in order to protect the confidentiality and privacy of user data, it is necessary to ensure that the data can only be obtained by authorized users, and that unauthorized users (including users other than authorized users and cloud storage service providers) cannot obtain data. Access control is important means to achieve this goal. [0003] Access control in cloud storage environment is quite different from traditional access control. First of all, in traditional access control, users are often well-known by the system, and the system can set access rights according to the user's identity. However, in a cloud storage environment, the user scale is huge, and the user set may change frequently. Before an access request occ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 李瑞轩沈成林何亨辜希武李玉华韩洪木叶威
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products