Access control method base on attribute encryption algorithm

An access control and attribute encryption technology, applied in the field of cloud computing, can solve the problem of no user data file integrity and consistency considerations, to avoid re-encryption work and improve the rate of permission change.

Inactive Publication Date: 2013-07-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the scheme does not consider the integrity and consistency of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method base on attribute encryption algorithm
  • Access control method base on attribute encryption algorithm
  • Access control method base on attribute encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0050] security assumption

[0051] The scheme assumes that there is no malicious packet loss in all communication channels (communication channels include three parts: between USER and CDC, between CDC and TPA, and between TPA and USER). At the same time, the TPA in the scheme is an unbiased and completely credible third-party audit organization, which can faithfully complete all tasks entrusted by USER. The CDC of the present invention is slightly different from the CDC in the previous scheme. Although the CDC in the scheme has curiosity, it can faithfully complete the task and is no longer completely untrustworthy. All parameter calculations, encryption tasks, and key generation and distribution undertaken by CDC can guarantee the absolute correctness, non-deception and non-repudiation of the results. CDC can un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method base on an attribute encryption algorithm. The method includes an initialization step; a data document access step and an access authority limit changing step. Advantages which are possessed based on the attribute encryption algorithm in a distributed environment are utilized to effectively solve the problem such as that a deciphering party is not fixed under a cloud computing environment, and the problem exists in a data file sharing aspect. Safe access to a data file in the cloud computing environment is supported, and meanwhile problems in aspects such as revocation of user permission and data misreading of a user are fully considered.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and relates to an access control method based on an attribute encryption algorithm. Background technique [0002] The attribute-based encryption algorithm significantly improves the sharing ability of data files and makes the access control efficiency of the system in a distributed environment by adding the description of user identity attributes and using threshold functions such as AND gate, OR gate, and containment gate as constraints. It is obviously superior to the traditional identity-based encryption algorithm using unique identity tags, and is very suitable for cloud computing, a computing environment with a high rate of data file sharing. The research on applying attribute-based encryption algorithms to access control schemes has been widely concerned by the industry a long time ago, and the solutions proposed by scholars have also made great achievements in the aspects of permis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 邢建川韩帅
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products