Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage access control method

An access control and cloud storage technology, applied in electrical components, transmission systems, etc., to solve problems such as difficulty in implementation and complex decryption process

Inactive Publication Date: 2013-12-04
ANHUI UNIVERSITY
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a simple and reliable cloud storage access control method, which can effectively solve the problems of complicated and difficult user decryption process in the existing cloud storage-based ciphertext access control method, and reduce encryption, especially It is the computational complexity of decryption, which improves the efficiency of encryption and decryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage access control method
  • Cloud storage access control method
  • Cloud storage access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In this embodiment, a cloud storage access control method is based on a cloud storage access control system composed of a cloud storage service provider CSP, a data owner A and several users. First, the system needs to establish a finite field GF(p) , where p is a large prime number, and the large prime number p is open to all users; finite fields and large prime numbers are well-known concepts in the field of information security;

[0035] The large prime number p is generated according to the following steps:

[0036] a) Determine the bit length d of the large prime number p; for example, according to specific security requirements, the bit length d can be set to 256, 512 or 1024, etc.;

[0037] b) Randomly generate an odd number q whose bit length is d bits and whose first and last bits are 1;

[0038] c) Use the prime number detection method to judge whether q is a prime number, if so, set p=q, otherwise, re-execute step b.

[0039] The cloud storage access contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud storage access control method based on a cloud storage access control system which is composed of a cloud storage service provider CSP, a data owner A and a plurality of users. The cloud storage access control method is characterized in that linear transformation is used for realizing encryption of a dataset, a dot product operation is used for realizing decryption of certain private data in the dataset, and therefore a cloud storage access control policy is realized. The cloud storage access control method can effectively solve the problems that in an existing ciphertext access control method based on cloud storage, a decryption process is complex for the users and the ciphertext access control method is difficult to realize, thereby lowering the computation complexity of encryption and particularly decryption, and improving the efficiency of encryption and decryption.

Description

technical field [0001] The invention relates to the technical field of data encryption and access control, in particular to a cloud storage-based ciphertext access control method for protecting user privacy data. Background technique [0002] Cloud storage is a new concept extended and derived from the concept of cloud computing. Cloud storage has revolutionized storage services by virtue of its high reliability, low cost and maintenance-free. In the cloud storage service model, since the data is beyond the user's control, how to protect the confidentiality and legal access of private data has become the most concerned issue for users. [0003] Access control mechanisms can authorize legitimate users to access specific resources while denying access to illegal users. Although many cloud storage services provide simple access control functions, such as setting access permissions for files, this depends on server-side control, and its security is based on trust in cloud stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 石润华仲红崔杰许艳
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products