A data access control method and system

A data access control and data technology, applied in the field of cloud computing, can solve problems such as high computing overhead, achieve the effects of improving efficiency, simplifying key management, and improving data security

Active Publication Date: 2017-12-26
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention is to provide a data access control method to solve the problem of large computing overhead when accessing cloud server data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data access control method and system
  • A data access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] figure 1 It shows the applicable application scenarios of the data access control system provided by the first embodiment of the present invention, and for the convenience of description, only the part related to the embodiment of the present invention is shown.

[0020] like figure 1 As shown, the data access control system includes a plurality of user terminals 1 , a cloud server 2 and a third party 3 . The plurality of user terminals 1, cloud server 2 and third party 3 are connected and communicated in a wired or wireless manner.

[0021] Wherein, the user terminal 1 may be a mobile phone, a tablet computer, a computer, and the like.

[0022] The cloud server 2 and the third party 3 can be a single server, or a server composed of several functional servers.

[0023] In a multi-authority or multi-level organizational structure (such as in a hospital, including the dean, department director, chief doctor, attending doctor, etc.; in an enterprise, including general m...

Embodiment 2

[0041] figure 2 The implementation flow of the data access control method provided by the second embodiment is shown, and the process of the method is described in detail as follows:

[0042] In step S201, the third party generates keys of each level, and sends the generated keys to clients of corresponding levels.

[0043] In this embodiment, the third party is a trusted (securely authenticated) third party. Specifically, the third party generates keys (including public keys and private keys) at each level based on the hierarchical access control model, and sends the generated keys to clients of corresponding levels.

[0044]Wherein, this embodiment includes at least a first level (level with higher authority) and a second level (level with lower authority), and user terminals at corresponding levels include user terminals at the first level and user terminals at the second level. The division of specific levels can be adjusted according to actual needs, which is not limit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the technical field of cloud computing, and provides a data access control method and system, the method comprising: a third party generates keys of each level, and sends the generated keys to clients of corresponding levels; The client encrypts the data to be uploaded to the cloud server with the received key, and uploads the encrypted data to the cloud server. While improving the data security of the cloud server, the present invention simplifies the key management in the data access control of the cloud server, reduces the calculation cost, and improves the data access efficiency of the cloud server.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a data access control method and system. Background technique [0002] Since the birth of cloud computing, security has always been one of the primary considerations for enterprises to implement cloud computing. Access control is an important means to realize user data confidentiality and privacy protection. The server in the cloud storage system should be assumed to be untrustworthy. Users are unwilling to put core confidential information in the cloud storage system. Even if it is ciphertext data, users will worry about being read or referenced by unauthorized users, which makes The development of cloud storage service applications is limited. [0003] The existing Ciphertext-policy Attribute-Based Encryption (CP-ABE) scheme represents the user's identity as a set of attributes, and the encrypted data (ciphertext data) is related to the access control stru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/08
Inventor 刘进须成忠孙婧喻之斌
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products