Fine-grained data access control method based on fragmenting of secret keys

An access control and fine-grained technology, applied in the field of information security, can solve security risks and other problems, and achieve the effect of high security, strong security, and less calculation

Active Publication Date: 2014-09-03
XIDIAN UNIV
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1) During the entire process of the method, the data encryption key is not upd

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-grained data access control method based on fragmenting of secret keys
  • Fine-grained data access control method based on fragmenting of secret keys
  • Fine-grained data access control method based on fragmenting of secret keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] Embodiments of the present invention will be further described below with reference to the drawings and specific embodiments.

[0083] refer to figure 1 , the implementation steps of the present invention are as follows:

[0084] Step 1, the data owner DO encrypts the shared data.

[0085] refer to figure 2 , the specific implementation of this step is as follows:

[0086] 1a) The attribute authority AA generates a master key mk and a public key pk, expressed as follows;

[0087] mk = ( α , { t j } j = 1 n ) ,

[0088] pk = ( g , y = e (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fine-grained data access control method based on fragmenting of secret keys. The method mainly solves the problems that the safety is low and the calculation amount is large in the prior art. The method comprises the implementation steps that (1) a data owner encrypts shared data to obtain a cryptograph; (2) an attribute authority generates two attribute private keys for an access group user and sends the two attribute private keys to a semi-trusted agency and the access group user respectively; (3) when the access group user meets the requirement of an access control structure, the semi-trusted agency converts the cryptograph into an intermediate result through the first attribute private key, and the access group user decrypts the intermediate result through the second attribute private key to obtain the shared data; (4) the attribute private key fragmenting technology is adopted to control the access group user to obtain an incomplete attribute private key, so that the owner does not need to encrypt the shared data again after executing the undoing operation. By means of the method, fine-grained access control can be provided for the shared data, and the safety of the shared data can be improved. The method can be applied to access of the shared data under cloud shared data access control.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a data access control method, which can be used in cloud storage services. In the scenario where multiple users access shared data, the data owner defines fine-grained access control of the access users to the shared data. Background technique [0002] With the rise of the Internet and cloud computing technology, the demand for data sharing in a distributed and open environment is increasing day by day. Cloud storage is an important basic service facility in the cloud computing system. Cloud storage has revolutionized storage services with high reliability, low cost and convenience. At the same time, data security in the cloud environment has also become a core issue that cloud computing users worry about. [0003] Cloud computing users store data in the cloud, thus losing control over the data. Any access control to data needs to be completely dependent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 姚亮杨超马建峰董超周洪丞张坤张明月张鹏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products