Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for cloud data confidentiality protection and access control

An access control and access control strategy technology, applied in electrical components, transmission systems, etc., can solve the problems of increasing attribute authority and CSP calculation amount and communication consumption, cloud computing has no security scheme, no or only a small number of times, etc. Achieve secure sharing, reduce computational overhead, and wide-ranging effects

Inactive Publication Date: 2015-02-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the attributes of this type of scheme are revoked, the data owner DO (Data Owner) needs to generate ciphertext re-encryption information and re-encrypt the relevant ciphertext; due to ciphertext re-encryption, the old key of the user with permission cannot decrypt For ciphertext, DO needs to generate key upgrade information and send it to the user for upgrade; these operations will increase the amount of DO calculation
At the same time, the user will be affected by the revocation of attributes of other users, which will increase the computational burden of the user
During the period of multiple attribute revocation, there may be no or only a small number of file updates. On the premise that the file is not updated and no re-encryption is required, it can be considered that doing so will increase the calculation and communication consumption of attribute authority and CSP in vain.
[0007] At present, cloud computing still does not have a sufficiently secure solution for access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for cloud data confidentiality protection and access control
  • Method for cloud data confidentiality protection and access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0029]The present invention provides a method for confidentiality protection and access control of cloud data. The salient feature of the method is that it adopts algorithms related to symmetric cryptography to encrypt sensitive data, and stores them in the cloud server in an encrypted form; The attribute encryption mechanism realizes the protection of the data encryption key. The encrypted access policy can be formulated by the data owner according to the needs. Only the data users who meet the access policy can access the encrypted sensitive data through decryption.

[0030] as attached figure 1 , figure 2 As shown, the specific implementation process is:

[0031] 1. Set up the following components: certificate authority CA, attribute authority AA, cloud service provider CSP, data owner DO and data user DU. in:

[0032] Certification aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for cloud data confidentiality protection and access control. The method includes the specific implementation processes: adopting a symmetric cryptosystem correlation algorithm for realizing encryption of sensitive data, and storing the data in a cloud server in an encrypted form; and adopting a ciphertext-policy attribute-based encryption mechanism to realize protection of a data encryption key. An encrypted access policy can be formulated by a data owner as required, and only the data user satisfying conditions of the access policy can access to the encrypted sensitive data by decryption. Compared with the prior art, the method has the advantages that security of the data in a cloud storage system under the open environment is guaranteed under the premise that a cloud server provider is untrusted, security sharing of the sensitive data is realized, and huge computation overhead brought to the data owner by key distribution and data management can be reduced.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method with strong practicability, cloud data confidentiality protection and access control. Background technique [0002] Cloud computing is a new type of computing model following distributed computing, grid computing, and peer-to-peer computing. It focuses on resource leasing, application hosting, and service outsourcing, and has quickly become a hot spot in the development of computer technology. In the cloud computing environment, the concept of on-demand services in the IT field has been truly reflected. By integrating distributed resources, cloud computing builds a computing environment that responds to multiple service requirements, meets user customization requirements, and can access its corresponding service resources through the network. While improving the efficiency of use, cloud computing brings great impact and challenges to the realizatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/0435H04L63/0823H04L63/0892H04L65/1073H04L67/08H04L67/10
Inventor 李清玉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products