Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File Access and Modification Authority Control Method Based on Data Sharing

A file access and permission modification technology, applied in the field of information security, can solve the problems of stealing users' private data alone, large computational complexity, and untrustworthy storage servers, reducing transmission bandwidth and storage space, and reducing computational complexity. the effect of improving access efficiency

Active Publication Date: 2018-03-20
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the cloud computing environment, the storage server is not trustworthy, it may steal the user's private data alone or collude with the attacker to sell the user's data files
So these access control schemes cannot ensure the safe sharing of data files
In the fourth access control scheme, the user's access to data files is determined by the data owner, and no longer completely depends on the credibility of the cloud storage server
However, this solution is only suitable for read access to data files, not for users modifying data files
Moreover, whether it is the construction of the access control tree or the revocation of attributes and users, it will bring great computational complexity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File Access and Modification Authority Control Method Based on Data Sharing
  • File Access and Modification Authority Control Method Based on Data Sharing
  • File Access and Modification Authority Control Method Based on Data Sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] refer to figure 1 , the implementation steps of the present invention are as follows:

[0028] Step 1: The data owner classifies the data to be shared.

[0029] 1.1) The data owner classifies data files according to attributes, that is, classifies files with the same data attributes into one category, and affixes an attribute label to each classified file;

[0030] 1.2) Mark an index number for each classification file, denoted as i, i∈{1,2,...n}, n is the largest classification file number.

[0031] Step 2: The data owner encrypts the classified files respectively.

[0032] 2.1) The data owner sends a system parameter Q request to the authorization center;

[0033] 2.2) The authorization center randomly selects the p-order bilinear group G, the generator g∈G, and selects the first random number α∈Z p , where Z p Represents the set {1,2,...p}, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sharing based file access and permission change control method. The data sharing based file access and permission change control method mainly solved the problem that the prior art is low in access efficiency, complicated in computation and is not applicable to file modification of users and comprises the achieving steps that 1 a data owner conducts classification processing on data files according to attributes and performs encryption and uploading; 2 the users access classified files according to the demands and a cloud server returns corresponding files to the users; 3 an authorization center synthesizes aggregate secret keys and transmits the aggregate secret keys to the users, and the users use the aggregate secret keys to decrypt encryption files; 4 the users modify the accessed files, encrypt the modified files, attach signatures to the modified files and upload the modified files; 5 the cloud server conducts attribute based signature verification on the users, stores the files if verification succeeds, otherwise abandons the files if the verification does not succeed. The data sharing based file access and permission change control method has the advantages of being high in read-write performance and efficiency, low in computing complex and reliable in storage and can be used for data sharing and access control based on privacy protection in a cloud computing environment.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a permission control method for users to access and modify data files in a cloud computing environment, which can be used for data sharing and access control based on privacy protection in the cloud computing environment. Background technique [0002] With the rapid development of computer technology, the application of cloud computing is becoming more and more extensive. For enterprise users, especially small and medium-sized enterprises with insufficient financial capacity, cloud computing services allow them to meet their own management needs without purchasing expensive hardware facilities. Enterprises only need to pay cheap service fees to cloud service providers to enjoy the cloud computing platform provided by cloud service providers and obtain more flexible on-demand services, thereby reducing enterprise budget expenses. [0003] Although cloud computing brings such g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L9/32H04L9/3247H04L63/08H04L67/10
Inventor 樊凯黄娜娜李晖田琼
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products