Linked storage fine-grained access control model based on attribute encryption and timestamp

An access control and attribute encryption technology, which is applied in the field of cloud computing and communication security, can solve the problem of high computing cost and achieve the effect of reducing communication burden

Active Publication Date: 2015-08-12
XIDIAN UNIV
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This encryption method can achieve fine-grained access control to data, but when there is attribute revocation, the calculation cost is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linked storage fine-grained access control model based on attribute encryption and timestamp
  • Linked storage fine-grained access control model based on attribute encryption and timestamp
  • Linked storage fine-grained access control model based on attribute encryption and timestamp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation and specific operation process, but is not limited to this embodiment.

[0050] like Figure 1 to Figure 7 As shown, the present invention is a chain storage fine-grained access control model based on attribute encryption and time stamp, and the access control model includes the following steps:

[0051] First initialize, according to the traditional CP-ABE and DAC-MACS, the attribute authority (AA) generates the attribute private key (SK i ), and generate an attribute public key (PK i ). The authorization center (CA) generates a global public key (PK) and a global private key (SK) for each user.

[0052] S1 access users upload their own attribute private key SK i and the global public key PK to the authorization center;

[0053] The authorization center of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a linked storage fine-grained access control model based on attribute encryption and timestamp. The linked storage fine-grained access control model based on attribute encryption and timestamp of the present invention comprises a method of uploading data by a data owner, a user registration method, a process of establishing relationship among users, a user data access method and a user revocation method. The beneficial effects of the present invention are that: by the common effect of attribute and time, the linked storage fine-grained access control model is constructed, the fine-grained access control of users on the private data is realized, at the same time, the problem that the secret key amount hold by users in the actual application increases rapidly along with the overmuch encryption data types is solved, namely, users can decrypt a plurality of data blocks encrypted by different secret keys with the least secret keys, the situation that users only accept the requests of other users in the on-line state, and do not accept any requests in the off-line state is guaranteed, thereby reducing the communication burdens.

Description

technical field [0001] The invention belongs to the field of cloud computing and communication security. Specifically, the encrypted data is stored on the cloud server, controlled by a trusted authority, and a communication protocol is used to realize fine-grained access control that controls access rights by attribute and time. Background technique [0002] With the advent of the Internet, people's information has become more transparent and symmetrical, but it has not been absolutely transparent and symmetrical. This is the so-called privacy information protection. This part of private information is unwilling to be obtained by unauthorized people through some means. People make new friends due to the expansion of social circles, or break up with friends due to some conflicts, which leads to a problem, whether the private data information saved by the data owner in the cloud server can be viewed by newly established users without hindrance , and whether users who have se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/31H04L63/10
Inventor 高军涛安泽张鹏李雪莲罗维吕留伟朱秀芹
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products