Unlock instant, AI-driven research and patent intelligence for your innovation.

A cloud storage ciphertext access control system and method based on table attributes

An access control and cloud storage technology, applied in the field of cloud storage services, can solve the problems of huge attribute set, complex access structure, low execution efficiency of CP-ABE scheme, etc., to achieve the effect of reducing computing cost and communication overhead, and efficient privacy protection

Active Publication Date: 2018-02-23
SHENZHEN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a cloud storage ciphertext access control system based on table attributes, aiming at solving the problem of deploying attributes and access policies through tables in the existing cloud storage platform adopting the CP-ABE scheme, due to the huge set of attributes and complex access structure , making the execution efficiency of the CP-ABE scheme low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud storage ciphertext access control system and method based on table attributes
  • A cloud storage ciphertext access control system and method based on table attributes
  • A cloud storage ciphertext access control system and method based on table attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0020] In view of the problems existing in the prior art, considering that the table attributes have the following two characteristics: 1. The attributes are classified, as shown in Table 1 below, which is a roster of an enterprise:

[0021] Table 1

[0022] serial number

Name

gender

Position

department

001

Alan

Female

CEO

headquarters

002

john

male

General manager

headquarters

003

alex

male

manager

human resources department

004

steven

male

manager

Finance Department

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud storage services, and provides a cloud storage ciphertext access control system and an access control method based on table attributes. In the system and method, during the encryption process, the data owner classifies each leaf node according to whether the threshold value of the parent node corresponding to each leaf node on the access structure tree is 1, and further classifies each leaf node according to the type of the parent node, Classify the set of leaf nodes whose parent node threshold is 1, and then encrypt the data according to the classification result and upload it to the cloud. In this way, the length of the ciphertext obtained by the data owner, the amount of encryption calculations, and the amount of decryption calculations of the subsequent shared users are only related to the attribute set whose parent node threshold is not 1. In the access structure tree, the threshold value of 1 corresponds to the OR gate. Otherwise, it corresponds to an AND gate. Therefore, it can be said that the system overhead is only related to the attribute set whose parent node is an AND gate. When the OR gate in the access structure tree increases, the calculation cost and communication overhead of the system will be greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of cloud storage services, and in particular relates to a cloud storage ciphertext access control system based on table attributes. Background technique [0002] In the cloud storage service platform, due to the use of remote data hosting technology, the cloud storage service provider is the physical owner of the data, but it is not in the same trust domain as the data owner. Cloud storage service providers manage multiple users and their resources. When users access other user resources across borders, they need to adopt certain access control policies to control access to data and services. But in reality, since the cloud storage service platform adopts virtualized storage technology, the cloud storage service is loosely coupled with the underlying hardware environment, and there is no fixed security boundary between the data of different users, which increases the Difficulty in implementing access contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/083H04L63/10H04L67/1095H04L9/40
Inventor 张鹏喻建平刘宏伟孙志伟
Owner SHENZHEN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More