Digital virtual asset access control method based on attribute password under cloud environment

A technology of attribute cryptography and virtual assets, applied in the field of information security, can solve the problems of low decryption efficiency, inability to modify and limit users' digital virtual assets, and achieve the effect of reducing computational overhead and improving decryption and signature efficiency.

Inactive Publication Date: 2016-10-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the access control technology based on attribute encryption in the existing cloud environment can realize the fine-grained access control of users to digital virtual assets in the cloud environment, it can ensure that users who fail to meet the access policy cannot access digital virtual assets.
However, legal users also involve the modification of asset data in the process of using data virtual assets, such as editing of copyright works, trading of currency assets, etc., the existing technology lacks dynamic access control on the modification of digital virtual assets, and cannot The modification of the user's digital virtual assets is restricted
[0008] The access control technology based on attribute encryption in the existing cloud environment has the problem of low decryption efficiency
When users decrypt digital virtual asset data, they spend a lot of computing overhead to determine whether the attributes meet the access policy, and it is proportional to the number of attributes in the data access policy, which is not suitable for resource-constrained clients.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital virtual asset access control method based on attribute password under cloud environment
  • Digital virtual asset access control method based on attribute password under cloud environment
  • Digital virtual asset access control method based on attribute password under cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The utility model will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] The present invention proposes a data virtual asset access control method based on attribute passwords in a cloud environment. The entities involved include: attribute organizations, cloud computing platforms, asset owners and authorized users, such as figure 2 As shown, the attribute authority is a trusted third party, which is used to establish the system public key and system master key; at the same time, the attribute authority assigns attributes to users, generates attribute private keys, and provides them to authorized users. The system public key is provided to the asset owner. The cloud computing platform is a semi-trusted third party for storing and managing digital virtual assets uploaded by asset owners. In addition, the cloud computing platform performs partial decryption and signature operations for the user, and at the same ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital virtual asset access control method based on an attribute password under a cloud environment, and belongs to the technical field of information security. The method comprises the steps of system initialization, key generation, data encryption, outsourcing decryption, data decryption, outsourcing signature, request signature and request verification. By combining the attribute signature technology to the data access control technology based on attribute encryption, authorized access of digital virtual assets is realized, authorized modification is also realized, and the security of the digital virtual assets under the cloud environment is guaranteed. According to the method, most computing overhead of a user in the decryption and signature processes are outsourced to a cloud computing platform, so that the decryption and signature efficiency of the user is improved, the computing overhead of the user during signature and decryption is reduced, and the scheme can be applied to clients with limited resources.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a digital virtual asset access control method based on an attribute password in a cloud environment. Background technique [0002] With the advent of cloud computing and the "Internet +" era, more and more online digital services such as virtual currency, digital copyright, online games, and online domain names have been integrated into people's lives, driving the continuous evolution of economic forms. Digital virtual asset is an intangible asset, which refers to a valuable right that can be controlled by people. It is the manifestation of assets in the network virtual space. Its physical essence is a series of numbers that exist in the network, but it has Five characteristics of sex, dependence, reality, transaction and continuity. Virtuality is its essential attribute; dependency means that digital virtual assets have serious network dependence charac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L63/0428H04L9/0861H04L9/3247H04L63/0807H04L63/10H04L67/1097
Inventor 黄勤龙杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products