Cipher text access control system based on cloud computing platform

A cloud computing platform and access control technology, applied in the field of information security, can solve the problems of unreliable access control schemes for users, complex management of cloud storage service modules, and poor security, so as to reduce the storage space of ciphertext, improve the overall performance, improve the The effect of efficiency

Inactive Publication Date: 2016-12-07
杨炳
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, a malicious key generation center can decrypt all ciphertexts of any user, what's more, the key generation center may maliciously distribute the user's private key
At the same time, on the cloud computing platform, users cannot trust the cloud service provider to faithfully implement the user-defined access control scheme, and the security is poor.
In addition, the attribute-based encryption scheme also has problems such as high encryption and decryption calculation overhead for user owners and ordinary users in the cloud storage environment, and complex management of cloud storage service modules brought about by the flexibility of access control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher text access control system based on cloud computing platform
  • Cipher text access control system based on cloud computing platform
  • Cipher text access control system based on cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 , figure 2 , the ciphertext access control system based on the cloud computing platform of this embodiment includes a cloud storage service module 1, a plaintext preprocessing module 2, a key generation module 3, an encryption module 4, a decryption module 5, and a user access module 6:

[0051] (1) Cloud storage service module 1, for providing data storage services for visiting users, including a cloud storage server for storing data and a data manager for controlling external users to access the cloud storage service module;

[0052] (2) The key generation module 3 is used to generate the initial public parameters and master key of the system. When receiving the request from the visiting user, it distributes the public parameters of the system for the encryption module 4, and generates corresponding public parameters for each visiting user. private key, and participate in the negotiation of the shared session key between the cloud storage service module...

Embodiment 2

[0085] see figure 1 , figure 2 , the ciphertext access control system based on the cloud computing platform of this embodiment includes a cloud storage service module 1, a plaintext preprocessing module 2, a key generation module 3, an encryption module 4, a decryption module 5, and a user access module 6:

[0086] (1) Cloud storage service module 1, for providing data storage services for visiting users, including a cloud storage server for storing data and a data manager for controlling external users to access the cloud storage service module;

[0087] (2) The key generation module 3 is used to generate the initial public parameters and master key of the system. When receiving the request from the visiting user, it distributes the public parameters of the system for the encryption module 4, and generates corresponding public parameters for each visiting user. private key, and participate in the negotiation of the shared session key between the cloud storage service module...

Embodiment 3

[0120] see figure 1 , figure 2 , the ciphertext access control system based on the cloud computing platform of this embodiment includes a cloud storage service module 1, a plaintext preprocessing module 2, a key generation module 3, an encryption module 4, a decryption module 5, and a user access module 6:

[0121] (1) Cloud storage service module 1, for providing data storage services for visiting users, including a cloud storage server for storing data and a data manager for controlling external users to access the cloud storage service module;

[0122] (2) The key generation module 3 is used to generate the initial public parameters and master key of the system. When receiving the request from the visiting user, it distributes the public parameters of the system for the encryption module 4, and generates corresponding public parameters for each visiting user. private key, and participate in the negotiation of the shared session key between the cloud storage service module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cipher text access control system based on a cloud computing platform. The system comprises a cloud storage service module, a plaintext preprocessing module, a secret key generation module, an encryption module, a decryption module and a user access module. A plaintext of a user owner client is encrypted in a triple manner to obtain a triple encrypted cipher text, the triple encrypted cipher text is packaged by utilizing a digital envelope technology and then stored in the cloud storage service module, and the corresponding decryption module is arranged. Fine access control can be realized, computing cost of encryption and decryption between a user owner and a user can be reduced effectively, the data confidentiality is ensured, and collusion-proof aggressivity and forward and backward safety are included; and the cipher text access control system is controlled in different levels, the efficiency of access control is improved, a code division multiplexing technology is used to code plaintext information, the cipher text storage space is reduced, and the total performance of the system is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a ciphertext access control system based on a cloud computing platform. Background technique [0002] Cloud computing is a new computing model that can more effectively use computing resources to provide users with various data services. It links together a large number of computing resources, storage resources and software resources, and uses virtual technology to provide users with customizable Computing, storage and application services, avoiding the construction and maintenance of users' own heavy infrastructure. However, the centrally managed cloud computing center will become the key target of hacker attacks. Due to its unprecedented openness and complexity, its security is facing a more severe test than ever before. The access control of cloud computing big data resources is the key to cloud computing security. The core of the problem is that access control i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0844H04L9/0869H04L63/0478H04L63/0861H04L63/102H04L63/105H04L67/1097Y02D30/50
Inventor 不公告发明人
Owner 杨炳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products