Outsourcing access control method and system aiming at fog computing

An access control and fog computing technology, applied in the field of cloud storage services

Active Publication Date: 2017-01-25
SHENZHEN UNIV
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the present invention is to provide a fog computing-oriented outsourcing access control method a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing access control method and system aiming at fog computing
  • Outsourcing access control method and system aiming at fog computing
  • Outsourcing access control method and system aiming at fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] A fog computing-oriented outsourcing access control method provided by the present invention will be described in detail below.

[0045] see figure 1 , is a flow chart of a fog computing-oriented outsourcing access control method in an embodiment of the present invention.

[0046] In this embodiment, the outsourced access control method oriented to fog computing is applied to the key authority center (Key Authority, KA) end, cloud service provider (Cloud Service Provider, CSP) end, fog node (FogNodes) end, An outsourced access control system for fog computing, including the data owner (Dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud storage services and provides an outsourcing access control method and system aiming at fog computing. The method includes: a key authorizing central terminal receives user registration and generates system parameters and a key for each user; a data owner terminal defines an access structural tree related to cipher text, generate cipher text unrelated to the access structural tree and transmits the generated cipher text to a fog node terminal; the fog node terminal generates cipher text related to the access structural tree, integrates all cipher text, and uploads the integrated cipher text to a cloud service provider terminal for storage; a user terminal accesses the cipher text stored at the cloud service provider terminal through the fog node terminal, the cipher text is decrypted to display plain text when the attribute set of the user terminal satisfies the access structural tree embedded into the cipher text. By the method, the computing burden of the data owner terminal can be lowered greatly, a user only needs to execute one bilinear-pair operation and two multiplication so as to successfully decrypt the cipher text, and the computing burden of the user is lowered greatly.

Description

technical field [0001] The invention relates to the technical field of cloud storage services, in particular to a fog computing-oriented outsourcing access control method and system thereof. Background technique [0002] In the cloud service provider, due to the adoption of data remote hosting technology, the cloud service provider is the physical owner of the data, and is not in the same trust domain as the data owner. Cloud service providers manage multiple users and their resources. When users access other user resources across borders, data needs to be encrypted and decrypted, and a large amount of computing overhead is required during the encryption and decryption phase. In this way, data attributes are required Both the master end and the user end provide powerful computing capabilities to ensure smooth user access. Contents of the invention [0003] In view of this, the purpose of the present invention is to provide a fog computing-oriented outsourcing access contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0894H04L63/062H04L63/08H04L63/10H04L67/1097
Inventor 张鹏陈泽虹喻建平
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products