Cancellation-supported outsourcing verifiable multi-authorization center access control method, and cloud server

A technology of authorization center and access control, applied in key distribution, which can solve the problems of difficult revocation, inefficiency, and high overhead.

Active Publication Date: 2018-08-10
XIDIAN UNIV
View PDF5 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
In addition, if permissions are revoked frequently, the computational burden will be heavy, and the dynamic nature of attributes increases the overhead and difficulty of key updates.
Most existing technologies are not efficient enough to support flexible revocation of users and attributes in cloud storage systems. Therefore, it is necessary to propose an access control method that supports revocation outsourcing and verifiable multiple authorization centers
[0003] In summary, the problems in the prior art are: The existing technologies are not efficient enough, and do not support flexible revocation of users and attributes in the cloud storage system; the calculation complexity is high, the overhead is large, and revocation is difficult
[0004] The difficulty and significance of solving the above technical problems: Access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
In addition, if permissions are revoked frequently, the computational burden will be heavy, and the dynamic nature of attributes increases the overhead and difficulty of key updates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cancellation-supported outsourcing verifiable multi-authorization center access control method, and cloud server
  • Cancellation-supported outsourcing verifiable multi-authorization center access control method, and cloud server
  • Cancellation-supported outsourcing verifiable multi-authorization center access control method, and cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] The present invention is applied in cloud storage to support revoking outsourcing and verifiable multi-authorization center access control method, so as to ensure the security of user's private data, reduce user's computing overhead, and dynamically manage user's authority in the system.

[0065] Such as figure 1 As shown, the access control method for supporting revoked outsourcing verifiable multi-authorization centers provided by the embodiment of the present invention includes the following steps:

[0066]S101: System initialization, including initialization of the global certification center CA and other autho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field characterized by a protocol, and discloses a cancellation-supported outsourcing verifiable multi-authorization center access control method, and a cloud server. The method comprises the following steps: system initialization, including the initialization of a global authentication center and other authorization centers; allocating an attribute set for auser by the authorization centers, and generating a secret key needed by decryption for the user; encrypting a file by a data owner, wherein the encryption process comprises outsourcing encryption, the verification of an outsourcing result and the final encryption of the data owner; issuing a file access request to a cloud service provider by the user, wherein the process includes cloud service provider outsourcing decryption, the verification of the outsourcing result, and the final decryption of the user; and cancelling some users or some attributes in a system. The cancellation-supported outsourcing verifiable multi-authorization center access control method provided by the invention has the advantages of being high in system access efficiency, low in computation overhead, capable of supporting dynamic user authority management and the like, and can be used for guaranteeing the privacy data safety of the user in cloud storage, reducing the computation overhead of the user and dynamically managing the authority of the user in the system.

Description

technical field [0001] The invention belongs to the technical field characterized by protocols, and in particular relates to an access control method and a cloud server that support revoking outsourcing verifiable multi-authorization centers. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the continuous development of information technology, people's life has been greatly improved. Among them, the rapid development of cloud computing has attracted widespread attention. Cloud computing is an entity with huge computing and storage capabilities. It is the product of the combination of network storage, virtualization, load balancing, distributed computing, parallel computing, utility computing and other traditional computing technologies and network technology development. Its power is that it can dynamically distribute computing resources to users through the network. At the same time, users can also sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L9/0891H04L9/0894H04L63/0428H04L63/10H04L63/101
Inventor 樊凯王俊雄许辉岳潘强李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products