A Outsourcing Mandatory Access Control Method Based on Hierarchical Attribute Encryption

A technology of mandatory access control and attribute encryption, which is applied in the field of data security in information security disciplines and computer disciplines, can solve the problem of not considering the revocation of user permissions, and achieve the effect of ensuring security and improving efficiency

Active Publication Date: 2021-03-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] CN201410055341.9 proposes an outsourced decryption method on the basis of CP-ABE, which realizes efficient decryption, but does not consider the issue of user authority revocation
CN201310647570.5 proposes a CP-ABE method, which can realize efficient decryption and user revocation, and can realize user authority revocation, but this kind of user revocation method will bring huge overhead. In order to achieve higher key distribution In the article "Enhancing attribute-based encryption with attribute hierarchy", the author Li J et al. proposed a hierarchical attribute encryption scheme, which uses a tree-like hierarchical structure to manage attributes, and the hierarchical relationship between attributes is consistent with reality. The organizational structure in life is similar to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Outsourcing Mandatory Access Control Method Based on Hierarchical Attribute Encryption
  • A Outsourcing Mandatory Access Control Method Based on Hierarchical Attribute Encryption
  • A Outsourcing Mandatory Access Control Method Based on Hierarchical Attribute Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0065] The distributed access control method based on attribute encryption provided by the present invention adopts a mechanism combining hierarchical attribute encryption mechanism (Hierarchical Attribute-Based Encryption, HABE) and mandatory access control (Mandatory Access Control, MAC), and supports outsourcing environment by Fine-grained data read and write mandatory access control and timely user authority revocation controlled by the owner realize the one-way flow of information and ensure the confidentiality of data. The system model of the present invention can be found in figure 1 , the method includes the following steps:

[0066] S1: System initialization, generating system public parameters...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an outsourcing mandatory access control method based on hierarchical attribute-based encryption, and aims at solving the access control problem of outsourcing data. According tothe method, the mechanism of combining a hierarchical attribute-based encryption (HABE) mechanism with mandatory access control (MAC) is adopted, fine-grained data reading and writing mandatory access control which is controlled by an owner and in-time user permission revoking in an outsourcing environment are supported, unidirectional flowing of information is achieved, and the data confidentiality is guaranteed.

Description

technical field [0001] The invention relates to the field of data security in the disciplines of computer science and information security, in particular to fine-grained access control to data. Background technique [0002] The main goals of information security are confidentiality, integrity and availability. For the government, the military, and enterprises and institutions, preventing the leakage of secret information is always the top priority of the work. Access control is one of the main means of achieving confidentiality. Discretionary Access Control (DAC for short) policy allows users to independently control other users' access rights to their own objects, and the access control work of the system is distributed to all users, so that these users can complete it together. However, DAC itself has unavoidable defects, for example, it cannot prevent the threat of Trojan horses. Compared with discretionary access control, mandatory access control (Mandatory Access Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0891H04L9/3268H04L63/0428H04L63/10H04L63/105
Inventor 杨晓肖敏刘雪娇
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products