Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fine-grained access control method based on cp-abe

A CP-ABE, access control technology, applied in the field of data access control in the cloud environment, can solve the problems of difficult update of access control policies, difficulty of attribute revocation, consumption of large computing and communication resources, etc.

Active Publication Date: 2020-11-27
广东物壹信息科技股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the CP-ABE method, during the operation process, the server can steal user data, it is difficult to update the access control policy, and it is difficult to revoke attributes. The local encryption and decryption process will consume a lot of computing and communication resources, making it difficult for small and micro devices and mobile devices. The problem of working effectively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fine-grained access control method based on cp-abe
  • A fine-grained access control method based on cp-abe
  • A fine-grained access control method based on cp-abe

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] Such as Figures 1 to 3As shown, a fine-grained access control method based on CP-ABE includes the following steps:

[0108] Step 1: System initialization and parameter generation

[0109] It is mainly to configure the operating environment of the system and generate the key parameters required during the operation of the system, combined with Figure 4 The flow chart of parameter generation, the trusted center TA starts the system, sets and runs the Setup(k) algorithm, and selects the cyclic group where the cyclic group The order of is a prime number P, and the generators are g 1 , g 2 , set the bilinear map e: select The hash function; and the algorithm randomly selects two security parameters α, β∈Z p , output the public key and master key of the system;

[0110] Master key MK=(β,g 1 α ), reserved for TA;

[0111] public key distributed to system participants.

[0112] Step 2: Private key generation

[0113] TA runs the KeyGen (Pk, Mk, A) algorithm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-efficient and safe fine-grained access control method based on CP-ABE and relates to data safety storage and fine-grained access control under a cloud environment. The method is characterized by using outsourcing strategies to reduce local calculation and communication resource consumption; supporting access structure updating and user attribute revocation in a cipher text state; and during a scheme operation process, keeping data in a blinded state for a server. The server is used to calculate resources, and simultaneously, data safety is protected, data sovereignty is clear and the hidden operation of the server is prevented.

Description

technical field [0001] The present invention relates to the field of data access control in a cloud environment, and more specifically, relates to a fine-grained access control method based on CP-ABE. Background technique [0002] At present, data has become the most valuable asset of individuals and enterprises. Data assets and their management capabilities will determine the success or failure of enterprise competition and become the key to personal development. However, in the environment of big data and cloud computing, when personal data is stored remotely, it is not up to the user to decide where the stored data will be used, and who will use it. Absolute control of data, user privacy leaks and data sovereignty issues occur from time to time. [0003] Users urgently need to clarify data sovereignty, be able to determine the whereabouts of their data, and implement fine-grained access control policies for their data. Through the research, it is found that the cipherte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/083H04L9/085H04L9/0861H04L9/0891H04L63/0428H04L63/06H04L63/10H04L63/20H04L67/06
Inventor 李凯孙伟
Owner 广东物壹信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products