Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device of achieving privacy protection based on CP-ABE ciphertext access control in fog computing environment

A CP-ABE, access control technology, applied in the field of access control based on CP-ABE ciphertext, can solve the problem of not knowing the ciphertext

Active Publication Date: 2018-11-23
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In KP-ABE, the key is related to the access policy, and the ciphertext is related to the attribute set. The encryptor can only choose descriptive attributes for the data, and cannot decide who can decrypt the ciphertext, only the key issuer can be trusted.
The attributes in CP-ABE are used to describe the user's private key. The encryptor can use the access policy to determine the access to encrypted data, but the encryptor does not know who can access the ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device of achieving privacy protection based on CP-ABE ciphertext access control in fog computing environment
  • Method and device of achieving privacy protection based on CP-ABE ciphertext access control in fog computing environment
  • Method and device of achieving privacy protection based on CP-ABE ciphertext access control in fog computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In the following, the present invention will be further clarified with reference to the accompanying drawings and specific embodiments. It should be understood that these examples are only used to illustrate the present invention and not to limit the scope of the present invention. After reading the present invention, those skilled in the art will understand various aspects of the present invention. Modifications of the price form fall within the scope defined by the appended claims of this application.

[0057] A system for implementing privacy protection based on CP-ABE ciphertext access control in a fog computing environment, such as Figure 1-2 As shown, it includes an initialization module, a private key generation module, an encrypted data module, and a decryption ciphertext module. The encrypted data module includes a fog node encryption module and a data owner encryption module. The decryption ciphertext module includes a fog node decryption module, User decryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and a device of achieving privacy protection based on CP-ABE (Ciphertext-Policy ABE) ciphertext access control in a fog computing environment. A linear secretsharing matrix access structure based on LSSS is employed to support fine grit description of access user attributes and have a high computing efficiency. Part of computing is outsourced to a fog nodein the encryption and decryption phases to relieve the users' burden. By considering that an access structure possibly leaks users' privacy, the method introduces the technology of partially hiding the access structure so as to ensure the safety of user privacy. Finally, in order to verify whether the ciphertext is tampered or not in the transmission and outsourcing decryption processes, the ciphertext is verified to ensure the correctness of the ciphertext.

Description

Technical field [0001] The invention relates to a CP-ABE ciphertext access control method that can realize privacy protection in a fog computing environment, and belongs to the technical field of fog computing. Background technique [0002] Fog Computing, in which data, (data) processing and applications are concentrated in devices at the edge of the network, instead of being stored almost entirely in the cloud, is an extended concept of Cloud Computing. Fog computing mainly uses devices in the edge network, and data transmission has extremely low latency. It has a vast geographical distribution and a large-scale sensor network with a large number of network nodes. Moreover, the mobility of fog computing is good. Mobile phones and other mobile devices can communicate directly with each other. The signal does not have to go to the cloud or even the base station to go around, which supports high mobility. Due to the large-scale and low-cost characteristics of cloud computing, mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0869H04L63/0407H04L63/10
Inventor 陈燕俐陈梦书
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products