Support policy hidden multi-authorization center access control method, cloud storage system

An authorization center and access control technology, applied in transmission systems, electrical components, etc., can solve the problems of high computing overhead, high computing overhead, and difficult application at the user end, so as to reduce computing burden, avoid collusion attacks, and avoid malicious access Effect

Active Publication Date: 2021-09-17
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (1) The access policy of most schemes is exposed in the ciphertext, which may reveal the privacy information of the data owner and data visitor. However, in some schemes that support policy hiding, there are still problems such as insufficient expressiveness of the access structure and low system efficiency.
[0011] (2) In the ~CP-ABE~ scheme based on the matrix access structure, the length of the ciphertext increases with the increase of the number of attributes, and there is a relatively serious problem of computational efficiency, especially the computational overhead of the client is too large, so that this kind of Access control mode is difficult to apply in practice
[0012] (3) The access control scheme of multiple authorization centers is more suitable for the cloud storage environment, but the existing schemes that support policy hiding are mostly based on a single authorization center, and the few existing schemes based on multiple authorization centers are not scalable enough, and there are large computing costs, The problem of not being able to effectively resist collusion attacks
[0013] The difficulty of solving the above technical problems: (1) The technical bottleneck of the attribute encryption system mainly lies in its heavy encryption and decryption calculation overhead, which is also an important reason why this technology is difficult to be practically applied at present
(2) The privacy protection problem of access policy and the system efficiency problem brought about by hiding the access policy are another important reason why attribute encryption technology is difficult to be practically applied at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Support policy hidden multi-authorization center access control method, cloud storage system
  • Support policy hidden multi-authorization center access control method, cloud storage system
  • Support policy hidden multi-authorization center access control method, cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0081] The present invention conducts research on the ABE-based ciphertext policy access control mechanism, focuses on the anonymity of the access policy in CP-ABE, and designs a multi-authorization center access control scheme that supports access policy hiding to achieve reliable and fast cloud storage Serve.

[0082] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0083] like figure 1 As shown, the multi-authorization center access control method supporting policy hiding provided by the embodiment of the present invention includes the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication networks, and discloses a multi-authorization center access control method supporting policy hiding and a cloud storage system, including: system initialization, including the initialization of global authentication center CA and attribute authorization center AA; attribute conversion, attribute The authorization center AA anonymizes the attributes it owns; access authorization, the attribute authorization center AA assigns the anonymized attribute set to the user, and generates the key required for decryption, including the proxy decryption key and the user decryption key; The data owner encrypts the file; the user sends a file access request to the cloud service provider, and the process includes outsourcing decryption by the cloud service provider and the final decryption by the user; revoking some users in the system. The invention has the advantages of high system efficiency, supports dynamic management of user rights, and the like, and can be used in a data information system to ensure the privacy and security of user data and access policies, reduce user computing overhead, and improve system efficiency.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to a multi-authorization center access control method supporting policy hiding and a cloud storage system. Background technique [0002] At present, the closest existing technology: In the past ten years, cloud computing has developed from an emerging business concept to one of the fastest growing fields in the ~IT~ industry. Cloud storage is a data outsourcing service technology derived and developed from the concept of cloud computing. It refers to the collection and collaboration of a large number of different types of storage devices in the network through application software through functions such as cluster applications, network technology, or distributed file systems. Work together to provide data access services externally, which has the advantages of low cost, easy-to-use interface and high scalability. In addition, as an effective comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/0428H04L63/08H04L63/10H04L67/06H04L67/1097
Inventor 樊凯许辉岳潘强尹洁白宇晗李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products