Data access control method and system in large-scale cloud storage based on block chain

A technology for data access control and data access, which is applied in digital transmission systems, transmission systems, and key distribution, can solve problems such as lack of scalability, and achieve the effects of protecting user privacy, protecting privacy, and reducing burdens

Active Publication Date: 2019-11-22
上海宇讷科技有限公司
View PDF14 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Obviously, neither of these two

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access control method and system in large-scale cloud storage based on block chain
  • Data access control method and system in large-scale cloud storage based on block chain
  • Data access control method and system in large-scale cloud storage based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0111] Such as Figure 8 As shown, the third stage can be implemented in the following way:

[0112] S421. For each attribute in the request, the key administrator generates an attribute private key share for the data applicant by using the corresponding system attribute private key share and the hash value of the data applicant identity identifier in the request;

[0113] S422. The key manager uses the public key locally generated by the applicant in the request to encrypt the generated attribute private key share, and sends it to the data applicant as a response.

[0114] further,

[0115] S5. The data applicant randomly generates a conversion key to convert its own identity and attribute private key, and uses the converted identity and attribute private key to send an anonymous data access request to the cloud storage server, and the cloud storage server verifies the data application Whether the identity attribute of the user has been revoked, if not revoked, the cipherte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical fields of cloud storage, access control and blocks chains, and particularly relates to a data access control method and a data access control system in large-scale cloud storage based on a block chain. The method comprises the steps: registering all participants as nodes of a block chain platform; selecting a key administrator by utilizing an authority proving mechanism and executing an attribute password scheme of a (t, n) threshold multi-attribute authority ciphertext strategy; initiating an anonymous key generation transaction between key managers to generate an attribute private key for the applicant; the data owner uploads the encrypted data to the cloud storage server under the constructed data access strategy; the applicant anonymously sends adata access request to the cloud storage server, and the server verifies whether the user identity attribute is revoked and returns a result after successful pre-decryption; and the user decrypts thereceived pre-decrypted ciphertext to obtain a final plaintext. The invention provides a centerless fine-grained access control method for large-scale cloud storage data, and the centerless fine-grained access control method has good expansibility and user privacy guarantee.

Description

technical field [0001] The invention belongs to the technical fields of cloud storage, access control and blockchain, and in particular relates to a fine-grained data access control method and system without a trust center in large-scale cloud storage. Background technique [0002] The ciphertext-policy attribute based encryption (CP-ABE) technology is the most potential cryptographic technology for secure data storage and sharing in an untrusted cloud storage environment. It has the following advantages: the data owner himself Determine the data access policy and embed it into the ciphertext; as long as the user attributes meet the access policy in the ciphertext, the data can be decrypted correctly, so a document only needs to be encrypted once and can be safely shared with multiple different users. A user only needs to have one copy of the ciphertext Keys can access multiple different data ciphertexts; the implementation of access control policies depends entirely on cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0861H04L9/3247H04L63/0421H04L63/0428H04L63/0807H04L63/10H04L67/1097
Inventor 龚祖崟朱红军
Owner 上海宇讷科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products