Unlock instant, AI-driven research and patent intelligence for your innovation.

Attribute encryption access control method for edge computing

A technology of attribute encryption and access control, applied in the field of data security

Active Publication Date: 2020-05-29
GUANGXI NORMAL UNIV
View PDF12 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the mobility and real-time nature of edge computing, the impact of time and location changes must be considered, and due to the characteristics of data heterogeneity, perception, and terminal resource constraints, attribute encryption access in traditional cloud environments Control methods are no longer suitable for edge computing environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute encryption access control method for edge computing
  • Attribute encryption access control method for edge computing
  • Attribute encryption access control method for edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific examples.

[0036] The system model of the present invention is as figure 1 As shown, the model consists of six entities, which are central authority (CA), cloud server (CSP), attribute authority (AA), edge node (EN), data owner (DO) and data user (DU). ). CA is responsible for user and AA authentication and authorization. Each AA is independent of each other and is responsible for managing the attributes in their respective domains, and generating and distributing the attribute private keys of DUs. CSP provides the capability of permanent storage. EN provides storage and computing capabilities. DO is responsible for formulation of access policy (A, ρ) and generation of ciphertext. DU is responsible for the decryption of the intermediate key ciphertext.

[0037] An edge computi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute encryption access control method for edge computing. In addition to conventional attribute encryption, time parameters and position parameters are used as encryption factors to be used in an attribute encryption algorithm, so that a data user can access only within the time and position range set by a data owner, and access control with finer granularity is achieved. When a data user requests to access data, an edge node closest to the data user is accessed according to a shortest path algorithm, after receiving an access request of the data user, the edgenode retrieves whether the edge node stores a corresponding data ciphertext and a key ciphertext or not, and if not, the edge node retrieves from other adjacent edge nodes or a cloud server. Besides,for the problem that resources of a terminal device are limited in edge computing, most of decryption work is carried out on edge nodes, and pre-decryption is carried out on the edge nodes.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an attribute encryption access control method oriented to edge computing. Background technique [0002] In cloud computing, a lot of data is outsourced and stored on a "basic" trusted cloud service platform. Since the data on the cloud is out of the physical control of the data owner, illegal users can try to obtain the information contained in the data by illegally accessing the data. information, which will result in the disclosure of data information and user privacy information. The use of attribute-based encryption technology can perform fine-grained access control on these private data stored in the cloud. This method can realize "one-to-many" encrypted access control, and has the characteristics of scalability and distribution. [0003] With the rapid development of Internet of Things and 5G network technologies, new service models and businesses such as smart medic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0492H04L63/08
Inventor 彭红艳凌娇覃少华邓剑锋
Owner GUANGXI NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More