Verifiable Distributed Database Access Control Method

An access control and database technology, applied in the database field, can solve problems such as security user private key leakage, single point of failure, and responsibility cannot be identified, and achieve high security, easy audit and verification, and good practicability

Active Publication Date: 2021-09-28
STATE GRID HUNAN ELECTRIC POWER +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Access control is a part of distributed database management. The centralized authorized access control mechanism is prone to single point of failure and easy to cause the central organization to do evil.
The traditional encryption scheme based on ABE attributes requires the participation of a key authority or a central organization, and in terms of security, there will be problems such as leakage of the user's private key and unidentifiable responsibilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable Distributed Database Access Control Method
  • Verifiable Distributed Database Access Control Method
  • Verifiable Distributed Database Access Control Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 Shown is a schematic diagram of the method flow of the method of the present invention: the verifiable distributed database access control method provided by the present invention includes three participating roles: database user, database manager, and block chain, such as figure 2 shown, including the following steps:

[0033] The step of initializing the encryption parameters; specifically, the administrator selects hidden security parameters, generates a set of key pairs (PSK, MK) through the initialization function of the CP-ABE attribute encryption algorithm, and generates an asymmetric encryption key pair using the public key encryption algorithm (PAK, SK); Among them, PSK and PAK are public encryption parameters, MK is an attribute encryption master key saved only by the manager, and SK is a public key encrypted private key saved only by the manager;

[0034] During specific implementation, the manager selects a hidden security parameter λ, set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable distributed database access control method, including the steps of initializing encryption parameters; the steps of initializing smart contracts; the steps of generating authorization ciphertext; the steps of issuing authorization parameters; the steps of user registration; steps; the steps of modifying user attributes and the steps of updating the decryption key by the user. The present invention does not have the problem of authorization failure caused by a single point of failure, and ensures that data parameters are stored on the blockchain to achieve security and cannot be tampered with; it can perform fine-grained security access control on distributed database access rights and revoke user attributes, preventing It solves the responsibility identification problem caused by key leakage and the database security problem caused by token leakage; at the same time, the record of user access to the database can be verified, traced, and non-repudiation, which is convenient for the database manager to audit and verify the access record; security High, reliable and practical.

Description

technical field [0001] The invention belongs to the technical field of databases, and in particular relates to a verifiable distributed database access control method. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, computers have been widely used in people's production and life, bringing endless convenience to people's production and life. The frequent use of computing equipment has brought about the rapid growth of massive data on the Internet, so the capacity and scale of the database are also gradually increasing. Databases on the Internet carry most of the core business data. With the improvement of people's security awareness, database security is getting more and more attention. At present, a large database is supported by multiple distributed database nodes, which can carry the data storage services of hundreds or even thousands of applications in the upper layer. How to ensure the secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F21/31G06F16/27
CPCG06F21/31G06F21/602G06F21/6218G06F21/64G06F2221/2141G06F16/27
Inventor 冯晓文余琦黄鑫蒋破荒赵丽喻理文魏培
Owner STATE GRID HUNAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products