Unlock instant, AI-driven research and patent intelligence for your innovation.

Efficient file grading attribute-based encryption method and system

An attribute-based encryption and hierarchical technology, applied in the field of cloud computing security, can solve problems such as non-compliance with security requirements

Inactive Publication Date: 2020-11-20
FUJIAN NORMAL UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there are multiple child nodes in a parent node that are all hierarchical nodes, then under this scheme, the users corresponding to these child nodes can decrypt each other, which obviously does not meet the security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient file grading attribute-based encryption method and system
  • Efficient file grading attribute-based encryption method and system
  • Efficient file grading attribute-based encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0047] Such as figure 1 As shown, the present invention uses different session keys to encrypt hierarchical files respectively with a symmetric encryption algorithm, and uses the attribute-based encryption method proposed by the present invention to encrypt these session keys. These encrypted files are stored to the cloud server along with the encrypted session key. The system of the present invention includes four entities, namely data owner, central authority, cloud server, and data user. The central authority is responsible for initializing the entire system, generating system master keys and public parameters. At the same time, it also generates a pri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient file grading attribute-based encryption method and system, which allow multiple files to be encrypted at the same layer access level, avoid the problem that multiple child nodes at the same level under any father node can decrypt each other, and improve the security of the system. For large institutions and companies with many levels of departments, when huge graded data files of the large institutions and companies are stored on a cloud storage platform, an integrated access tree is used as an access structure to encrypt all the files at a time, and the efficiency of the scheme is improved; not only can a large amount of cloud storage space and computing overhead be saved, but also data access can be safely and flexibly carried out on a remote cloud platform. The proposed method is suitable for fine-grained access control in a cloud environment.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to an efficient hierarchical attribute-based encryption method and system for files. Background technique [0002] Cloud storage services enable users to store massive amounts of shared data on cloud storage servers, thereby saving a lot of local data storage and maintenance costs. Cloud storage servers are usually controlled by third parties, and data is stored in the cloud, which also brings some security risks. In order to ensure the security of the data stored on these remote servers and ensure that they are not stolen by malicious users or servers, users must encrypt these data before storing them in the cloud server. In order to solve the above problems, in 2005, Sahai and Waters proposed the concept of attribute-based encryption (ABE). In an ABE system, each user's identity is identified by some attributes. Therefore, ABE can be applied to cloud storage, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/08
CPCH04L9/0869H04L9/14H04L63/0435H04L63/105
Inventor 李继国张亦辰陈宁宇章如愿康曌哲朱留富杨书略
Owner FUJIAN NORMAL UNIV