Attribute-based access control method with anonymous access capability

An access control and access capability technology, applied in the information field, can solve problems such as privacy leakage, achieve the effect of protecting privacy and improving decision-making efficiency

Active Publication Date: 2021-01-05
XIDIAN UNIV
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the deficiencies of the above-mentioned prior art, provide an attribute-based access control method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based access control method with anonymous access capability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to better describe the implementation process of the present invention, the access control flow is divided into three parts. Among them, the first part is system initialization, which provides guarantee for the security of information released in the system during the subject’s anonymous access process; the second part is subject registration, which issues corresponding subject attribute certificates for subjects participating in the subject’s anonymous access process; the third part is this The subject anonymous access described in the method of the invention, usually, the method of the invention is carried out on the basis of the above two parts.

[0029] The specific steps of the first part of system initialization are as follows.

[0030] The key distribution center runs the signature HABS based on the homomorphic attribute to generate the public key and private key pair of the attribute authority, and distributes the private key to the attribute authority....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based access control method with anonymous access capability, and mainly solves the problems that privacy of an access request subject is leaked and the subject cannot accurately provide attribute information in the prior art. The implementation scheme is as follows: a subject sending an access request only containing object identity information and operation;sending a signature request to the subject according to the subject attribute required by the strategy corresponding to the access request; and the subject generating a signature of the required subject attribute through the attribute certificate, and participating in strategy evaluation with the access request to obtain an access control decision evaluation result. According to the invention, theleakage of the subject attributes is avoided, the participation of irrelevant subject attributes in the access control decision is reduced, and the decision efficiency of access control is improved while the privacy of the subject is ensured.

Description

technical field [0001] The invention belongs to the field of information technology, and further relates to an attribute-based access control method with anonymous access capability in the field of information security technology. The invention can be used to perform anonymous access control on the process of accessing cloud computing resources to protect sensitive information and prevent cloud computing resources from being illegally accessed. Background technique [0002] The core concept of cloud computing is to take the Internet as the center and provide fast and secure cloud computing services and data storage on the website. In the cloud computing environment with high flexibility, scalability, and coordination of multi-computer resources, security issues such as privacy theft, fraudulent use of resources, and hacker attacks are prone to occur. Access control guarantees the security of the system by granting permissions, which is one of the currently recognized method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/10H04L63/0823H04L63/0421H04L9/3247H04L67/60
Inventor 刘刚张润南李燕飞田玉敏吴震平刘妍
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products