Dynamic authority access control method based on privacy protection

A dynamic permission and privacy protection technology, applied in the field of information security, can solve the problems of exposing personal identity information, reducing computing and communication overhead, and inability to flexibly protect sensitive data, so as to avoid collusion attacks, reduce computing and communication overhead, and protect The effect of personal privacy

Active Publication Date: 2021-02-19
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that personal identity information is easily exposed and sensitive data cannot be flexibly protected during the identity authentication process of the existing information resource sharing method, the present invention proposes a privacy protection-based dynamic authority access control method, which adopts identity authentication with hidden attributes In the identity authentication process of resource information sharing, the technology realizes identity au

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic authority access control method based on privacy protection
  • Dynamic authority access control method based on privacy protection
  • Dynamic authority access control method based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] In the case of complex data sharing, the certification center CA in the domain needs to authenticate the terminal members of the data information sharing, but when providing the identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who meet the access policy can share information. In view of this application background, the present invention provides a privacy protection-based dynamic authority access control method, such as figure 1 As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization, and generate their own public / private key pairs respectively; The terminal members in th...

Embodiment 2

[0145] A method of dynamic permission access control based on privacy protection, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The certification center CA defines the set of attributes of all terminal members as Attr set ={A 1 ,A 2 ,A 3}, terminal member u i The attribute set of (1≤i≤10) is terminal member u l The attribute set of (1≤l≤10,l≠i) is The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the specific implementation method of the present invention. It should be understood by those skilled in the art that various m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dynamic authority access control method based on privacy protection, which comprises the following steps: initializing protocol parameters in an information sharing network domain, carrying out identity authentication of hidden attributes on terminal members, and after the authentication succeeds, setting, by a data sharer, the access authority of the shared resources according to the attribute parameters of the data sharer, encrypting the shared resources and storing the encrypted shared resources into an encrypted database; searching for, by a data acquirer, the shared resource to be accessed according to a keyword, acquiring a ciphertext storage link after verifying the access authority, downloading the ciphertext resource through the link, and calculating a decryption key to decrypt and acquire the ciphertext resource; and meanwhile, updating, by a terminal member, the access authority of the terminal member by acquiring rewards or punishment and the like.Double authentication is used to prevent collusion attacks, the safety of shared resources is guaranteed, personal privacy is protected, flexible and fine-grained data resource access is achieved based on attribute matching dynamic access control, access management is greatly simplified, and resource sharing is more flexible, efficient and practical.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a dynamic authority access control method based on privacy protection. Background technique [0002] With the continuous innovation and development of computer technology, the efficiency of information storage and real-time exchange has also been greatly improved. At the same time, this also puts forward higher requirements for data sharing technology. Nowadays, data exchange in the form of an open network is mostly used in different fields. This highly open network can easily become the target of illegal attackers. How to ensure that all kinds of data Information security and ensuring the normal operation of various devices is a difficult problem that data sharing technology needs to solve. [0003] As an important foundation and core, the Internet connects various fields as a whole and realizes the integration of various networks. While enjoying the great...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0421H04L63/0435H04L63/123H04L63/1441H04L63/10H04L63/0823
Inventor 张启坤李天笑田二林朱亮高歌李永娇袁俊岭李健勇甘勇
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products