Policy hidden type data access control method based on block chain

A technology of data access control and access control tree, applied in the fields of access control and cloud computing, can solve problems such as privacy leakage

Active Publication Date: 2021-03-19
BEIJING UNIV OF TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the third-party service provider is not completely credible and the access control strategy in the blockchain brings privacy leakage to the user, the present invention proposes a method based on The strategy-hidden data access control method of the blockchain introduces blockchain technology and proposes a strategy-hiding technology based on bilinear mapping to ensure the user's absolute control over the data and prevent privacy leakage caused by the access control strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy hidden type data access control method based on block chain
  • Policy hidden type data access control method based on block chain
  • Policy hidden type data access control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0055] The specific implementation process of the blockchain-based policy-hidden data access control method described in the present invention is as follows: figure 2 shown, including the following steps:

[0056] Step 1: Preparation phase.

[0057] Step 1.1: The blockchain platform executes the group generation algorithm to generate relevant public parameters, see formula (1) for details.

[0058] 1) Assign corresponding attribute components to each attribute in the platform.

[0059] 2) Publish public parameters to the blockchain platform.

[0060] Step 1.2: The data owner constructs the access control tree and the corresponding user parameters, see formula (2-6) for details.

[0061] 1) According to the encrypted data stored in the cloud server.

[0062] 2) According to the public parameters released by the blockchain platform, select ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a strategy hiding type data access control method based on a block chain, which ensures the absolute control right of a user on data by utilizing the characteristics of decentralization, automatic execution of an intelligent contract and the like of the block chain, and avoids the risk of user privacy data leakage caused by random viewing of an access control strategy in the block chain. The homomorphic encryption thought is used for reference, the access control strategy can be correctly executed under the hidden condition through the bilinear mapping technology, and the privacy leakage risk caused by the access control strategy is prevented. The method comprises the steps that (1) a blockchain platform executes a group generation algorithm to generate common parameters; (2) a data owner generates personal related parameters through public parameters, constructs an access control strategy tree and publishes the access control strategy tree to the block chain; (3) a data accessor generates an available private key of the data accessor by utilizing the public parameters and the related parameters of the data owner; and (4) the blockchain platform firstly detects the availability of the visitor private key, then performs access control decision on the visitor private key and the data owner access control tree, interacts with the cloud storage service to complete data access if the matching succeeds, and otherwise returns rejection information.

Description

technical field [0001] The invention belongs to the technical field of cloud computing and access control, and in particular relates to a strategy-hiding data access control method based on blockchain. The method utilizes the decentralization and transparency of blockchain and proposes a strategy-hiding technology based on bilinear mapping , which not only guarantees the user's absolute control over the data, but also prevents privacy leakage caused by access control policies. Background technique [0002] With the vigorous development and application of cloud computing technology, outsourced storage of user data, data security and privacy protection issues have become a hot spot of concern. As an important technology to protect data security and prevent unauthorized access, access control has always been an important technology for users to protect data. However, with the explosive growth of user data and the development of cloud storage technology, more and more users Cho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L63/0407H04L63/10H04L63/20H04L67/1097H04L9/3247H04L9/085H04L9/50
Inventor 林莉储振兴檀文婷解晓宇
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products