Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fine-grained access control method and system based on double block chains

An access control and fine-grained technology, which is applied in the field of data security technology and blockchain, can solve problems such as difficult to cope with data fine-grained access control requirements, and achieve the effects of high reliability, guaranteed interests, and guaranteed integrity

Active Publication Date: 2021-04-30
SOUTH CHINA AGRI UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Data circulation and sharing between different users using cloud storage technology can improve business process efficiency and promote business development, but traditional symmetric encryption technology and public key encryption technology are difficult to meet the fine-grained access control requirements of users in cloud storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-grained access control method and system based on double block chains
  • Fine-grained access control method and system based on double block chains
  • Fine-grained access control method and system based on double block chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0110] like figure 1 As shown, this embodiment provides a fine-grained access control system based on dual blockchains. The system includes six entities, namely alliance chain, Ethereum, data owner, data visitor, cloud server and multiple Attribute authority, the description of each entity is as follows:

[0111] Data owner: An entity that shares the data it owns for a fee, such as a farming enterprise with big data on poultry farming; it is used to symmetrically encrypt the shared data to obtain data ciphertext, and upload the data ciphertext to the cloud server for storage ;Encrypt the symmetric key to obtain the key ciphertext, and publish the key ciphertext together with the metadata related to the shared data to Ethereum, and use Ethereum as the data sharing charging platform.

[0112] Data visitor: An entity that needs to access data, such as an institution that studies poultry farming or epidemic prevention and control; it is used to obtain the metadata released by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fine-grained access control method and system based on double block chains, and the method comprises the steps: building an alliance chain, enabling a plurality of attribute authorization mechanisms to serve as a plurality of accounting nodes on the alliance chain, and carrying out the system initialization; enabling each attribute authorization mechanism to generate a respective public and private key pair and publish a respective public key to the alliance chain; enabling the data owner to symmetrically encrypt the shared data; enabling the data owner to encrypt the symmetric key and publishes a key ciphertext and metadata related to the shared data to an Ethernet, and taking the Ethernet as a data sharing charging platform; enabling a data accessor to acquire metadata published by the data owner in the Ethernet, pays by using the Ethernet, and sending a data access request to an attribute authorization mechanism corresponding to the attribute set of the to-be-shared data; enabling the data accessor to decrypt the key ciphertext by using the obtained decryption key, and decrypting and accessing the data ciphertext. The method has the advantages of higher safety, higher flexibility and higher operation efficiency.

Description

technical field [0001] The invention relates to a fine-grained access control method and system based on dual blockchains, belonging to the fields of data security technology and blockchain technology. Background technique [0002] Data circulation and sharing between different users using cloud storage technology can improve business process efficiency and promote business development, but traditional symmetric encryption technology and public key encryption technology are difficult to meet the fine-grained access control requirements of users in cloud storage. How to implement fine-grained access control in data sharing to achieve safe, efficient and controllable data sharing is a hot topic for researchers at home and abroad. [0003] Blockchain technology, as the core technology of digital cryptocurrencies such as Bitcoin and Ethereum, has received extensive attention from researchers in various fields in recent years. The blockchain can solve the problem of trust establ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/40G06F16/22G06F21/62
CPCG06Q40/04G06Q20/401G06F16/22G06F21/6227G06F2221/2107
Inventor 肖媚燕黄琼苗莹刘文博
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products