Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud computing security access control method and system

A security access control and access control technology, applied in the field of data information security

Pending Publication Date: 2021-09-07
EVOC SMART IOT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing big data data access control cannot provide flexible management for policies executed by a large number of users while supporting security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing security access control method and system
  • Cloud computing security access control method and system
  • Cloud computing security access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] In a first aspect, the present invention provides a cloud computing security access control method, which is applied to an access control system model, and the access control system model includes: a certificate authority, an attribute management authority, a data provider, and a data user.

[0036] Wherein, the certificate issuing aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud computing security access control method and system. The method comprises the following steps: signing and issuing a first public key certificate to a data using end through a certificate issuing mechanism; forming a user decryption key through an attribute management mechanism, distributing different user decryption keys to different roles according to an access control strategy, wherein the user decryption keys are used for encrypting data resources provided by a data providing end; encrypting the user decryption key through the public key, and storing the encrypted user decryption key to the cloud platform; according to the access control strategy and the first public key certificate, determining the role of a data use end, and sending a corresponding encrypted user decryption key to the data use end; and under the condition that the data use end successfully decrypts the encrypted user decryption key through the private key, enabling the data use end to access the data resource through the corresponding role. According to the invention, flexible management can be provided for strategies executed by a large number of users while the security requirement is supported.

Description

technical field [0001] The invention relates to the technical field of data information security, in particular to a cloud computing security access control method and system. Background technique [0002] Cloud computing is a low-cost and high-efficiency solution in today's big data management. When adopting cloud solutions to store large-scale and high-value data, its security and privacy are very important, and encryption technology and access control models usually need to be deployed to meet the security requirements of the cloud. Access control is one of the most effective solutions for network security. [0003] However, the existing big data data access control cannot provide flexible management for policies executed by a large number of users while supporting security requirements. Contents of the invention [0004] In order to solve the above problems, the cloud computing security access control method and system provided by the present invention can provide fl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/604G06F21/602G06F21/64G06F2221/2141
Inventor 曹霞党光跃刘恩锋王志栋
Owner EVOC SMART IOT TECH CO LTD