Supercharge Your Innovation With Domain-Expert AI Agents!

APP user data access control system and method based on attribute encryption

A user data and access control technology, applied in the field of data security, can solve the problems of unreliable cloud storage and data loss, and achieve the effect of realizing access control, improving access control, and solving the problem of computing overhead.

Active Publication Date: 2021-11-26
SHANGHAI INST OF TECH
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing cloud storage technologies face many security challenges, data leaks, data loss, hijacked accounts and insider threats all make cloud storage unreliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APP user data access control system and method based on attribute encryption
  • APP user data access control system and method based on attribute encryption
  • APP user data access control system and method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0047] Such as figure 1 The schematic diagram of the APP user data access control system based on attribute encryption is shown. The system includes five types of entities:

[0048] A. Attribute Authority (AA): The attribute authority generates the attribute key related to the AUDA attribute of the APP user data visitor, and the attribute public key PK AA and attribute master key MK AA ; Assuming that the attribute authority is honest and trustworthy, it will perform tasks honestly according to the rules;

[0049] B. Central authority (Central Authority, CA): The central authority ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an APP user data access control system and method based on attribute encryption. The system comprises an attribute authorization authority AA, a central authority CA, a user data owner AUDO, a cloud server CS and a user data visitor AUDA. The AUDO performs symmetric encryption on the data by adopting a symmetric encryption algorithm, encrypts a symmetric key by using an attribute public key and an identity public key in combination with an encryption algorithm, and finally sends the encrypted data to the CS for storage; and the AUDA sends a request to the CS, the CS decrypts the ciphertext by using an attribute key of the AUDA to obtain a converted ciphertext and returns the converted ciphertext to the AUDA, the AUDA decrypts the returned converted ciphertext by using an identity key of the AUDA, and the CS only solves the correct converted ciphertext for the AUDA conforming to the access strategy. An access control scheme of attribute encryption based on a ciphertext strategy is introduced, so that the encryption and decryption operation efficiency is improved; and whether the access authority exists or not is judged through the attributes of the user data accessor, and the access control flexibility is improved under the condition that the data security is ensured.

Description

technical field [0001] The invention relates to a data security technology, in particular to an APP user data access control system and method based on attribute encryption. Background technique [0002] With the rapid development of information technology, computers and networks have become necessary tools and approaches for daily office work, communication and collaboration. However, while the information system improves people's work efficiency, it also raises security requirements for information storage, access control, and access control of computer terminals and servers in the information system. After the development of cloud storage technology, existing information technology can be used to store user privacy data on the cloud, which can be downloaded and accessed by authorized data visitors, thus effectively preventing APP user data leakage. [0003] Existing cloud storage technologies face many security challenges. Data leaks, data loss, hijacked accounts, and in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06H04L29/08G06F21/60
CPCH04L9/0631H04L9/0869H04L63/0435H04L67/1097G06F21/602
Inventor 薛庆水王晨阳时雪磊马海峰薛震张继王俊华周雨卫崔墨香
Owner SHANGHAI INST OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More