Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure communication mechanism based on attribute encryption

A secure communication and attribute encryption technology, which is applied in the field of information security, can solve the problems of high computational overhead of encryption schemes and insufficient security of symmetric encryption schemes, and achieve the effects of reducing computational overhead, small computational losses, and ensuring safe transmission

Inactive Publication Date: 2022-01-21
NANJING UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem of ensuring data security while transmitting a large amount of data in an industrial control system, the present invention proposes a data security communication mechanism applicable to an industrial cloud environment
The present invention adopts the hybrid encryption combining AES and ABE, and the equipment side uses AES to encrypt a large amount of industrial data collected from the industrial control system, and then uses ABE to encrypt the AES key by the fog, thus solving the problem of insufficient security of the symmetric encryption scheme and the property The Problem of Excessive Computational Overhead of Attribute-Based Encryption Scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication mechanism based on attribute encryption
  • Secure communication mechanism based on attribute encryption
  • Secure communication mechanism based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The technical solutions in the embodiments of the present invention will be described in detail below in conjunction with the drawings in the embodiments of the present invention.

[0070] Refer to attached figure 1 The system model diagram of the system, using Logistic mapping to construct a one-time pad symmetric key, combined with the CP-ABE algorithm proposed above, realizes real-time and secure direct communication between man and machine. The specific steps are as follows:

[0071] 1. Establish a channel

[0072] Step 1: The system is initialized, and the user obtains the attribute private key issued by the CA.

[0073] Step 2: Number as ID c The user requests the field device to establish a session, hoping to update the parameter Para. The field device selects and stores random parameters r and x i , where i represents the number of communications, r ∈ (3.56995, 4], x (i) ∈ [0, 1]. Also record the parameters in the database. During this round of requests t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure communication mechanism based on attribute encryption, which relates to the fields of information security and industrial control, and is composed of a central authority, a data owner, a fog node, a cloud platform and a data user. According to the invention, the AES symmetric encryption algorithm is adopted to encrypt industrial data, and the attribute-based encryption algorithm is adopted to encrypt the AES key, so that the security of industrial data communication is ensured; encryption and decryption outsourcing is used, a large amount of complex calculation is outsourced to cloud and a plurality of fog nodes, and the confidentiality of data is ensured while the calculation overhead of an equipment side and a user side is reduced; besides, the access strategy is updated, so that the calculation consumption of downloading the data file from the cloud and re-encrypting the data file when the access strategy is changed is avoided, and the calculation overhead of the equipment end is further reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a secure communication mechanism based on attribute encryption in an industrial cloud environment. Background technique [0002] In recent years, cloud computing, Internet of Things and traditional industrial control system (Industrial Control System, ICS) have been integrated to form an industrial cloud system. It connects products, factories, systems, machines and users, and provides advanced analysis functions to harness the massive data generated in the network, so as to transform data into knowledge and knowledge into value, and achieve efficiency improvement and cost reduction. For a long time, enterprises have paid more attention to Safety, that is, equipment and production safety, but have not paid attention to Security, that is, information security protection. This is because traditional ICS systems are proprietary, independent, and isolated from external networks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/14
CPCH04L63/045H04L63/10H04L9/0891H04L9/14H04L2463/061
Inventor 刘犇屠袁飞杨小健
Owner NANJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products