Block chain technology-based fine-grained cloud storage access control method, system and device

A technology of access control and access control strategy, which is applied in the field of data security, can solve the problems of data sharing model dependence, CP-ABE scheme cannot be realized, access control strategy flexible change cannot be guaranteed, etc., and achieve the effect of solving high storage cost

Pending Publication Date: 2022-02-18
CHONGQING UNIV OF POSTS & TELECOMM
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the above technical problems, the actual data sharing model relies on a centralized organization, the current CP-ABE scheme cannot achieve flexible changes in access control policies, and cannot guarantee security before and after changes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain technology-based fine-grained cloud storage access control method, system and device
  • Block chain technology-based fine-grained cloud storage access control method, system and device
  • Block chain technology-based fine-grained cloud storage access control method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0034] The terms "first", "second", "third", etc. (if any) in the description and claims of the present application and the above drawings are used to distinguish similar objects and not necessarily to describe a specific order or sequentially. It is to be under...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data security, and relates to a block chain technology-based fine-grained cloud storage access control method, system and device. The method comprises the following steps: constructing a cloud storage sharing model based on a block chain technology, registering a DO and a DU to an intelligent contract and generating a private key; the DO encrypting the data file with a symmetric key to obtain a data ciphertext, uploading the data ciphertext to the CSP, and the CSP returning a file storage address; the DO performing attribute-based encryption on the symmetric key and the file storage address according to the private key, the model public key and the access control policy tree, sending an attribute-based ciphertext to the block chain to form a block, and returning a block identifier; the DU sending a data request to the block chain, returning a corresponding attribute base ciphertext, and decrypting a file storage address and a symmetric key of the data file; and the DU sending a request to the CSP according to the decryption address, and decrypting the data file from the data ciphertext returned by the CSP by using the decrypted symmetric key. According to the invention, the security of key transmission and data transmission is ensured.

Description

technical field [0001] The present invention relates to the field of data security, further relates to the fields of cryptography and blockchain, and in particular to a fine-grained cloud storage access control method, system and device based on blockchain technology. Background technique [0002] Cloud computing is a new computing model that manages and schedules a large number of computing resources connected by the network in a unified manner to form a computing resource center to provide services for users. The characteristics of high flexibility, scalability, and high cost performance of cloud computing make more and more organizations and individuals choose to outsource data to cloud computing services. At present, cloud storage is the most popular cloud computing service. Through cluster applications, network technology or distributed file system, various storage devices on the network work together through software to jointly provide data storage and business access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/08G06F16/27
CPCG06F21/602G06F16/27H04L9/0863H04L9/0869
Inventor 熊安萍余浩立蒋溢
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products