Traceable access control method based on double block chains

An access control and blockchain technology, applied in encryption devices with shift registers/memory, digital transmission systems, secure communication devices, etc., can solve the problem of inability to determine the credibility of third-party authorization centers and low encryption efficiency of data files , Unable to guarantee reliability and other issues, to reduce the risk of being attacked, improve reliability, and prevent file loss and tampering.

Pending Publication Date: 2022-07-29
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing access control methods have the following disadvantages: (1) The access record formed during the access process may be tampered by the visitor, and its credibility cannot be guaranteed; (2) The encryption efficiency of data files is low, and the overall calculation cost is relatively large; ( 3) File data is stored in the cloud database and managed by a third party, which may be easily tampered with and lost; (4) Access control authorization is performed by a third party, the process is not transparent, and it is impossible to determine the credibility of the authorization results of the third-party authorization center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable access control method based on double block chains
  • Traceable access control method based on double block chains
  • Traceable access control method based on double block chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments.

[0062] In the method for traceability access control based on dual blockchains described in this embodiment, the flow chart is as follows figure 1 shown, including the following steps:

[0063] S10, generate a decryption key

[0064] Users who use this method to upload files or access files need to register first to obtain an exclusive decryption key. During registration, users upload their own attributes to the user management point. After receiving their own attributes sent by the client, the user management point executes the unpaired CP-ABE algorithm to assign a user ID UID and a global parameter PP to each user. The user management point calls the smart contract to manage the attribute set, generates the public key PK and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable access control method based on double block chains, and the method comprises the steps: generating a decryption key, storing a file, storing an access control strategy, carrying out access authorization, carrying out user access, carrying out file decryption, and enabling an initial user to provide own attribute information for registration, thereby obtaining the decryption key; the uploaded file is encrypted and then stored in the IPFS, an intelligent access strategy of attributes is set according to the file, and the file can be accessed only when the intelligent strategy is met; and the accessed file also needs to be decrypted by a decryption key during registration, and when the file is tampered, the access process is checked to search for illegal users, so that more accurate equipment traceability is achieved. According to the method, the unpaired CP-ABE algorithm is adopted to encrypt the uploaded file, and the simple scalar multiplication in the elliptic curve encryption is utilized to replace bilinear pairing, so that the file encryption efficiency is improved; the IPFS is used for storing file data, the risk that a database is attacked is reduced, and the files are prevented from being lost and tampered.

Description

technical field [0001] The invention relates to the field of block chain access control, in particular to a traceable access control method based on dual block chains. Background technique [0002] With the development of information technologies such as cloud computing, the Internet of Things, and big data, various systems and devices distributed in different domains are frequently interconnected, and the access and transfer of data between them has become a trend. In data access and circulation, data security and privacy have become the bottleneck restricting the development of information technology. Access control technology grants certain access rights to legitimate subjects in a specific access environment, and has become the main means to ensure data security and privacy. . [0003] Chinese invention patent CN108123936 discloses an access control method and system based on block chain technology, which combines block chain technology with attribute-based access contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08H04L67/06H04L67/1097
CPCH04L63/10H04L67/06H04L67/1097H04L9/0861H04L9/0643
Inventor 郭永安王园梦郭静孙洪波
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products