Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Government services cloud access control method based on attribute encryption

A technology of government cloud access and attribute encryption, applied in the field of government cloud access control based on attribute encryption, to achieve the effect of flexible authorization revocation and security assurance

Active Publication Date: 2016-05-18
XIDIAN UNIV
View PDF1 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an attribute encryption-based government cloud access control method, aiming to solve the access security problem in e-government in the era of cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Government services cloud access control method based on attribute encryption
  • Government services cloud access control method based on attribute encryption
  • Government services cloud access control method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] In order to make the purpose, technical invention and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0095] The invention adopts ciphertext-based policy attribute encryption and symmetric encryption, group-based broadcast encryption technology, identity-based signature mechanism, time stamp and token tree mechanism to realize safe storage and access control of confidential data.

[0096] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0097] like figure 1 As shown, the government cloud access control method based on attribute encryption in the embodiment of the present invention includes the following steps:

[0098] S101: Encrypt the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a government services cloud access control method based on attribute encryption. A central authority determines all attributes of a system, permits or revokes attribute authority management authority, and authenticates administrative staff; an attribute authority receives the login of administrative staff in the jurisdiction thereof and is simultaneously responsible for attribute revocation of the administrative staff; a cloud server stores data and carries out semi-decryption on an encrypted file when a user sends out a data request; a data uploader makes an access control strategy according to the security level of the file, and encrypts and uploads the file after name signing; and an access user sends out a data access request and finally decrypts the encrypted file. By adopting the attribute encryption scheme, the loads caused by user attribute revocation and encrypted file updating are reduced, the trap door information capturing of the user is controlled, and attribute revocation is carried out on the user under the condition that the encrypted file is not changed; in addition, by utilizing the name signing and attribute encryption scheme based on the identity, the safety authority of the user and fine-grained access control are realized.

Description

technical field [0001] The invention belongs to the technical field of cloud data information security, and in particular relates to an attribute encryption-based government cloud access control method. Background technique [0002] As early as May 2010, recovery.gov, a website of the U.S. government, had fully used Amazon’s AWS, becoming the first cloud computing project of the U.S. government’s IT system. collaboration. This successful case has made the government departments of various countries see an opportunity, so the government departments of all countries are making efforts to carry out e-government reform. With the progress of government reform, government departments have also begun to purchase services from telecom operators instead of building their own platforms. After the construction of major e-government projects such as the "Golden Letter Project" in my country, the vertical e-government of vertical management departments has reached a relatively high lev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/10
Inventor 高军涛朱秀芹吕留伟李雪莲张鹏安泽
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products