Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing core role-based access control based on attribute-based encryption

A technology of role access control and attribute-based encryption, applied in the field of information security, can solve problems such as low efficiency and inability to implement fine-grained RPA strategies

Active Publication Date: 2017-12-01
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme cannot implement a fine-grained RPA policy, and the efficiency is low when the user is revoked, because the encryption keys of all files that the user can access need to be updated, and the data owner not only needs to update the key of the role corresponding to the revoked user And re-encrypt the file key set, and re-encrypt the updated file key set for the roles corresponding to all other users who have access to these files, and the involved users also need to re-obtain and decrypt the file key set

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing core role-based access control based on attribute-based encryption
  • Method for implementing core role-based access control based on attribute-based encryption
  • Method for implementing core role-based access control based on attribute-based encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Embodiment 1, will figure 1 The shown method of using attribute-based encryption to implement the core role access control model is used to implement the core RBAC access control in the outsourcing service environment (cloud storage), and the structure of the formed system is as follows figure 2 As shown, the system includes three types of entities: resource owner, resource user, and outsourced server (cloud storage server). The outsourced server downloads the relevant ciphertext, obtains the key information from the resource owner, and finally decrypts to obtain the plaintext of the resource.

[0087] (1) Resource owner, responsible for system initialization (A——Setup), creation of roles (B——AddRole), creation of permissions (C——AddPermission), role / permission assignment (D——GrantPermission), role / authorization revocation (E——RevokePermission), create user (G——AddUser), user / role assignment (H——AssignUser), user / role revocation (I——DeassignUser), delete user (J——Dele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for implementing a core role-based access control (RBAC) model based on a policy-attribute-based encryption algorithm. The method includes: creating and deleting a role and the related password information; creating and deleting a user and the related password information; implementing user / role relationship assignment and user / role relationship revocation through the use of the attribute-based encryption algorithm; implementing the role / authority relationship assignment and role / authority relationship revocation through the use of the attribute-based encryption algorithm; and implementing by the user the attribute-based decryption algorithm to achieve the access to the controlled resources, that is, the authorized decision. The method of the invention utilizes the cryptography method to ensure the correct implementation of the role-based access control model. The authorized decision does not depend on any third party, which can not only improve the safety and efficiency of sharing resources in an outsourcing environment, but can also provide a feasible solution for the role-based access control system of a current enterprise-level information system to be transplanted into the outsourcing environment such as cloud computing.

Description

technical field [0001] The invention relates to a method for implementing core role access control based on attribute-based encryption, which belongs to the technical field of information security. Background technique [0002] Role Based Access Control (RBAC) introduces roles between users and access rights, users are managed with one or more specific roles, roles are associated with one or more access rights, and users and access rights are realized The logical separation of access control greatly simplifies rights management, and this method is closer to the management method of real organizations, so it has gradually become an access control method commonly used in the industry. The national standard GB / T 25062-2010 defines three models of core RBAC, hierarchical RBAC and constrained RBAC, in which core RBAC defines the minimum set of elements (sets) and relationships necessary to fully implement an RBAC system. The core RBAC management functions include the creation an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218H04L63/10
Inventor 王勇李明胡昌振刘振岩张继薛静峰童学敏
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products