Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Support revoking outsourcing verifiable multi-authorization center access control method, cloud server

An authorization center and access control technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as difficult revocation problems, difficult revocation, high computational complexity, etc., to avoid system bottlenecks and collusion attacks , the effect of improving access efficiency

Active Publication Date: 2021-12-14
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
In addition, if permissions are revoked frequently, the computational burden will be heavy, and the dynamic nature of attributes increases the overhead and difficulty of key updates.
Most existing technologies are not efficient enough to support flexible revocation of users and attributes in cloud storage systems. Therefore, it is necessary to propose an access control method that supports revocation outsourcing and verifiable multiple authorization centers
[0003] In summary, the problems in the prior art are: The existing technologies are not efficient enough, and do not support flexible revocation of users and attributes in the cloud storage system; the calculation complexity is high, the overhead is large, and revocation is difficult
[0004] The difficulty and significance of solving the above technical problems: Access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
In addition, if permissions are revoked frequently, the computational burden will be heavy, and the dynamic nature of attributes increases the overhead and difficulty of key updates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Support revoking outsourcing verifiable multi-authorization center access control method, cloud server
  • Support revoking outsourcing verifiable multi-authorization center access control method, cloud server
  • Support revoking outsourcing verifiable multi-authorization center access control method, cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] The present invention is applied in cloud storage to support revoking outsourcing and verifiable multi-authorization center access control method, so as to ensure the security of user's private data, reduce user's computing overhead, and dynamically manage user's authority in the system.

[0065] Such as figure 1 As shown, the access control method for supporting revoked outsourcing verifiable multi-authorization centers provided by the embodiment of the present invention includes the following steps:

[0066]S101: System initialization, including initialization of the global certification center CA and other autho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field characterized by protocols, and discloses an access control method and a cloud server that support the cancellation of outsourcing and verifiable multi-authorization centers, including: system initialization, including the initialization of the global authentication center and other authorization centers; the authorization center is the user Assign the attribute set and generate the key required for decryption; the data owner encrypts the file, and the encryption process includes outsourcing encryption, verification of the outsourcing result and the final encryption of the data owner; the user issues a file access to the cloud service provider Request, the process includes outsourcing decryption by the cloud service provider, verification of outsourcing results, and final decryption by users; revoking certain users or certain attributes in the system. The invention has the advantages of high system access efficiency, low calculation overhead, and supports dynamic user authority management, and can be used in cloud storage to ensure the security of user privacy data, reduce user calculation overhead, and dynamically manage user authority in the system.

Description

technical field [0001] The invention belongs to the technical field characterized by protocols, and in particular relates to an access control method and a cloud server that support revoking outsourcing verifiable multi-authorization centers. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the continuous development of information technology, people's life has been greatly improved. Among them, the rapid development of cloud computing has attracted widespread attention. Cloud computing is an entity with huge computing and storage capabilities. It is the product of the combination of network storage, virtualization, load balancing, distributed computing, parallel computing, utility computing and other traditional computing technologies and network technology development. Its power is that it can dynamically distribute computing resources to users through the network. At the same time, users can also sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L9/0891H04L9/0894H04L63/0428H04L63/10H04L63/101
Inventor 樊凯王俊雄许辉岳潘强李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products