Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Agent-based revocable multi-authorization center access control method and cloud storage system

A technology of authorization center and access control, applied in transmission systems, digital transmission systems, and key distribution, which can solve the problems of heavy computing burden on data users, reducing system efficiency and flexibility, and not being suitable for outsourcing environments.

Active Publication Date: 2018-11-13
XIDIAN UNIV
View PDF1 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
[0004] (1) In the attribute-based encryption system, the computational overhead of the encryption and decryption stages is large, which makes the computational burden of the data user too heavy, which seriously affects its practicability
[0005] (2) None of the existing technologies are suitable for the outsourcing environment, and the efficiency is low in practice
[0006] (3) The existing revocation technology cannot realize instant attribute revocation, and the key update stage may become the bottleneck of the system, or rely on a trusted server, which seriously reduces the efficiency and flexibility of the system
[0009] (2) The usual method of attribute revocation is to update the key and re-encrypt the ciphertext. This method is difficult to realize the dynamic management of attributes, which is another important reason why the attribute decryption technology is currently difficult to be practically applied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent-based revocable multi-authorization center access control method and cloud storage system
  • Agent-based revocable multi-authorization center access control method and cloud storage system
  • Agent-based revocable multi-authorization center access control method and cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0061] The present invention aims at the prior art. In the attribute-based encryption system, the calculation overhead of the encryption and decryption stages is relatively large, which seriously affects its practicability; it is not suitable for outsourcing environment, and the efficiency is low in practice; it cannot be realized in the existing revocation technology Immediate attribute revocation, and the key update stage may become the bottleneck of the system, or rely on the lack of a trusted server. A proxy-based revocable multi-authorization center access control method is proposed to ensure the security of user privac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication networks, and discloses an agent-based revocable multi-authorization center access control method and a cloud storage system. Themethod comprises the steps that system initialization is conducted, wherein initialization of a global authentication center CA and other authorization centers AA and initialization of a cloud serverare included; the authorization centers AA allocate attribute sets to users and generate keys needed for decryption for the users; a data owner encrypts a file; the users send file access requests toa cloud service provider, wherein the process comprises outsourcing decryption of the cloud service provider and final decryption of the users; and some users or some attributes in the system are revoked. The method has the advantages of being high in system efficiency, supporting dynamic user permission management and the like and can be used for ensuring the privacy data security of the users in the data information system, reducing the computing overhead of the users and dynamically managing the permissions of the users in the system.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to an agent-based revocable multi-authorization center access control method and a cloud storage system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: In recent years, the research and construction of data information systems are in full swing. Data information systems can manage resources by integrating multiple information and communication technologies, realize urban intelligent management and operation, and promote harmonious and sustainable urban development, thereby improving the quality of life of urban residents. Cloud computing is the growth, usage and delivery model of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. Cloud computing can provide a safe and reliable data storage an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0891H04L63/0428H04L63/06H04L63/10H04L63/105H04L67/1097H04L9/0869H04L67/56
Inventor 樊凯许辉岳王俊雄尹洁潘强李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products