Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-authorization center access control method and system and cloud storage system

A technology of authorization center and access control, applied in the field of information security, it can solve the problems of incalculable calculation cost of users, computational burden of decryption, and heavy user burden of attribute set encryption algorithm.

Inactive Publication Date: 2019-12-20
XIDIAN UNIV
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) In the previous attribute encryption process, according to the CP-ABE algorithm, the data owner specifies the access structure and independently completes the encryption and decryption calculations. In order to meet the data security, the encryption and decryption have a huge amount of calculation. When more and more, the computing overhead brought to users is incalculable
In addition, when performing attribute revocation, the data needs to be re-encrypted and then placed in the cloud, and the calculation and communication overhead are also very large
[0010] (2) In the entire outsourcing scheme, all key generation and distribution are in the charge of the authorization center, so once the authorization center has information leakage problems, the privacy and security of users will not be guaranteed
(2) The technical bottleneck of the attribute set encryption algorithm is due to the heavy computational burden of encryption and decryption for users, which is also an important reason why this technology is difficult to be practically applied at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authorization center access control method and system and cloud storage system
  • Multi-authorization center access control method and system and cloud storage system
  • Multi-authorization center access control method and system and cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] Aiming at the problems existing in the prior art, the present invention provides a multi-authorization center access control method, system and cloud storage system. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0070] Such as figure 1 As shown, the multi-authorization center access control method provided by the embodiment of the present invention includes the following steps:

[0071] S101: System initialization: initialization of the global authentication center CA, attribute authorization center AA and cloud server global public parameters, assigning uni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a multi-authorization center access control method and system and a cloud storage system, and the method comprises the steps: system initialization: initializing a global authentication center CA and an attribute authorization center AA; data encryption: outsourcing encryption and user encryption performed by a cloud service provider; key generation: an attribute authorization center AA allocates an attribute private key related to the attribute and a user decryption key to the user; the user sends a file access request to the cloud service provider, and the process comprises outsourcing decryption of the cloud service provider and final decryption of the user; some users in the system are revoked; certainattributes in the system are revoked. The method has the advantages of high system efficiency, reduction of user computing burden, support of multiple authorization centers, dynamic change of user permission and the like, and can be used in a cloud storage system to guarantee the data privacy security of users, reduce the computing overhead of the users and improve the system efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a multi-authorization center access control method, system and cloud storage system. Background technique [0002] At present, the closest existing technology: cloud computing has gradually matured after more than ten years of development since it was proposed, and is in a period of explosive growth. Cloud computing is an intensive computing mode centered on data and processing power, and it is also an entity with huge computing power and storage capacity. The rapid expansion of business volume, information volume, and the number of users brought about by the development of cloud computing has caused massive data processing problems. Therefore, efficient data processing technology is one of the indispensable core technologies of cloud computing. For cloud computing, data management faces huge challenges. Derived from it is the concept of cloud storage,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0876H04L63/10H04L67/1097
Inventor 樊凯刘婷婷潘强白宇晗李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products