Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of general access policy in cloud storage

A technology of access policy and implementation method, applied in the direction of instruments, digital transmission systems, security communication devices, etc., to achieve the effect of perfect security

Active Publication Date: 2022-05-13
LANZHOU UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention uses the Chinese remainder theorem on the polynomial ring to establish a general access structure, avoids the nonlinear integer programming problem of solving multiple large prime numbers, and only needs to deal with an integer linear programming problem like the Lagrangian interpolation scheme; At the same time, it solves the different weights of different users; provides an algorithm to quickly find the modulo operator to quickly find the reduced polynomial suitable for the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of general access policy in cloud storage
  • Implementation method of general access policy in cloud storage
  • Implementation method of general access policy in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The specific implementation of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0088] The implementation example of the present invention provides a general access structure using the Chinese remainder theorem on polynomial rings. In order to construct a general access structure, it is first necessary to use the policies of the general access structure to determine the maximum forbidden set and the minimum authorized set, and then to assign user weights, secondly to use the Chinese remainder theorem on the polynomial ring to carry out secret sharing, and finally the secret refactoring phase.

[0089] The following section first introduces the determination of the maximum forbidden set and the minimum authorized set, then introduces how to determine the modulus of the Chinese remainder theorem, then introduces how to perform secret sharing, and finally introduces the reconstruction of the secret.

[0090] 1. Deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a method for realizing general access policies in cloud storage. The method utilizes the polynomial ring F p The Chinese remainder theorem on [x] constructs general access structures. The irreducible polynomial is used as the modulus of the Chinese remainder theorem, and the degree of the polynomial is determined by solving an integer linear programming problem, and is proportional to the power of the user. The constraints of integer linear programming depend on the characteristics of the general access structure. The method is perfectly secure and does not rely on any computationally hard problems. This method is divided into three steps: access structure preprocessing, secret distribution and secret reconstruction. The preprocessing stage includes: determining the maximum prohibited set and the minimum authorized set, determining the modulus, establishing constraint conditions and determining the degree of irreducible polynomials. The secret sharing stage includes: finding the irreducible polynomial f of the corresponding degree i (x), generate sub-secret S i , Distributing sub-secrets. The secret reconstruction stage includes: using the Chinese remainder theorem to restore the formula of the secret to obtain the secret S.

Description

technical field [0001] The invention relates to secret sharing in the field of information security and access control in cloud storage, in particular to a method for realizing general access policies in cloud storage. Background technique [0002] Data sharing is the main feature of today's era, and the development of the Internet of Things, cloud storage and cloud computing has further promoted its wide application. As the protection of data usage rights and personal privacy issues become increasingly prominent, the encryption of data stored on the cloud has become an important means of data sharing, thereby providing a secure environment for data sharing. In cloud outsourcing computing, encrypted data requires legitimate users to access data, but illegal users cannot access data. Therefore, constructing a legalized access strategy for cloud outsourcing data has become a key task. Among various access strategies, the general access strategy allows various combinations of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40G06F21/62
CPCH04L9/085H04L63/205G06F21/6218
Inventor 贾星星郭钰生宋祎璇罗向阳
Owner LANZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products