Attribute-based encryption and block chain combined trusted data access control scheme

A technology of data access control and attribute-based encryption, applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problems of blockchain storage bottleneck, weak access control capability, blockchain occupation, etc., to ensure confidentiality security and integrity, guaranteeing confidentiality, and relieving storage pressure

Active Publication Date: 2021-05-25
北京深安信息科技有限公司 +1
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, many technical literatures have proposed various blockchain-based data access control schemes, such as blockchain-based Internet of Things authentication and security schemes, attribute-based Access control schemes, etc., they can avoid single point of failure and data tampering, and to a certain extent, can achieve data access control, even fine-grained access control, but there is a blockchain storage bottleneck problem
Some technicians have also proposed blockchain storage optimization methods, such as the blockchain fragmentation storage model based on threshold secret sharing, and the blockchain storage scheme based on network coding, etc., all of which can save the storage cost of the blockchain, but They are all improvements on the basis of storing complete ledgers. The blockchain still needs to occupy a large storage space and has weak access control capabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based encryption and block chain combined trusted data access control scheme
  • Attribute-based encryption and block chain combined trusted data access control scheme
  • Attribute-based encryption and block chain combined trusted data access control scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings, wherein the symmetric encryption and decryption algorithm is exemplified by AES, and the hash algorithm is exemplified by the SHA256 algorithm:

[0033] The first step: data storage, such as figure 1 As shown, the specific processing is as follows:

[0034] Step 101: the data owner Owner selects the file file to be stored, and sets the access control strategy policy of the file;

[0035] Step 102-1: The Owner has a unique key key of the symmetric encryption algorithm. If the Owner has not previously generated a key key, the access control end will call the key generation algorithm of the symmetric encryption to generate the Key of the Owner. The key generation method is: key = AES. Gen(Owner);

[0036] Step 102-2: The access control terminal invokes the encryption algorithm of symmetric encryption to encrypt the file file to obtain the encrypted file encfile....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attribute-based encryption and block chain combined trusted data access control scheme, which mainly comprises six participants: a data owner, a data consumer, an access control end, a block chain network, an IPFS distributed storage network and a third-party authorization server; the data owner represents a producer or owner of the data; the data consumer represents a user needing to access the data; data generated by the data owner is encrypted and stored in the IPFS; the block chain network is used for storing an address value, stored on the IPFS, of user data, a hash value of the data, an access control strategy and file identification information; the third-party authorization server is mainly used for generating and transmitting a public key, a master key and a private key of an attribute-based encryption algorithm; the access control scheme includes a data storage operation and a data access operation. According to the invention, the block chain technology and distributed storage are combined, only key information such as the data hash value, the ciphertext position hash value and the access control strategy is stored on the block chain, and the storage pressure of the block chain is relieved.

Description

technical field [0001] The present invention relates to a trusted data access control scheme, more particularly, a scheme for fine-grained data access control through the combination of attribute-based encryption and blockchain. Background technique [0002] Data storage and computing in traditional computer application systems often adopt a centralized architecture. Since these systems are independent of each other and do not interact with each other, a "data island" problem has formed. With the continuous improvement of social informatization, the value of data sharing has become increasingly prominent, and the premise of realizing data sharing is to ensure data security and credibility. Traditional centralized storage and computing architectures are vulnerable to various cyber attacks such as single point attacks, man-in-the-middle attacks, and distributed denial-of-service attacks. If these attacks happen, it will lead to data leakage and cause irreparable losses. Bloc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/604G06F21/6218G06F21/64G06F2221/2107
Inventor 杨玉梅芦效峰付淞兵
Owner 北京深安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products