Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CP-ABE cloud data security sharing scheme based on block chain

A CP-ABE, blockchain technology, applied in the field of CP-ABE cloud data security sharing solution based on blockchain, can solve the problem of data security sharing without considering the control rights of data providers, and reduce the key Generation efficiency and other issues, to achieve the effect of reducing generation efficiency, small storage footprint, and fewer keys

Pending Publication Date: 2021-07-02
FUJIAN NORMAL UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The scheme proposed by Wei, et al. and the Block-Secure scheme are based on blockchain technology, which can ensure the integrity of data, but it does not solve the problem of data security sharing. Attribute-based encryption technology supports fine-grained access control, but the attribute-based encryption scheme relies on Trusted third party, the tuCP-ABE scheme uses two trusted third parties to ensure security, which reduces the efficiency of key generation. The scheme also requires that the two trusted third parties will not collude;
[0004] Most of the above-mentioned schemes are the improvement of the application of separate technology, but the technology itself has its limitations, and the scheme only mentions that the data itself will not be obtained by malicious users, and does not take into account the control rights of the data provider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE cloud data security sharing scheme based on block chain
  • CP-ABE cloud data security sharing scheme based on block chain
  • CP-ABE cloud data security sharing scheme based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] see Figure 1-6 , the present invention provides a technical solution: a blockchain-based CP-ABE cloud data security sharing scheme, including a blockchain-based cloud user behavior traceability mechanism, a blockchain-based cloud data storage and verification mechanism, and a blockchain-based cloud data storage and verification mechanism based on The CP-ABE data encryption and decryption mechanism of the blockchain improves data security.

[0050] A b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CP-ABE cloud data security sharing scheme based on a block chain, and the scheme comprises a cloud user behavior tracing mechanism based on the block chain, a cloud data storage and verification mechanism based on the block chain, and a CP-ABE data encryption and decryption mechanism based on the block chain.The scheme has the beneficial effects that the DO uploads the data, so that if the DR wants to acquire the decrypted data; the DR needs to negotiate a key with the DO, the DO has the control right of own data and can determine which user to decrypt the data, two trusted third parties are responsible for key generation in the tuCP-ABE scheme, the data owner does not have the authority to determine who can decrypt the data, the key is negotiated by the two parties of the user without depending on the centralized trusted third parties, the tuCP-ABE scheme not only depends on a centralized trusted third party, but also introduces two third parties in order to ensure safety, so that the key generation efficiency is greatly reduced, and by adding the tuCP-ABE scheme, the generated keys are fewer, the generated ciphertexts are fewer, and the storage occupation is smaller.

Description

technical field [0001] The invention relates to the field of mechanical technology, in particular to a blockchain-based CP-ABE cloud data security sharing scheme. Background technique [0002] For most users, there may be little awareness of uploading encrypted data to the cloud. Most of the existing cloud security storage and sharing is to upload encrypted data. Encrypted sharing and key management have become a very important link. The scheme adopts encryption The key is stored in the group key, and the CKMS system manages the key with the help of CA, and provides a list of users and their permissions. Wei et al. proposed a blockchain-based cloud data integrity protection mechanism, and the Block-Secure scheme also Provides a cloud data security storage solution. The attribute-based encryption proposed by Sahai and Waters effectively supports fine-grained access control policies and is suitable for cloud security sharing. The tuCP-ABE scheme is an attribute-based encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60G06F21/64
CPCG06F21/31G06F21/602G06F21/64
Inventor 陈志德左雨庭陈晓阳古亮刘伯仲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products