基于属性的匿名信息共享模型研究
[Abstract]:With the rapid development of information technology, resource sharing on the network makes the access to information more convenient. All kinds of application domains contain abundant resources. It has become a trend to ensure the security of cross-domain resource sharing. Secondly, when users obtain resources from the application domain, they are often required to submit personal identity information, there is a hidden danger of identity privacy disclosure, so users want to be able to obtain resources anonymously. In the traditional access control, role-based access control is widely used in enterprises, but the role as the authorization basis is too single to express all user rights, and it is difficult to apply to cross-domain access control. In the aspect of privacy protection, some scholars have proposed anonymous authentication schemes based on PKI/PMI system, but these schemes still have some security problems such as impersonation attacks, man-in-the-middle attacks and so on. According to the above mentioned problems, this paper proposes a solution to implement anonymous cross-domain authentication and authorization management. This paper first introduces the PKI/PMI architecture, the development of access control technology, the policy language model of XACML and its characteristics, and analyzes the shortcomings of related anonymous authentication and authorization management schemes. On the basis of the above, this paper designs an anonymous identity authentication scheme which can implement anonymous identity authentication both in domain and across domains. The whole authentication process is anonymous and secure. On the basis of anonymous identity authentication, this paper proposes an attribute-based anonymous information sharing model. The attribute certificate is used as the carrier of the user attribute to realize the cross-domain access based on the attribute. The algorithm of policy formulation and policy evaluation is given. The policy can be formulated for the users in different application domains and the authority management of the user can be realized. Finally, a specific test scenario is designed. The upload module formulates the strategy, simulates the process of access control, compares the test results with the theoretical results and verifies the correctness of the strategy and the access decision.
【学位授予单位】:浙江工商大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【参考文献】
相关期刊论文 前10条
1 贺靖靖;刘景森;史强;;基于PMI属性证书的匿名认证方案[J];计算机安全;2013年01期
2 贺靖靖;刘景森;史强;傅慧明;;基于PMI角色模型的匿名认证方案[J];计算机科学;2012年S3期
3 程相然;陈性元;张斌;杨艳;;基于属性的访问控制策略模型[J];计算机工程;2010年15期
4 王小明;付红;张立臣;;基于属性的访问控制研究进展[J];电子学报;2010年07期
5 路川;胡欣杰;纪锋;;基于角色访问控制的协同办公系统设计与实现[J];计算机技术与发展;2010年03期
6 葛琨;郎波;;基于属性访问控制方法中的策略定义研究[J];微计算机信息;2008年33期
7 张基温;裴浩;;基于PMI的安全匿名授权体系[J];计算机工程与设计;2007年03期
8 沈海波;;基于属性访问控制中的敏感属性保护研究[J];湖北教育学院学报;2006年08期
9 汪厚祥,李卉;基于角色的访问控制研究[J];计算机应用研究;2005年04期
10 侯奋飞,宋宇波;基于PMI的电子政务访问控制体系[J];计算机工程;2004年17期
相关硕士学位论文 前10条
1 刘欢;跨域认证与授权系统的设计与实现[D];西安电子科技大学;2014年
2 史强;机会网络中基于PKI/PMI体系的节点身份隐私保护方案[D];河南大学;2014年
3 郝志刚;基于属性标记的访问控制模型研究[D];西安电子科技大学;2012年
4 常敬玉;基于属性的访问控制在多域网络中的应用[D];西安电子科技大学;2012年
5 张文婷;基于属性的Web服务访问控制研究与设计[D];武汉工程大学;2011年
6 侯素娟;基于属性的访问控制模型及应用研究[D];重庆大学;2010年
7 王兵;基于PKI的匿名数字证书的研究与实现[D];东北大学;2009年
8 马欣;基于PMI的电子政务访问权限控制的研究与实现[D];西安建筑科技大学;2008年
9 陈婕;跨域授权管理系统的研究与实现[D];西安电子科技大学;2007年
10 王飞;基于PKI/PMI的认证和授权的研究[D];华中科技大学;2006年
,本文编号:2250167
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2250167.html