基于属性加密的数据访问控制方法研究
[Abstract]:With the rise and development of new computing technologies such as cloud computing, Internet of things and large data, global information has brought about profound changes in the world. The dependence of information technology on the various layers of national economy, social development and people's life has reached an unprecedented level. At the same time, the openness of the Internet and the sharing of information to the global information security It poses a serious threat, and information security is one of the main contents of national security. Access control is an important basis for protecting data confidentiality, integrity, availability and legitimate use. It is one of the key strategies for network security prevention and resource protection. However, the scale of the network is not broken and the amount of users and data in the distributed network environment are not broken. The increasing demand for data, personal privacy demand and granularity is increasing, and it is urgent to realize fine dynamic authorization for large-scale users. The security requirement mode has changed from the single user to the multiuser communication mode of at least one party to the multiuser, and the communication from "the same domain" to "cross domain" communication. Traditional access control is facing new challenges. In recent years, scholars at home and abroad have carried out a wide range of research based on attribute encryption access control methods, and a large number of research results have been achieved. However, such problems as diverse rights, access control and hidden access control strategies are still needed to be further studied. The study of access control based on attribute encryption is carried out in this paper. The main research work is as follows: 1. a multi attribute authority access control scheme with user privileges is designed to solve the user's diverse rights requirement. The following problems are solved: (1) it is impossible to satisfy the current user's right of diversification from a single user authority. Limited requirements, provide different user rights, make users with different attribute sets get different privileges. (2) using a central authority and multiple attribute authority combination, the solution of the attribute cryptosystem of single attribute authority can not meet the needs of large-scale distributed application to different organizations, and easy to be attacked by centralized attack. (3) (3) the data owner produces a short signature while generating the ciphertext, which ensures the integrity of the data and the authenticity of the data source; (4) the security of the scheme is proved under the selection of the attribute set security model, and the increase of information and less computation with the same scheme is compared with that of the excessive concentration of user rights. Abuse problem, propose a user group verifiable access control scheme and security model, and prove the security of the scheme. The main function of the scheme is: (1) the user group is introduced in the scheme, not only the user rights are dispersed, but each participant only needs to store a small amount of information; (2) the secret sharing mechanism can be verified by Schoenmaker. The non interactive supervision mechanism of the central authority CA reduces the dependence on the authority of the central authority, so the scheme can adopt a semi trusted or untrusted central authority; (3) each participant can verify the integrity of the user by checking the information provided by other participants in the same user group; (4) the scheme is entered with the existing scheme. According to the comparison, the user rights management of this scheme is more detailed, and the computation of the property key is less than.3.. A complete hidden access strategy is designed, and an access control mechanism is constructed to fully hide the access strategy in the cloud storage, and the data is stored in the semi trusted cloud number. According to security and confidentiality protection, it is realized: (1) the access strategy is completely hidden from the cloud storage service provider CSP, which solves the problem of data confidentiality and integrity caused by privileged users in the cloud storage environment; (2) the access strategy is completely hidden for all users, even if a legitimate user has encrypted shared data. Work decryption, he can not determine the access strategy he observes; (3) add the user property change function, introduce the agent rescipher mechanism in the scheme, CSP complete the re encryption task alone without knowing the access strategy and the content of the data, and avoid the burden of the re encryption of the data owner; (4) the security of the scheme is carried out. It is proved that, by comparing with the similar scheme, the more thorough.4. hidden in this scheme is a typical application scene with intelligent distribution network, and a data aggregation and access control model of the intelligent distribution network communication system is designed, and the communication environment of Yu Zhineng distribution network based on attribute access control is applied. The following is completed. The work is: (1) aiming at the collection of massive data in the intelligent distribution network, the Paillier homomorphic mechanism is used to collect multidimensional data and ensure the confidentiality of the data, and the signature is verified by batch verification, making the number of the calculated numbers from 3T to 3. (2) using the attribute based access control method to encrypt the feedback command, avoiding the large number of intelligent terminal acquisition. The same command and the corresponding security attacks; (3) the signature is provided in the data collection and command feedback phase, which ensures the integrity of the data and resource authentication; (4) through the analysis and Simulation of the amount, traffic and function of the existing schemes, the experiment shows that the number of aggregated data is relatively small and the number of intelligent terminals is Pang. In the case of large and classified authorization, this scheme has obvious advantages in terms of computation cost and feedback command access control.
【学位授予单位】:兰州理工大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TP309
【相似文献】
相关期刊论文 前10条
1 付艳艳;张敏;冯登国;陈开渠;;基于节点分割的社交网络属性隐私保护[J];软件学报;2014年04期
2 马秀琴;冯百明;秦红武;;属性集重要性的研究[J];计算机应用;2010年07期
3 李勇;曾振宇;张晓菲;;支持属性撤销的外包解密方案[J];清华大学学报(自然科学版);2013年12期
4 林蓉;史开泉;;函数P-集合与信息规律的属性控制[J];计算机科学;2012年07期
5 陈源;曾德胜;谢冲;;基于聚类的属性约简方法[J];计算机系统应用;2009年05期
6 于海燕;乔晓东;;一种完备的最小属性约简方法[J];计算机工程;2012年04期
7 张春英;王立亚;;基于属性集合幂集的区间概念格L_α~β的渐进式生成算法[J];计算机应用研究;2014年03期
8 杨祥茂;黄涛;周启海;;基于效用的结构语法的属性学习[J];计算机科学;2008年09期
9 孟庆全;梅灿华;;一种新的属性集依赖度[J];计算机应用;2007年07期
10 刘明吉;王秀峰;饶一梅;;一个混合特征属性选择算法[J];计算机科学;2000年11期
相关会议论文 前2条
1 黄威;靳亚辉;;面向评论挖掘的产品属性集合构建[A];第六届(2011)中国管理学年会——信息管理分会场论文集[C];2011年
2 张秀廷;;“偶有属性”发微[A];逻辑今探——中国逻辑学会第五次代表大会暨学术讨论会论文集[C];1996年
相关博士学位论文 前6条
1 刘西蒙;基于属性密码体制的关键技术研究[D];西安电子科技大学;2015年
2 陈燕俐;基于属性的加密体制及应用研究[D];南京邮电大学;2014年
3 刘雪艳;基于属性加密的数据访问控制方法研究[D];兰州理工大学;2016年
4 汪文义;认知诊断评估中项目属性辅助标定方法研究[D];江西师范大学;2012年
5 杨淑群;基于属性层次结构的FCA及其在认知诊断中的应用研究[D];南京航空航天大学;2009年
6 黄九鸣;面向舆情分析和属性发现的网络文本挖掘技术研究[D];国防科学技术大学;2011年
相关硕士学位论文 前10条
1 刘文超;云计算中基于属性的访问控制研究[D];电子科技大学;2015年
2 白冬辉;基于属性拓扑的并行概念计算算法研究[D];燕山大学;2016年
3 刘慧娟;基于图数据的关键字覆盖集合问题研究[D];燕山大学;2016年
4 李慧;属性拓扑与概念格双向转化研究[D];燕山大学;2016年
5 贾红;移动云环境下基于属性解密的外包技术研究[D];西安电子科技大学;2014年
6 张良奥;云计算环境下基于属性加密的访问控制方案研究[D];南京信息工程大学;2016年
7 何明君;策略隐藏的属性基加密在医疗云中的研究和应用[D];南京邮电大学;2016年
8 张赛;云计算中支持属性撤销的策略隐藏与层次化访问控制[D];南京邮电大学;2016年
9 王梓莹;基于属性的分层加密算法的研究与应用[D];南京航空航天大学;2016年
10 吴祥龙;多属性权威云存储系统中安全数据存储、接入和共享机制研究[D];东南大学;2016年
,本文编号:2146379
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2146379.html