基于属性基加密的细粒度访问控制机制研究
文内图片:
图片说明: 1Issue协议
[Abstract]:The out-of-data package can reduce the cost of the data owner. However, when data is stored on a remote server, the data owner loses control over its sensitive data, and the untrusted party may access the sensitive data. The traditional approach uses a fully trusted server to store and take charge of access control for sensitive data, and if the user has certain credentials to meet the access control policy, he can access sensitive data. However, once the server that stores sensitive data is threatened, the confidentiality of the data is also compromised. Therefore, sensitive data stored in the server needs to be stored in encrypted form, so that the confidentiality of the data is guaranteed even if the server is threatened. However, the conventional encryption method has the following disadvantages: (1). Encryption is the way a user and another user share data in secret; (2). Access to the encrypted data is either full access or full access. That is, they cannot be used to handle access control for the rich expression of the encrypted data. In many application, such as a cloud storage system, a data owner may wish to selectively share sensitive data in accordance with a policy of that recipient's attributes. It is not to encrypt data for each party at a time, but to encrypt data for all parties at a time. The attribute-based encryption scheme proposed in recent years can well meet these demands. Attribute-based encryption is a novel public-key encryption paradigm that allows users to encrypt and decrypt messages based on attributes, and it is rich in expression, enabling fine-grained access control to encrypted data. In this paper, a fine-grained access control mechanism based on attribute-based encryption is studied, and the main research contents and innovation points are as follows:1. It is proposed that the property-based encryption scheme of the property-based encryption scheme of the cryptograph policy of the black box can be traced back to the existing property-based encryption scheme requires a trusted central mechanism. The central mechanism has the master secret of the scheme, can calculate the private key related to any attribute of the user, and can decrypt any cipher text encrypted by any user, and generate and distribute the private key related to the attribute to other users. It must therefore be absolutely credible. If the central authority is engaged in a malicious activity, it will not be caught and prosecuted. That is, a key escrow problem is still present in the attribute-based encryption scheme. If this problem is not resolved, the adoption of the attribute-based encryption scheme will be affected. In this paper, a key encryption scheme is proposed in this paper. In this scheme, a secure private key generation protocol is constructed, and the judge can judge whether the decoding box is created by a malicious user or by a malicious central mechanism. The scheme reduces the trust of the central authorities, so that the possibility of the central authorities being charged with the abuse of such trust is reduced, so that the attribute-based encryption scheme can well implement fine-grained access control to the encrypted data. In the attribute-based encryption scheme, the key of the user's private key is related to the attribute set, and the sensitive data is encrypted into the cipher text under the access structure of the attribute, and the cipher text can be decrypted only when the attribute of the attribute satisfies the user of the access structure related to the cipher text. However, if the encrypted data is not decrypted, the existing attribute-based encryption scheme does not support the update of the access structure in the attribute-based encryption scheme. This paper presents a scheme for re-encryption of the attribute-based proxy of the cipher-text strategy, which allows the access structure related to the initial cipher text to be converted by an honest and curious agent, such as the cloud server, without the decryption of the cipher text, The agent re-encrypts the original cipher text to re-encrypt the cipher text under the other access structure, so that the user whose property satisfies the new access structure can decrypt the re-encrypted cipher text. The proposed scheme better solves the problem that the access structure in the attribute-based encryption scheme is changed frequently when the attribute-based encryption scheme is adopted to implement fine-grained access control to the encrypted data. in an out-of-packet system, an inadvertent transmission scheme with fine-grained access control based on an attribute-based encryption is proposed, although encryption techniques are used to protect the outsourced data, Service providers can still collect them. in order to protect the privacy of the user and to let the service provider implement the access control, the paper proposes an unintentional transmission scheme with fine-grained access control based on the attribute-based encryption, wherein the data in the database server is protected by the access control strategy, Only users whose certificates meet the access policy can access these data, and the service provider will not know which data or the user's credentials have been accessed by the user. The scheme of this paper has the following advantages: first, the scheme of this paper maintains the privacy characteristic that is inadvertently transmitted, and provides the fine-grained access control mechanism. Second, it allows an expression-based access control strategy that directly supports AND gates, OR gates, and Threshold. Third, the communication complexity in the scheme is constant with the number of records accessed by the user. Fourth, the scheme of this paper is constructed in prime order environment. An inner product predicate encryption scheme based on prime order group with outsourced decryption function is proposed. In the attribute-based encryption scheme of the predicate encryption scheme _ attribute hiding, the cipher text both hides the plain text message and hides the attribute. Predicate encryption implements fine-grained access control for encrypted data and searches for encrypted data. However, the main disadvantage of predicate encryption in efficiency is that the size of the cipher text and the time to decrypt it will increase with the complexity of the predicates. In this paper, an inner product predicate encryption scheme based on prime order group with outsourcing and decryption function is proposed, which greatly reduces the user's overhead. In the scheme, the user provides a conversion key to the cloud server to allow the cloud server to convert the ciphertext attribute to satisfy the predicate encryption cipher text of the predicate into a short cipher text, thereby greatly reducing the time when the user decrypts the cipher text, and the cloud server does not know any user information, At the same time, the user can verify the conversion of the cloud server to ensure the correctness of the conversion.
【学位授予单位】:电子科技大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TN918.4
【相似文献】
相关期刊论文 前10条
1 孙伟;李艳灵;周文勇;;细粒度基于传递功能的约束委托模型[J];信阳师范学院学报(自然科学版);2013年03期
2 夏汛;陈玲;;基于拦截器的细粒度权限设计[J];福建电脑;2012年11期
3 欧阳纯萍;阳小华;雷龙艳;徐强;余颖;刘志明;;多策略中文微博细粒度情绪分析研究[J];北京大学学报(自然科学版);2014年01期
4 史大伟;袁天伟;;一种粗细粒度结合的动态污点分析方法[J];计算机工程;2014年03期
5 原子;于莉莉;刘超;;引入缺陷的细粒度软件变更识别方法[J];北京航空航天大学学报;2014年09期
6 戢彦泓,郭常杰,钟玉琢,孙立峰;基于细粒度可扩展编码的多源视频流化方案[J];清华大学学报(自然科学版);2004年04期
7 涂登彪;谭光明;孙凝晖;;无锁同步的细粒度并行介度中心算法[J];软件学报;2011年05期
8 张宇轩;魏廷存;樊晓桠;张萌;;面向流体系的细粒度异步访存调度[J];计算机应用研究;2012年03期
9 王宽;;基于细粒度调整的同步播放控制算法[J];山西电子技术;2008年05期
10 华秀丽;徐凡;王中卿;李培峰;;细粒度科技论文摘要句子分类方法[J];计算机工程;2012年14期
相关会议论文 前5条
1 叶蕴芳;杨榆;罗鑫;徐国爱;;Appfuse系统中细粒度权限控制的研究与实现[A];2007北京地区高校研究生学术交流会通信与信息技术会议论文集(上册)[C];2008年
2 江伟玉;高能;刘泽艺;林雪燕;;一种云计算中的多重身份认证与授权方案[A];第27次全国计算机安全学术交流会论文集[C];2012年
3 郭磊;唐玉华;周杰;董亚卓;;基于FPGA的Cholesky分解细粒度并行结构与实现[A];2010年第16届全国信息存储技术大会(IST2010)论文集[C];2010年
4 李俊青;谢圣献;刘广亮;陈晨;;P2P网络基于蚁群优化的动态细粒度访问控制框架[A];2008年全国开放式分布与并行计算机学术会议论文集(下册)[C];2008年
5 盛振华;吴羽;江锦华;寿黎但;陈刚;;InfoSigs:一种面向WEB对象的细粒度聚类算法[A];第26届中国数据库学术会议论文集(A辑)[C];2009年
相关重要报纸文章 前2条
1 赵晓涛;巡展中的三大热门[N];网络世界;2007年
2 乐天邋编译;编织一张更好的Web[N];计算机世界;2007年
相关博士学位论文 前4条
1 付兴兵;基于属性基加密的细粒度访问控制机制研究[D];电子科技大学;2016年
2 时杰;关系数据库细粒度访问控制研究[D];华中科技大学;2010年
3 朱倩;面向自由文本的细粒度关系抽取的关键技术研究[D];江苏大学;2011年
4 余a\;基于Simulink模型的细粒度多线程技术研究[D];浙江大学;2014年
相关硕士学位论文 前10条
1 蔡雅雅;基于半监督集成剪枝算法的细粒度城市空气质量估计[D];浙江大学;2016年
2 何东梅;细粒度物体分类算法研究与实现[D];北京交通大学;2016年
3 廖纯;基于句法和语义的话题细粒度情感分析的研究[D];北京理工大学;2016年
4 李毅;属性层级观点挖掘技术的研究与应用[D];石家庄铁道大学;2016年
5 周志华;聊天系统文本情感细粒度分类研究与应用[D];西南交通大学;2015年
6 康海蒙;基于细粒度监控的Spark优化研究[D];哈尔滨工业大学;2016年
7 张s,
本文编号:2512455
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2512455.html