CN104901942B - A kind of distributed access control method based on encryption attribute - Google Patents

A kind of distributed access control method based on encryption attribute Download PDF

Info

Publication number
CN104901942B
CN104901942B CN201510106880.5A CN201510106880A CN104901942B CN 104901942 B CN104901942 B CN 104901942B CN 201510106880 A CN201510106880 A CN 201510106880A CN 104901942 B CN104901942 B CN 104901942B
Authority
CN
China
Prior art keywords
user
attribute
private key
gid
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510106880.5A
Other languages
Chinese (zh)
Other versions
CN104901942A (en
Inventor
肖敏
王明昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201510106880.5A priority Critical patent/CN104901942B/en
Publication of CN104901942A publication Critical patent/CN104901942A/en
Application granted granted Critical
Publication of CN104901942B publication Critical patent/CN104901942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention proposes a kind of distributed access control methods based on encryption attribute; this method is mainly used to solve the safety and Privacy Protection of mass data in cloud environment; the present invention proposes the CP-ABE mechanism of more authoritys a kind of on the basis of Ciphertext policy is based on encryption attribute mechanism (Ciphertext-Policy Attribute-Based Encryption, CP-ABE).The mechanism shares the workload of single authority using multiple authoritys, and efficient outsourcing decryption and user's revocation may be implemented and support being dynamically added and exiting for attribute authority (aa) (Attribute Authority, AA).Access control mechanisms provided by the invention are while protecting the safety and privacy of mass data, additionally it is possible to the features such as realizing efficient, distributed, expansible and fine-grained access control.

Description

A kind of distributed access control method based on encryption attribute
Technical field
The present invention relates to the data security arts in Computer Subject, Information security discipline, in particular to cloud computing environment Under data safety and secret protection.
Background technique
With the fast development of computer technology, internet and wireless network, the mass data generated daily is with number The form storage of change is on computers.Cloud computing technology provides an effective solution side for the storage and processing of mass data Case.But when user the storage of their data to third party cloud server when, it is contemplated that third party cloud server is incomplete Believable and user typically only allows for Accessor Access their data of authorization, therefore, the safety of user's sensitive data and Privacy faces great challenge, such as the individual on social network sites in the personal preference and friend circle and mailbox server of user Mail etc..When these servers are by hacker attack, the sensitive data of user will be leaked or even some cloud service provider meetings Interests are obtained by selling the data of user.
Access control and data encryption technology can satisfy demand of the above-mentioned user to data secret protection.Traditional access The safety of control system and performance are typically based on a complete believable server, and the permission and data of user is all by system Administrator distributes and manages, but when number of users is huge, this will seriously affect the efficiency of system.If the server is captured When, the data of user will be revealed.Data encryption technology can be effectively protected secure user data, when use public key encryption machine When making (such as RSA), then encipherer needs to know in advance the public key of recipient, as use asymmetric encryption mechanisms (such as AES (Advanced Encryption Standard)) when, encipherer needs to distribute key to recipient online, that is to say, that tradition Encryption mechanism be it is one-to-one, for different recipients, encipherer needs using different keys, file identical in this way It can be encrypted repeatedly generate different ciphertext storages on the server, when the data and huge number of users in system, can give Key management brings huge expense.And in many application environments, especially cloud environment, data owner only need basis to add Close strategy encrypts the data of sharing, and identity and which user without knowing recipient in advance can access the data. And construct the encryption mechanism based on strategy based on traditional encryption mechanism and be difficult, because working as data owner's encryption data When, there is still a need for all users for having and accessing its data permission are known in advance, it is then based on user collection and carrys out encryption data, But when newly addition user has access authority, data then need re-encrypted.And traditional encryption mechanism cannot be fine The fine granularity access of user data is supported on ground, so traditional access control system and encryption mechanism cannot be efficiently applied to point In the cloud environment of cloth.
Therefore, realize that the safety of mass data and secret protection need a particulate on incomplete believable Cloud Server Access control mechanisms system that is degree, expansible, distributed and can realizing one-to-many encryption.Currently, being added based on attribute Close (Attribute-Based Encryption, ABE) is considered as being best suited for solving data safety and privacy in cloud environment Protect and realize one of the technology of fine-grained data access control.There are two types of structures, the respectively ABE of key strategy by ABE The ABE (CP-ABE) of (Key-PolicyABE, KP-ABE) and Ciphertext policy.In KP-ABE mechanism, the key of each user with Access structure is related, and each ciphertext is related to one group of property set;Then on the contrary, each user key and one group in CP-ABE mechanism Property set is related, and ciphertext is related to access structure.When ABE is applied in cloud environment, it is contemplated that the data of data owner It is stored on Cloud Server, in order to enable data owner to control and manage data, CP-ABE has more advantage.
However when being applied in cloud environment CP-ABE mechanism, inevitably need to consider some practical problems.Example Such as, in systems in practice, user's position can change, and then the permission of user can change.In CP-ABE mechanism, use The permission and attribute at family correspond, so the variation of user right can regard the variation of user property as, i.e. user property is removed Pin problem.Simultaneously in view of the computing capability of user terminal is limited, and in CP-ABE, attribute in decryption time and access structure Quantity is linearly related, and when number of attributes is more, heavy computation burden can be brought to user.Therefore, it is designed for cloud environment When CP-ABE mechanism, efficient user's revocation and efficient decryption problems are all urgently to be resolved.Currently, having some CP-ABE machine The method being applied in cloud environment is made, but is all haveed the defects that certain.
Current existing method can be divided into the CP-ABE of single authority, as Chinese patent literature CN201210389845.5, CN201310132586.2, CN201410055341.9, CN201410330696.4, and the CP-ABE of more authoritys, such as CN201310647570.5, in the CP-ABE method of single authority, attribute management and key distribution in system are all by single Complete believable attribute authority (aa) (AttributeAuthority, AA) Lai Zhihang, the AA have the ability for decrypting all ciphertexts, when The AA is attacked or delay machine, and whole system will be affected and user key may be revealed, so single AA will It is the performance bottleneck and security vulnerabilities of system.Therefore, the CP-ABE of more authoritys is more suitable for cloud environment.
Document CN201210389845.5, CN201310132586.2, CN201410330696.4 consider user and remove Pin problem, but do not account for efficiently decrypting, and CN201410055341.9 is proposed outside one kind on the basis of CP-ABE The method for wrapping decryption realizes efficient decryption, but there is no consider user's revocation problem.CN201310647570.5 is proposed A kind of CP-ABE method of more authoritys applied to cloud environment, this method can be realized efficiently decryption and user cancels, but When carrying out user's revocation, this method not only needs to carry out private key update to the user containing revocation attribute, it is also necessary to tie to access Ciphertext containing revocation attribute in structure is updated, and when the mass data in view of being stored in cloud environment, the user revocation side Method can bring huge expense.
Summary of the invention
In view of this, to solve the above-mentioned problems, the magnanimity number being both able to satisfy the invention proposes one kind on Cloud Server According to safety and secret protection demand, and be able to achieve fine granularity and expansible Distributed access control mechanism.
In order to realize that Distributed access control mechanism, the present invention devise a kind of support outsourcing decryption and efficient user revocation More authoritys CP-ABE.In the encryption mechanism, when encryption data can define an access structure, and (access structure is based on description The property set of property) so that ciphertext is related to access structure;The decruption key of generation is then related to one group of descriptive property set, When the property set in decruption key meets the access structure in ciphertext, decruption key can just be decrypted correctly ciphertext.When When the permission of user changes, then key revocation update can be carried out to user.In order to mitigate the expense of user, ciphertext is decrypted Most of work has been delegated to Cloud Server.And the encryption mechanism distributes attribute key using multiple AA, which reduce The workload of single AA, while improving safety and the robustness of system.
CP-ABE is built upon on two-wire group, meets the property of bilinear map.The definition of bilinear map is given below: If G1And G2It is the multiplicative cyclic group that two ranks are prime number p.G is G1Generation member, bilinear map e:G1×G1→G2, the mapping There is following characteristic:
(1) bilinearity: for any u, v ∈ G1,a,b∈Zp,e(ua,vb)=e (u, v)ab
(2) non degenerate: e (g, g) ≠ 1;
(3) computability: for any u, v ∈ G1, can effectively calculate e (u, v).
Further, system model of the invention is as shown in Figure 1, the model is made of five entities, and respectively believable Tripartite's certificate server (TP), attribute authority (aa) (AA), data owner's Cloud Server and user.Wherein TP is responsible for recognizing for user Card and registration, and distribute global identity (GID), certificate and user's overall situation private key to legitimate user;Each AA is independent Attribute in operation and responsible management own domain, while they are also responsible for distributing attribute key to the legitimate user of registration, And in the storage to Cloud Server of the attribute key of user;Data owner based on the access structure of definition come encryption data, and In the data storage to Cloud Server of encryption;Cloud Server then provides the service of storing and accessing, when a legitimate user accesses The data of authorization, Cloud Server retrieve the attribute key of user first, then utilize attribute key decryption ciphertext and generation one The TK and ciphertext are simultaneously issued user by a decrypted token (TK), and then user decrypts ciphertext using global private key and TK, finally Obtain the data for needing to access.
Distributed access control mechanism provided by the invention based on encryption attribute, including the following steps:
S1: system initialization generates the public private key-pair of system common parameter, the public private key-pair of TP and each attribute;
S2: data encryption, data owner's encryption data, and data are stored on Cloud Server in an encrypted form;
S3: user key generates, and TP is to legitimate user one GID of distribution and gives user's distributing certificates and global private key, AA then distributes attribute private key to it based on the permission of user;
S4: access data, user access to server request data, and the property set and if only if user meets in ciphertext Access structure, user could decrypt ciphertext using global private key and attribute private key;
S5: user's revocation when the permission of user changes, is then updated the private key of user, makes it with one New identity rejoins system.
Further, the step S1 includes the following steps:
S11:TP initialization, inputs security parameter, generates the public private key-pair of system common parameter and TP;
S12:AA initialization.
Wherein S12 includes the following steps:
S121: each AA receives system common parameter and the public key of TP from TP;
S122: each AA generates public private key-pair for each attribute of its management.
Further, the step S2 includes the following steps:
S21: data owner receives the public key of system common parameter and each attribute from TP and AA respectively;
S22: data owner be based on global property collection U, to data definition one access structure A, A by access matrix (M, It ρ) indicates, the wherein mapping between the every a line of function ρ representing matrix M and attribute x;
S23: from ZpFor middle selection random number s as encryption exponent, enabling s is vectorFirst member Element;
S24: it calculatesWherein MiIt is the i-th row of matrix M;
S25: random number r is choseni∈Zp
S26: output ciphertext CT;
S27: data owner uploads to ciphertext CT on Cloud Server.
Further, the step S3 includes the following steps:
S31: system is added in user, submits identity information to be registered to TP;
The legitimacy of S32:TP certification user;
S33: if user is legal, distributing a GID to user, and distribute a certificate and global private key to user, Middle certificate includes GID, the attribute list of user and the global public key of user of user;If the user is illegal, refusal adds Enter system;
S34: when user receives certificate that TP is sent and global private key, certificate is just issued its each AA being subordinate to;
S35: after AA receives certificate, AA uses the public key decryptions certificate of TP, and verifies user GID and whether belong to user and remove It sells list (UL);
S36: ifThen AA generates attribute private key to user based on the attribute list of user;If GID ∈ UL, AA Terminate operation;
S37: and then the attribute private key of user is sent to Cloud Server by AA, and is stored on Cloud Server.
Further, the step S4 includes the following steps:
S41: user GID sends data access request to Cloud Server, and certificate is issued Cloud Server;
S42: Cloud Server uses the public key decryptions certificate of TP, and verifies whether user GID belongs to user's revocation list (UL);
S43: ifThen continue following operation;If GID ∈ UL, Cloud Server terminates operation;
S44: the attribute private key of Cloud Server retrieval user;
S45: ciphertext then is decrypted using the attribute private key of user, and generates decrypted token TK;
Wherein S45 includes the following steps:
S451: it enablesAnd I={ i: ρ (i) ∈ RA, if according to access matrix M, { λi}i∈IIt is encryption exponent s Effective sharing, then there is recovery coefficient { wi∈Zp}i∈IEncryption exponent, which can be reconstructed, isCloud service first Device chooses { wi∈Zp}i∈I
S452: then Cloud Server calculates decrypted token TK;
S46: and then TK and ciphertext are sent to user by Cloud Server;
S47: ciphertext is decrypted using global private key and TK by end user, if the attribute of user meets the access knot in ciphertext Structure, then user's successful decryption;Fail if not satisfied, then decrypting.
Further, the step S5 includes the following steps:
S51: when the permission of user changes, its changed identity information is sent to TP by user, and in TP Place is re-registered;
S52:TP user original GID is written in UL, and announces UL;
S53:TP is one new global identity GID ' of user's distribution, and for one new certificate of user's distribution and entirely Office's private key, wherein new certificate includes GID ', new Customer attribute row form and new global public key, then TP is new user Global private key and certificate issue user simultaneously;
S54: after user receives the new certificate that TP is sent and global private key, it is subordinate to again with it using new certificate Each AA is interacted.
S55: when AA receives certificate ACertGID′Afterwards, AA uses the public key decryptions certificate of TP, and whether verifies user GID ' Belong to UL;
S56: ifAA continues following operation;If GID ' ∈ UL, AA terminate operation;
S57: for the step as S37, AA generates new attribute private key to revocation user based on the attribute list of user;
S58: and then each attribute private key of user is sent to Cloud Server by AA, Cloud Server is distributed from participation key The attribute private key of user is received at AA and is stored, while Cloud Server deletes the attribute private key for increasing revocation user in UL newly.
The present invention has the advantages that the invention proposes more than one authority based on encryption attribute mechanism, each AA is Independent operating is independent of each other, and does not need a center authority (Central Authority, CA), and the CA is equivalent to list Authority based on the single AA in encryption attribute mechanism, have the ability for decrypting all system ciphertexts, therefore CA must completely may be used Letter.The present invention shares the workload of single AA using multiple AA, and it is possible to prevente effectively from CA becomes the bottleneck and peace of system Full weakness improves the robustness of system, while also supporting being dynamically added and exiting for AA.And the present invention is utilized and is distributed to user The method of one global identity GID prevents user from conspiring.
In the present invention, the private key of user is divided into user's overall situation private key and user property private key using cipher key separation, Middle user property private key is stored by Cloud Server, and user need to only save global private key.Therefore, four in addition to data owner A entity all has part decryption capabilities, but this four entity each party do not have the ability for fully decrypting ciphertext, when When user wants decryption ciphertext, user needs the assistance of Cloud Server and meets the visit in ciphertext and if only if the attribute of user When asking structure, user can just be decrypted correctly ciphertext, and this method strengthens the safety of system to a certain extent.The present invention is not only The characteristics of being able to achieve the safety and secret protection of mass data in cloud environment, and being also fully utilized by cloud computing, it is close decrypting Most of workload during text has all entrusted to Cloud Server, and since the attribute for possessing user of Cloud Server is close Key, Cloud Server can only partially decrypt ciphertext, both improve decryption efficiency in this way, also ensure the safety of system.
The present invention devises novel user's cancelling method, and the revocation of user is equivalent to the identity for updating user.When When user right changes, TP can be re-registered to user, and distribute a new global identity, and then the revocation is used Family obtains new certificate, new global private key and new attribute private key, and revocation user is equivalent to a new identity again It is added in system.The cancelling method is only related to the revocation attribute of user, and in practical applications, the revocation of user is not It is very frequently.Therefore the cancelling method can be efficiently applied in cloud environment, and forward secrecy (revocation user may be implemented The ciphertext containing revocation attribute in access structure cannot be decrypted) and backward security (if user, which is newly added, possesses enough attributes, it can Enough decrypt its be added previous existence at ciphertext).
Further advantage, target and feature of the invention will be illustrated in the following description to a certain extent, and And to a certain extent, based on will be apparent to those skilled in the art to investigating hereafter, Huo Zheke To be instructed from the practice of the present invention.The objects and other advantages of the present invention can be wanted by following specification, right Specifically noted structure is sought in book and attached drawing to be achieved and obtained.
Detailed description of the invention
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into The detailed description of one step, in which:
Fig. 1 is system model;
In figure: (1) announcing attribute public key;(2) encryption data is uploaded;(3) user's registration;(4) distribute to user global private Key and certificate;(5) attribute key request is sent;(6) distribute attribute key;(7) access request is sent;(8) decrypted token is provided.
Fig. 2 is flow diagram of the invention;
Fig. 3 is system initialization;
Fig. 4 is data encryption;
Fig. 5 is user key generation;
Fig. 6 is access data;
Fig. 7 is user's revocation.
Specific embodiment
With will be in conjunction with attached drawing, a preferred embodiment of the present invention will be described in detail;It should be appreciated that preferred embodiment is only In order to illustrate the present invention, rather than limiting the scope of protection of the present invention.
Distributed access control mechanism provided by the invention based on encryption attribute, includes the following steps, referring to fig. 2:
S1: system initialization generates the public private key-pair of system common parameter, the public private key-pair of TP and each attribute, Referring to Fig. 3;
Further, the step S1 includes the following steps:
S11:TP initialization, inputs security parameter λ, generates the public private key-pair of system common parameter and TP, and wherein system is public Parameter includes the Bilinear Groups G that two ranks are p altogether1,G2、G1In generation member g and bilinear map e:G1×G1→G2, TP's Public private key-pair is (skTP,pkTP), enable x indicate attribute;
S12:AA initialization;
Wherein S12 includes the following steps:
S121: each AA receives system common parameter { g, G from TP1,G2, e (g, g) } and TP public key pkTP
S122: each AA chooses three random number αxxx∈ZpAs the private key of attribute x, as { αxxx, Then public key is generated for attribute x
S2: data encryption, data owner's encryption data, and data are stored on Cloud Server in an encrypted form, Referring to fig. 4;
Further, the step S2 includes the following steps:
S21: data owner receives system common parameter { g, G from TP and AA respectively1,G2, e (g, g) } and each category The public key of property
S22: data owner be based on global property collection U, for data m define access structure an A, A by access matrix (M, It ρ) indicates, the wherein mapping between the every a line of function ρ representing matrix M and attribute x;
S23: from ZpFor middle selection random number s as encryption exponent, enabling s is vectorFirst member Element;
S24: it calculatesWherein MiIt is the i-th row of matrix M;
S25: random number r is choseni∈Zp
S26: output ciphertext CT is
Wherein RAIndicate the property set in access structure A;
S27: data owner uploads to ciphertext CT on Cloud Server.
S3: user key generates, and TP is to legitimate user one GID of distribution and gives user's distributing certificates and global private key, AA then distributes attribute private key to it based on the permission of user, referring to Fig. 5;
Further, the step S3 includes the following steps:
S31: system is added in user, submits identity information to be registered to TP;
The legitimacy of S32:TP certification user;
S33: if user is legal, a GID is distributed to user, and select a random number uGID∈ZpIt is complete as user Office private key UGSKGID, then generate user's overall situation public keyThen TP uses private key skTPGenerate certificate ACertGID=SignskTP(GID,ALGID,UGPKGID), wherein ALGIDIndicate the attribute list of user;If the user is illegal, Then refuse addition system;TP is UGSKGIDWith certificate ACertGIDUser is issued simultaneously;
S34: when user receives certificate that TP is sent and global private key, certificate is just issued its each AA being subordinate to;
S35: when AA receives certificate ACertGIDAfterwards, AA uses the public key pk of TPTPDecrypt certificate ACertGID, and verify user Whether GID belongs to user's revocation list (UL);
S36: ifThen AA continues following operation;If GID ∈ UL, AA terminate operation;
S37:AA generates attribute private key to user based on the attribute list of user
S38: and then each attribute private key of user is sent to Cloud Server by AA, Cloud Server receives use from the AA of participation The attribute key at familyAnd it stores.Note that even if Cloud Server possesses user's Attribute key can not be decrypted correctly ciphertext.
S4: access data, user access to server request data, and the property set and if only if user meets in ciphertext Access structure, user could decrypt ciphertext using global private key and attribute private key, referring to Fig. 6;
Further, the step S4 includes the following steps:
S41: user GID sends data access request to Cloud Server, and its certificate ACertGIDIssue Cloud Server;
S42: Cloud Server uses the public key pk of TPTPDecrypt certificate ACertGID, and verify whether user GID belongs to user Revocation list (UL);
S43: ifThen continue following operation;If GID ∈ UL, Cloud Server terminates operation;
S44: the attribute private key UASK of Cloud Server retrieval userGID
S45: the attribute private key UASK of user is then usedGIDCiphertext is decrypted, and generates decrypted token TK;
Wherein, S45 includes the following steps:
S451: it enablesAnd I={ i: ρ (i) ∈ RA, if according to access matrix M, { λi}i∈IIt is encryption exponent s Effective sharing, then there is recovery coefficient { wi∈Zp}i∈IEncryption exponent, which can be reconstructed, isCloud service first Device chooses { wi∈Zp}i∈I
S452: then Cloud Server calculates decrypted token
S46: and then TK and ciphertext are sent to user by Cloud Server;
S47: end user uses global private key UGSKGIDCiphertext is decrypted with TK, if the attribute of user meets the visit in ciphertext Ask structure, then user's successful decryption, end user obtains dataFail if not satisfied, then decrypting.
S5: user's revocation when the permission of user changes, is then updated the private key of user, makes it with one New identity rejoins system, referring to Fig. 7.
Further, the step S5 includes the following steps:
S51: when the permission of user changes, its changed identity information is sent to TP by user, and in TP Place is re-registered;
S52:TP user original GID is written in UL, and announces UL;
S53:TP is that user distributes a new global identity GID ', reselects a random number uGID′∈ZpMake For the new global private key UGSK of userGID′, and generate new user's overall situation public keyThen TP is user point With a new attribute list ALGID′, then TP uses private key skTPGenerate new certificateTP is UGSKGID′With certificate ACertGID′User is issued simultaneously;
S54: when user receives the new certificate ACert that TP is sentGID′And UGSKGID′Afterwards, using new certificate again with its The each AA being subordinate to is interacted.
S55: when AA receives certificate ACertGID′Afterwards, AA uses the public key pk of TPTPDecrypt ACertGID′, and verify user Whether GID ' belongs to user's revocation list (UL);
S56: ifAA continues following operation;If GID ' ∈ UL, AA terminate operation;
S57: for the step as S37, AA generates new attribute private key to revocation user based on the attribute list of user
S58: and then each attribute private key of user is sent to Cloud Server by AA, Cloud Server is distributed from participation key The attribute private key of user is received at AAAnd it stores, while Cloud Server is deleted The attribute private key of user is cancelled in UL.

Claims (5)

1. a kind of distributed access control method based on encryption attribute, it is characterised in that: include the following steps
S1: system initialization generates the public/private of system common parameter, the public private key-pair of trusted third party TP and each attribute Key pair;
S2: data encryption, data owner's encryption data, and data are stored on Cloud Server in an encrypted form;
S3: user key generates, and trusted third party TP distributes a global identification presentation GID to legitimate user, and gives the user Distributing certificates and global private key, attribute authority (aa) AA then distribute attribute private key to it based on the permission of user;The step S3 includes Following steps:
S31: system is added in user, submits identity information to be registered to trusted third party TP;
S32: the legitimacy of trusted third party TP certification user;
S33: if user is legal, a global identification presentation GID is distributed to user, and distribute a certificate and the overall situation to user Private key, wherein certificate includes global identification presentation GID, the attribute list of user and the global public key of user of user;If should User is illegal, then refuses addition system;
S34: when user receives certificate that trusted third party TP is sent and global private key, certificate is just issued its each category being subordinate to Property authority AA;
S35: after attribute authority (aa) AA receives certificate, attribute authority (aa) AA uses the public key decryptions certificate of trusted third party TP, and tests Whether the global identification presentation GID of card user belongs to user's revocation list UL;
S36: ifThen attribute authority (aa) AA generates attribute private key to user based on the attribute list of user;IfAttribute authority (aa) AA terminates operation;
S37: and then the attribute private key of user is sent to Cloud Server by attribute authority (aa) AA, and is stored on Cloud Server;
S4: access data, user access to server request data, and the property set and if only if user meets the access in ciphertext Structure, user could decrypt ciphertext using global private key and attribute private key;
S5: user's revocation when the permission of user changes, is then updated the private key of user, keeps it new with one Identity rejoins system.
2. the distributed access control method according to claim 1 based on encryption attribute, it is characterised in that: the step S1 includes the following steps:
S11: trusted third party TP initialization inputs security parameter, generates the public/private key pair of system common parameter and trusted third party It is right;
S12: attribute authority (aa) AA initialization;
Wherein S12 includes the following steps:
S121: each attribute authority (aa) AA receives the public key of system common parameter and trusted third party TP from TP;
S122: each attribute authority (aa) AA generates public private key-pair for each attribute of its management.
3. the distributed access control method according to claim 1 based on encryption attribute, it is characterised in that: the step S2 includes the following steps:
S21: data owner receives system common parameter and each category from trusted third party TP and attribute authority (aa) AA respectively The public key of property;
S22: data owner is based on global property collection U, is come to data definition one access structure A, A by access matrix (M, ρ) It indicates, the wherein mapping between the every a line of function ρ representing matrix M and attribute x;
S23: from ZpFor middle selection random number s as encryption exponent, enabling s is vectorFirst element;
S24: it calculatesWherein MiIt is the i-th row of matrix M;
S25: random number r is choseni∈Zp
S26: output ciphertext CT;
S27: data owner uploads to ciphertext CT on Cloud Server.
4. the distributed access control method according to claim 1 based on encryption attribute, it is characterised in that: the step S4 includes the following steps:
S41: the global identification presentation GID of user sends data access request to Cloud Server, and certificate is issued Cloud Server;
S42: Cloud Server uses the public key decryptions certificate of trusted third party TP, and whether verifies user's overall situation identification presentation GID Belong to user's revocation list UL;
S43: ifThen continue following operation;If GID ∈ UL, Cloud Server terminates operation;
S44: the attribute private key of Cloud Server retrieval user;
S45: ciphertext then is decrypted using the attribute private key of user, and generates decrypted token TK;
Wherein S45 includes the following steps:
S451: it enablesAnd I={ i: ρ (i) ∈ RA, if according to access matrix M, { λi}i∈IIt is the effective of encryption exponent s Share, then there is recovery coefficient { wi∈Zp}i∈IEncryption exponent, which can be reconstructed, isCloud Server is chosen first {wi∈Zp}i∈I;Wherein RAIndicate the property set in access structure A;
S452: then Cloud Server calculates decrypted token TK;
S46: and then TK and ciphertext are sent to user by Cloud Server;
S47: ciphertext is decrypted using global private key and TK by end user, if the attribute of user meets the access structure in ciphertext, User's successful decryption;Fail if not satisfied, then decrypting.
5. the distributed access control method according to claim 1 based on encryption attribute, it is characterised in that: the step S5 includes the following steps:
S51: when the permission of user changes, its changed identity information is sent to trusted third party TP by user, And it is re-registered at trusted third party TP;
S52: trusted third party TP user original global identification presentation GID is written in UL, and announces UL;
S53: trusted third party TP is that user distributes a new global identity GID ', and distributes a new card for user Book and global private key, wherein new certificate includes GID ', new Customer attribute row form and new global public key, then credible the The new global private key of user and certificate are issued user by tripartite TP simultaneously;
S54: after user receives new certificate that trusted third party TP is sent and global private key, using new certificate again with its The each attribute authority (aa) AA being subordinate to is interacted;
S55: when attribute authority (aa) AA receives certificate ACertGID′Afterwards, attribute authority (aa) AA uses the public key decryptions certificate of TP, and verifies use Whether family GID ' belongs to UL;
S56: ifAA continues following operation;If GID ' ∈ UL, AA terminate operation;
S57: for the step as S37, attribute authority (aa) AA generates new attribute private to revocation user based on the attribute list of user Key;
S58: and then each attribute private key of user is sent to Cloud Server by attribute authority (aa) AA, Cloud Server divides from key is participated in The attribute private key of user is received at the attribute authority (aa) AA of hair and is stored, while Cloud Server deletes the category for increasing revocation user in UL newly Property private key.
CN201510106880.5A 2015-03-10 2015-03-10 A kind of distributed access control method based on encryption attribute Active CN104901942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510106880.5A CN104901942B (en) 2015-03-10 2015-03-10 A kind of distributed access control method based on encryption attribute

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510106880.5A CN104901942B (en) 2015-03-10 2015-03-10 A kind of distributed access control method based on encryption attribute

Publications (2)

Publication Number Publication Date
CN104901942A CN104901942A (en) 2015-09-09
CN104901942B true CN104901942B (en) 2019-03-12

Family

ID=54034340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510106880.5A Active CN104901942B (en) 2015-03-10 2015-03-10 A kind of distributed access control method based on encryption attribute

Country Status (1)

Country Link
CN (1) CN104901942B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371548A (en) * 2020-03-04 2020-07-03 贵州弈趣云创科技有限公司 Method for encrypting and decrypting chained tracking member file based on identity code

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357002A (en) * 2015-12-29 2016-02-24 武汉大学 Sensitive information security outsourcing method based on cloud storage biological characteristic authentication
CN105681355B (en) * 2016-03-25 2019-02-01 西安电子科技大学 The access control system and its access control method of cloud storage digital library based on encryption attribute
CN109074463A (en) * 2016-04-27 2018-12-21 三菱电机株式会社 Attribute cooperation device, conveyer system, attribute collaboration method and attribute program interoperability
CN106790185B (en) * 2016-12-30 2021-06-15 深圳市风云实业有限公司 CP-ABE-based method and device for safely accessing authority dynamic update centralized information
CN106911702B (en) * 2017-03-08 2019-08-02 福建师范大学 Based on the cloud storage block encryption access control method for improving CP-ABE
WO2018165835A1 (en) * 2017-03-14 2018-09-20 深圳大学 Cloud ciphertext access control method and system
CN107508667B (en) * 2017-07-10 2019-09-17 中国人民解放军信息工程大学 Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed
CN107395627B (en) * 2017-08-22 2020-07-17 河海大学 Lightweight authentication protocol based on one-way function
CN109525388B (en) * 2017-09-19 2022-07-15 中兴通讯股份有限公司 Combined encryption method and system with separated keys
CN107659574A (en) * 2017-10-10 2018-02-02 郑州云海信息技术有限公司 A kind of data access control system
CN107864139B (en) 2017-11-09 2020-05-12 北京科技大学 Cryptographic attribute base access control method and system based on dynamic rules
CN108418784B (en) * 2017-12-04 2020-09-25 重庆邮电大学 Distributed cross-domain authorization and access control method based on attribute password
CN108347426B (en) * 2017-12-28 2021-10-26 广州华夏职业学院 Teaching system information security management system based on big data and access method
CN108494733B (en) * 2018-02-11 2021-10-29 上海全程玖玖健康服务有限公司 Message queue subscription method for communication between health management systems
CN108390876B (en) * 2018-02-13 2021-12-14 西安电子科技大学 Multi-authorization-center access control method capable of supporting outsourcing revocation and verification and cloud server
CN108365959B (en) * 2018-02-14 2020-09-15 东北大学 Full-proxy outsourcing polynomial verification method in cloud environment
CN108429749B (en) * 2018-03-12 2021-03-16 重庆邮电大学 Outsourcing mandatory access control method based on hierarchical attribute encryption
CN109728903B (en) * 2018-12-22 2021-09-17 复旦大学 Block chain weak center password authorization method using attribute password
CN109936630B (en) * 2019-02-27 2021-09-28 重庆邮电大学 Distributed service access authorization and access control method based on attribute-based password
CN109818757A (en) * 2019-03-18 2019-05-28 广东工业大学 Cloud storage data access control method, Attribute certificate awarding method and system
CN110519283A (en) * 2019-08-30 2019-11-29 广东工业大学 A kind of ciphertext policy ABE base encryption method, apparatus and system
CN112532591B (en) * 2020-11-06 2022-03-11 西安电子科技大学 Cross-domain access control method, system, storage medium, computer equipment and terminal
CN115001730B (en) * 2022-03-02 2023-09-05 上海交通大学 Access control system and method based on role attribute in distributed scene

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618609A (en) * 2013-09-09 2014-03-05 南京邮电大学 User timely revocation method based on attribute-based encryption in cloud environment
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
CN104378386A (en) * 2014-12-09 2015-02-25 浪潮电子信息产业股份有限公司 Method for cloud data confidentiality protection and access control

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2898624B1 (en) * 2012-09-21 2018-02-07 Nokia Technologies Oy Method and apparatus for providing access control to shared data based on trust level

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618609A (en) * 2013-09-09 2014-03-05 南京邮电大学 User timely revocation method based on attribute-based encryption in cloud environment
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
CN104378386A (en) * 2014-12-09 2015-02-25 浪潮电子信息产业股份有限公司 Method for cloud data confidentiality protection and access control

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems;Yang Kan等;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20131130;第8卷(第11期);全文

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371548A (en) * 2020-03-04 2020-07-03 贵州弈趣云创科技有限公司 Method for encrypting and decrypting chained tracking member file based on identity code

Also Published As

Publication number Publication date
CN104901942A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN104901942B (en) A kind of distributed access control method based on encryption attribute
Kumar et al. Secure storage and access of data in cloud computing
Zhou et al. Achieving secure role-based access control on encrypted data in cloud storage
Zhu et al. A secure anti-collusion data sharing scheme for dynamic groups in the cloud
CN108418784B (en) Distributed cross-domain authorization and access control method based on attribute password
CN114039790B (en) Fine-grained cloud storage security access control method based on blockchain
Hwang et al. Achieving dynamic data guarantee and data confidentiality of public auditing in cloud storage service
Swathy et al. Providing advanced security mechanism for scalable data sharing in cloud storage
KR101615137B1 (en) Data access method based on attributed
Qinlong et al. Improving security and efciency for encrypted data sharing in online social networks
Kumar Cryptography during data sharing and accessing over cloud
US20240048367A1 (en) Distributed anonymized compliant encryption management system
Malarvizhi et al. Secure file sharing using cryptographic techniques in cloud
Dhal et al. RACC: An efficient and revocable fine grained access control model for cloud storage
Salim et al. An efficient public auditing scheme for cloud storage with secure access control and resistance against DOS attack by iniquitous TPA
Pareek et al. Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud
Parhi et al. Mp3: A more efficient private presence protocol
CN107769915B (en) Data encryption and decryption system and method with fine-grained user control
Feng et al. Secure data sharing solution for mobile cloud storage
Mercy et al. An efficient data security system for group data sharing in cloud system environment
Sathana et al. Three level security system for dynamic group in cloud
Mishra et al. Towards a secure, transparent and privacy-preserving DRM system
Sathana et al. Automated Security Providence for Dynamic Group in Cloud
Patil et al. Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud
Liu et al. Coarser-grained multi-user searchable encryption in hybrid cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant