CN102916954B - Attribute-based encryption cloud computing safety access control method - Google Patents

Attribute-based encryption cloud computing safety access control method Download PDF

Info

Publication number
CN102916954B
CN102916954B CN201210389845.5A CN201210389845A CN102916954B CN 102916954 B CN102916954 B CN 102916954B CN 201210389845 A CN201210389845 A CN 201210389845A CN 102916954 B CN102916954 B CN 102916954B
Authority
CN
China
Prior art keywords
user
attribute
access control
key
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210389845.5A
Other languages
Chinese (zh)
Other versions
CN102916954A (en
Inventor
陈丹伟
邵菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Heng Electrical Information Polytron Technologies Inc
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201210389845.5A priority Critical patent/CN102916954B/en
Publication of CN102916954A publication Critical patent/CN102916954A/en
Application granted granted Critical
Publication of CN102916954B publication Critical patent/CN102916954B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种基于属性加密的云计算安全访问控制方法,主要用于解决云计算访问控制结构的安全性和隐私保护性问题,本次发明的目的是在CP-ABE的基础上,提出一种全新的框架MAH-ABE( Multiple and Hierarchical attribute based encryption)访问控制模型,是一种具有等级的分领域多信任机构的ABE安全框架-MAH-ABE.框架不仅按照私人领域和公共领域来区分属性,而且将公共领域的属性按照信任机构的等级来划分,使不同权限的信任机构掌管不同的属性密钥分发机制,大大降低了单一信任机构的工作量,同时提高了用户的数据隐私保护性。提供了达到高效,灵活,细粒度的特点。

The invention provides a cloud computing security access control method based on attribute encryption, which is mainly used to solve the security and privacy protection problems of the cloud computing access control structure. The purpose of this invention is to propose a method based on CP-ABE A brand-new framework MAH-ABE (Multiple and Hierarchical attribute based encryption) access control model is a ABE security framework with hierarchical domain-based multi-trust institutions-MAH-ABE. The framework not only distinguishes attributes according to private domains and public domains , and the attributes in the public domain are divided according to the level of trust institutions, so that trust institutions with different permissions are in charge of different attribute key distribution mechanisms, which greatly reduces the workload of a single trust institution and improves the user's data privacy protection. It provides features to achieve high efficiency, flexibility, and fine-grainedness.

Description

一种基于属性加密的云计算安全访问控制方法A security access control method for cloud computing based on attribute encryption

技术领域 technical field

本发明是一种云计算环境的安全解决方案。主要用于解决云计算访问控制结构的安全性和隐私保护性问题,属于云计算安全技术领域。The invention is a security solution for cloud computing environment. It is mainly used to solve the security and privacy protection problems of the cloud computing access control structure, and belongs to the field of cloud computing security technology.

背景技术 Background technique

云计算是建立在虚拟化,并行分布计算上的一种全新的计算架构。近几年来,云计算升级为IT届最有效最具影响力的产业之一,许多企业纷纷将大量业务移植到云服务中心。一方面,用户不再需要投资大量的软件和硬件设施雇佣软件人才维护这些设施,从而节省了基础设施建设费用和人力成本。另一方面,云计算按照较低的价格,按照用户的服务需求付费,有着很高的灵活性和便利性。Cloud computing is a new computing architecture based on virtualization and parallel distributed computing. In recent years, cloud computing has been upgraded to one of the most effective and influential industries in the IT industry, and many enterprises have transplanted a large amount of business to cloud service centers. On the one hand, users no longer need to invest in a large amount of software and hardware facilities and hire software talents to maintain these facilities, thus saving infrastructure construction costs and labor costs. On the other hand, cloud computing pays according to the user's service needs at a lower price, which has high flexibility and convenience.

云存储的外包存储服务模式导致了特权用户的存在,他们具有非授权访问用户数据的能力,易导致数据信息和隐私泄露等内部攻击问题。安全性是制约云计算技术广泛使用的重要因素之一,因此研究云计算环境下的安全问题具有重要意义。访问控制模型的研究是解决安全性问题的一大热点。The outsourced storage service model of cloud storage leads to the existence of privileged users, who have the ability to access user data without authorization, which can easily lead to internal attacks such as data information and privacy disclosure. Security is one of the important factors restricting the widespread use of cloud computing technology, so it is of great significance to study security issues in cloud computing environment. The research of access control model is a hot spot in solving security problems.

访问控制模型的三大主要问题是:(1)信任机制的划分。(2)访问控制控树的建立。(3)访问用户细粒度的划分。过去的方法在这三个问题的实现上有一定的缺陷和不足。目前大部分研究人员仅对第二个问题有大量研究,如密钥策略属性加密方案KP-ABE(key-policy attribute-based encryption)和密文策略属性加密方案CP-ABE(ciphertext-policy attribute-based encryption),第(1)和第(3)个问题的研究还处于初步阶段。而一个完善而且实用的访问控制系统仅仅靠单一的信任机构和单一的用户群是远远不够的,会带来各种安全性和隐私性问题。这些问题的存在给云计算的推广带来了一定的难度。The three main problems of the access control model are: (1) The division of trust mechanism. (2) Establishment of access control tree. (3) Fine-grained division of access users. The past methods have certain defects and deficiencies in the realization of these three problems. At present, most researchers only have a lot of research on the second problem, such as the key policy attribute encryption scheme KP-ABE (key-policy attribute-based encryption) and the ciphertext policy attribute encryption scheme CP-ABE (ciphertext-policy attribute-based encryption). based encryption), the research on the (1) and (3) questions is still in the preliminary stage. A complete and practical access control system is far from enough to rely on a single trust organization and a single user group, which will bring various security and privacy issues. The existence of these problems has brought certain difficulties to the promotion of cloud computing.

发明内容 Contents of the invention

技术问题:本次发明的目的是在CP-ABE的基础上,提出一种全新的框架MAH-ABE(Multiple and Hierarchical attribute based encryption)访问控制模型,来解决云计算访问控制系统中的安全性和隐私性问题,本发明提供了一种基于属性加密的云计算安全访问控制方法,达到高效,灵活,细粒度的特点。Technical problem: The purpose of this invention is to propose a new framework MAH-ABE (Multiple and Hierarchical attribute based encryption) access control model on the basis of CP-ABE to solve the security and For privacy issues, the present invention provides a cloud computing security access control method based on attribute encryption, which achieves the characteristics of high efficiency, flexibility and fine-grained granularity.

技术方案:本发明提出一种具有等级的分领域多信任机构的ABE安全框架-MAH-ABE.框架不仅按照私人领域和公共领域来区分属性,而且将公共领域的属性按照信任机构的等级来划分,使不同权限的信任机构掌管不同的属性密钥分发机制,大大降低了单一信任机构的工作量,同时提高了用户的数据隐私保护性。Technical solution: The present invention proposes an ABE security framework with hierarchical multi-trust institutions in domains - MAH-ABE. The framework not only distinguishes attributes according to private domains and public domains, but also divides attributes in the public domain according to the levels of trust organizations , so that trust agencies with different permissions are in charge of different attribute key distribution mechanisms, which greatly reduces the workload of a single trust agency, and at the same time improves the user's data privacy protection.

双线性配对是设计ABE加密方案时非常关键的工具之一。首先给出双线性配对的定理:选取两个阶为一个大素数p的群G1和G2,定义一个可有效计算的双线性映射e:G1×G1→G2,该映射必须满足:Bilinear pairing is one of the key tools when designing an ABE encryption scheme. Firstly, the theorem of bilinear pairing is given: select two groups G 1 and G 2 whose order is a large prime number p, and define an efficient computable bilinear map e: G 1 ×G 1 →G 2 , the map Must meet:

(a)双线性:一个映射e:G1×G1→G2具有双线性,当e(ga,hb)=e(g,h)ab,对于所有的g,h∈G1和所有的a,b∈Zp(a) Bilinear: A mapping e:G 1 ×G 1 →G 2 is bilinear, when e(g a ,h b )=e(g,h) ab , for all g, h∈G 1 and all a, b ∈ Z p .

(b)非退化性:存在g,h∈G1,使得e(g,h)≠1。即不能将所有G1×G1的元素都映射到G2中某个相同元素。(b) Non-degenerate: there exists g, h∈G 1 such that e(g, h)≠1. That is, all elements of G 1 ×G 1 cannot be mapped to the same element in G 2 .

一、体系结构1. Architecture

图1给出了MAH-ABE的系统模型图,主要由以下几个主体组成,云服务提供端(a cloud service provider)简称CSP,一个第一级可信机构,多个区域可信机构,数据主体和数据用户。CSP提供云存储服务,数据主体将加密好的数据存储在云端,供数据用户分享。为了获取云端数据,数据用户从云端下载他们所需要的加密文件进行解密。与传统的访问控制结构相比较,这种结构主要修改了5个部分:(1)等级可信机构的划分(2)属性结构的分层(3)公共领域和私人领域的用户群分类(4)多领域访问控制树的建立(5)访问控制树中转化节点的设置。修改了这些部分,对基于属性加密模型的开销的增加是很小的,但是对整个访问控制结构的高效和细粒度的提高是很大的,并且系统的安全性和隐私性不受损。Figure 1 shows the system model diagram of MAH-ABE, which is mainly composed of the following main bodies, a cloud service provider (a cloud service provider) referred to as CSP, a first-level trusted institution, multiple regional trusted institutions, data Subjects and Data Users. CSP provides cloud storage services, and data subjects store encrypted data in the cloud for data users to share. In order to obtain cloud data, data users download the encrypted files they need from the cloud for decryption. Compared with the traditional access control structure, this structure mainly modifies five parts: (1) the division of hierarchical trusted institutions (2) the hierarchy of attribute structure (3) the classification of user groups in public and private domains (4) ) Establishment of multi-domain access control tree (5) Setting of conversion nodes in access control tree. After modifying these parts, the increase of the overhead of the attribute-based encryption model is small, but the efficiency and fine-grained improvement of the entire access control structure are great, and the security and privacy of the system are not compromised.

下面我们给出几个具体部分的说明:Below we give a description of several specific parts:

公共领域和私人领域:本发明中划分了两种领域,公共领域(PUD)和私人领域(PRD)。PRD主要面向一部分有特殊权限的用户,如数据主体的家人,私人助理等,在主体同意授权时,这类群体不仅可以有阅读权限,也可以有管理文件,修改文件等权限。这个领域的特点是用户少,属性集规模小,易于管理,PUD主要面向大环境用户,如集团公司的员工,医疗保险公司的客户,由于用户量庞大,属性个数繁多,需要细粒度的属性分配机制。而数据属主并不需要知道具体是哪些用户在PUD环境中。Public domain and private domain: In this invention, two domains are divided, public domain (PUD) and private domain (PRD). PRD is mainly for some users with special rights, such as the family members of the data subject, personal assistants, etc. When the subject agrees to authorize, such groups can not only have the right to read, but also have the right to manage and modify files. This field is characterized by few users, small attribute sets, and easy management. PUD is mainly for users in large environments, such as employees of group companies and customers of medical insurance companies. Due to the large number of users and the large number of attributes, fine-grained attributes are required. distribution mechanism. The data owner does not need to know which users are in the PUD environment.

密钥分配方式:在PRD环境中,由于用户少,属性规模小,采用CP ABE访问控制方式即可。用户主体可以委托可信机构分发和管理密钥,或者自己亲自参与密钥的分发和管理。PRD中的用户获得的属性叫做数据属性(data attribute),它为文件的分类属性。每一个文件都贴上数据属性,如blog_file,photo_file等。所以用户密钥的大小和获得的数据属性的个数成线性关系。而PUD环境中,由于用户量庞大,属性个数繁多,因此我们采用具有等级的区域可信机构(domain authority,DA)来管理用户属性,不同的DA有不同大小的权限,而每一个DA都由他的父可信机构授权管辖,形成具有等级的机构。PUD中的用户具有角色属性(role attribute,RA),每个DA负责分发和管理它所管辖的用户的私钥。在PUD领域里,用户在加密上传文件的时候并不需要知道哪些用户具有访问权限,只需要规定有指定RA的用户可以访问该文件,大大减轻了用户主体的工作量。Key distribution method: In the PRD environment, due to the small number of users and small attribute scale, the CP ABE access control method is sufficient. The user principal can entrust a trusted organization to distribute and manage keys, or participate in the distribution and management of keys himself. The attribute obtained by the user in PRD is called data attribute (data attribute), which is the classification attribute of the file. Each file is pasted with data attributes, such as blog_file, photo_file, etc. Therefore, the size of the user key is linearly related to the number of data attributes obtained. In the PUD environment, due to the large number of users and the large number of attributes, we use a hierarchical regional trusted authority (domain authority, DA) to manage user attributes. Different DAs have different permissions, and each DA has Authorized by his parent trusted authority to form a hierarchical authority. Users in PUD have role attributes (role attribute, RA), and each DA is responsible for distributing and managing the private keys of users under its jurisdiction. In the PUD field, users do not need to know which users have access rights when encrypting and uploading files. They only need to specify that users with designated RAs can access the files, which greatly reduces the workload of the main user.

分层密钥结构:在PUD中,本方案采用分层密钥结构,如图2所示。假设密钥的层次为2,则第一层为属性个体或者属性集合,第二层只能为属性个体。如:{Dept:Hospital A,Addr:West,{Position:physician,level:3},{Position:nurse,level:4}},第一层为{Dept:Hospital A,Addr:West}记作A0,第二层为{{Position:physician,level:3},{Position:nurse,level:4}},记作A1和A2。综上所述,记用户密钥结构为A={A0,A1,...,Am},A0表示第一层密钥,Ai表示第二层密钥的第i个属性集合(1≤i≤m).这样我们可以将这个密钥结构简单表示成A0={0,Dept:HospitalA},A1={1,Position:physician},A2={2,Position:nurse}。Hierarchical key structure: In PUD, this scheme adopts a hierarchical key structure, as shown in Figure 2. Assuming that the key level is 2, the first level is attribute individual or attribute set, and the second level can only be attribute individual. Such as: {Dept: Hospital A, Addr: West, {Position: physician, level: 3}, {Position: nurse, level: 4}}, the first layer is {Dept: Hospital A, Addr: West} and recorded as A 0 , the second layer is {{Position:physician,level:3}, {Position:nurse,level:4}}, denoted as A 1 and A 2 . To sum up, the user key structure is A={A 0 ,A 1 ,...,A m }, A 0 represents the first layer key, A i represents the i-th attribute of the second layer key Set (1≤i≤m). In this way, we can simply express this key structure as A 0 = {0, Dept: HospitalA}, A 1 = {1, Position: physician}, A 2 = {2, Position: nurse}.

访问控制树和转化节点:在两种领域中,我们均采用访问控制树,叶节点为属性值,而非叶节点是门限值。假设numx为节点的孩子个数,kx为节点x的门限值,如AND和OR的kx值分别为2和1。同时我们定义函数parent(x)返回x的父节点,index(x)返回节点x的序号,att(x)返回叶节点代表的属性值。如果一个属性结构满足一个访问控制树,则至少该属性结构的一个属性集满足访问控制树的所有属性。一般来说,不同属性集之间的属性联合起来满足访问控制树是不允许的。但是由于PUD领域属性集繁多,我们定义了一种节点叫做转换节点(translating node),转换节点的孩子节点的属性值可以来自不同的属性集,即允许联合属性。Access Control Trees and Transformation Nodes: In both domains, we use access control trees, where leaf nodes are attribute values and non-leaf nodes are threshold values. Assume that num x is the number of children of the node, and k x is the threshold value of node x, such as the values of k x of AND and OR are 2 and 1 respectively. At the same time, we define the function parent(x) to return the parent node of x, index(x) to return the serial number of node x, and att(x) to return the attribute value represented by the leaf node. If an attribute structure satisfies an access control tree, then at least one attribute set of the attribute structure satisfies all attributes of the access control tree. In general, the combination of attributes between different attribute sets to satisfy the access control tree is not allowed. However, due to the large number of attribute sets in the PUD domain, we define a node called a translating node. The attribute values of the child nodes of the translating node can come from different attribute sets, that is, joint attributes are allowed.

本发明的基于属性加密的云计算安全访问控制方法所包含的步骤为:The steps included in the cloud computing security access control method based on attribute encryption of the present invention are:

步骤1).划分两种用户环境,公共领域PUD和私人领域PRD;Step 1). Divide two user environments, public domain PUD and private domain PRD;

步骤2).可信机构首先随机选择生成元,生成双线性群和双线性映射,接着选择PUD领域的密钥层次,生成PUD的主密钥和公钥,主密钥保留,公钥公开;Step 2). The trusted organization first randomly selects generators to generate bilinear groups and bilinear maps, and then selects the key level of the PUD field to generate the master key and public key of the PUD. The master key is retained, and the public key public;

步骤3).可信机构利用步骤2生成的双线性群和双线性映射,生成PRD的主密钥和公钥,主密钥保留,公钥公开;Step 3). The trusted organization uses the bilinear group and bilinear map generated in step 2 to generate the master key and public key of the PRD, the master key is kept, and the public key is made public;

步骤4).可信机构创建下一层可信子机构,分配第一层属性个体或属性集合,并生成主密钥,下一层可信机构能创建更小的子机构,分配第二层属性个体或者属性集合,第二层属性个体或属性集合为第一层属性个体或属性集合的子集,并分配密钥,依次类推;Step 4). The trusted organization creates the next layer of trusted sub-organizations, assigns the first layer of attribute individuals or attribute sets, and generates master keys, and the next layer of trusted organizations can create smaller sub-organizations and assign the second layer of attributes Individuals or attribute sets, the second-level attribute individuals or attribute sets are subsets of the first-level attribute individuals or attribute sets, and keys are assigned, and so on;

步骤5).用户向可信机构提供相关信息,申请相关领域的合法用户权限,如果申请PUD领域的权限,执行步骤6,申请PRD领域的权限执行步骤7;Step 5). The user provides relevant information to the trusted organization and applies for legal user authority in the relevant field. If applying for the authority of the PUD field, perform step 6, and apply for the authority of the PRD field to perform step 7;

步骤6).可信机构根据用户提交的信息,判断该用户能否申请到PUD领域的权限,如果不能,则返回空;如果能,将根据该用户信息发送给相应可信子机构,相应的可信子机构分配对应的属性个体或属性集合,生成一个密钥组件,发送给用户;跳转执行步骤8;Step 6). According to the information submitted by the user, the trusted organization judges whether the user can apply for the authority of the PUD field. If not, it returns empty; The letter organization assigns the corresponding attribute individual or attribute set, generates a key component, and sends it to the user; jump to step 8;

步骤7).可信机构根据用户提交的信息,判断该用户能否申请到PRD领域的权限,如果不能,则返回空,如果能,将根据该用户提供的信息分配对应的数据属性,生成密钥组件,发送给用户;Step 7). According to the information submitted by the user, the trusted organization judges whether the user can apply for the authority of the PRD field. If not, it will return empty. Key component, sent to the user;

步骤8).数据属主为上传到云端的文件选取唯一标识对文件对称加密,保留密钥,并选取公共领域属性集组成公共访问控制树,选取私人领域属性集组成私人访问控制树,用两种树对文件密钥加密生成密文,并发送到云端;Step 8). The data owner selects a unique identifier for the file uploaded to the cloud, encrypts the file symmetrically, reserves the key, and selects a public domain attribute set to form a public access control tree, and selects a private domain attribute set to form a private access control tree. Plant a tree to encrypt the file key to generate ciphertext and send it to the cloud;

步骤9).用户向云端发起对文件的访问,云端返回对应文件的密文,用户输入步骤6或7生成的私钥,和密文里的访问控制树T进行匹配,若匹配得到对应文件密钥,解密后获得文件,若不匹配,返回空;Step 9). The user initiates access to the file to the cloud, and the cloud returns the ciphertext of the corresponding file. The user inputs the private key generated in step 6 or 7, and matches it with the access control tree T in the ciphertext. If it matches, the corresponding file encryption key is obtained. Key, get the file after decryption, if not match, return empty;

步骤10).数据属主向可信机构发出通知,撤销相关用户属性,递交相关属性序列和失效时间,委托可信机构更新相关用户权限;Step 10). The data owner sends a notice to the trusted organization, revokes the relevant user attributes, submits the relevant attribute sequence and expiration time, and entrusts the trusted organization to update the relevant user permissions;

步骤11).可信机构向相关可信子机构发出通知,可信子机构更新相关属性的失效时间,生成新的私钥组建,发送给相关用户;Step 11). The trusted organization sends a notification to the relevant trusted sub-organization, and the trusted sub-organization updates the expiration time of the relevant attributes, generates a new private key assembly, and sends it to the relevant user;

步骤12).数据属主向云端发出通知,更新访问控制树,递交相关属性序列和失效时间,委托云端更新访问控制结构树;Step 12). The data owner sends a notification to the cloud, updates the access control tree, submits the relevant attribute sequence and expiration time, and entrusts the cloud to update the access control structure tree;

步骤13).云端接收到更新信息后,生成相关组件,最后更新到相关访问控制树中,并输出新密文,替换原来的密文;Step 13). After receiving the update information, the cloud generates relevant components, and finally updates to the relevant access control tree, and outputs new ciphertext to replace the original ciphertext;

步骤14).用户属主撤销文件,将文件标识和自己的签名发送到云端;Step 14). The owner of the user revokes the file, and sends the file ID and his own signature to the cloud;

步骤15).云端确认签名后将该文件删除,返回属主删除成功的信息。Step 15). The cloud deletes the file after confirming the signature, and returns the message that the owner deleted it successfully.

所述的PUD,其密钥结构为分层密钥结构,所述的可信机构为具有等级的可信机构。The key structure of the PUD is a hierarchical key structure, and the trusted institution is a hierarchical trusted institution.

访问控制树为公共访问控制树和私人访问控制树两种,公共访问控制树中的节点存在联合节点,支持联合属性集访问。There are two types of access control tree: public access control tree and private access control tree. The nodes in the public access control tree have joint nodes, which support joint attribute set access.

有益效果:本发明方法针对云计算环境下的安全性和隐私性问题,在CP-ABE的基础上,提出MAH-ABE新的访问控制模型,划分了公共领域和私人领域,私人领域采用CP-ABE密文访问控制,公共领域采用等级多信任机构来管理属性和密钥,减少了管理复杂度。同时,模型引入失效时间这个属性来执行属性更新操作。该模型是高效,灵活,细粒度并且安全的。下面我们给出具体的说明。Beneficial effects: the method of the present invention aims at the security and privacy issues in the cloud computing environment, and on the basis of CP-ABE, proposes a new access control model of MAH-ABE, which divides the public domain and the private domain, and the private domain adopts CP-ABE ABE ciphertext access control, the public domain uses hierarchical multi-trust institutions to manage attributes and keys, reducing management complexity. At the same time, the model introduces the attribute of failure time to perform attribute update operations. The model is efficient, flexible, fine-grained and secure. Below we give specific instructions.

[划分了不同领域]本发明基于用户群的不同特性,划分了公共领域和私人领域不两种领域。在过去的模型当中,所有的用户都是在一个领域当中,受同一种访问控制模型的约束,有同一种密钥管理和分配方式。给有特殊权限的用户带来了不便。比如个人健康记录云计算系统中,私人领域为数据属主的亲人,朋友,他们享有特殊的权限,数据属主可以授权这类用户管理自己的文件系统。公共领域为各个医院的医生,护士,保险公司的工作人员等。他们有查看用户属主数据的权限等。这两种领域的属性应具有不同的特质,应该享有不同的密钥管理和分配方式。本发明划分了两种不同类型的用户群,使数据的访问更加灵活,用户的管理更加细粒度。[Different areas are divided] Based on the different characteristics of the user groups, the present invention divides the public area and the private area. In the past model, all users are in one domain, subject to the same access control model, and have the same key management and distribution method. Inconvenience to users with special privileges. For example, in the personal health record cloud computing system, the private domain is the relatives and friends of the data owner, who enjoy special permissions, and the data owner can authorize such users to manage their own file system. The public domain is doctors, nurses, insurance company staff, etc. in various hospitals. They have permission to view the user's own data etc. The properties of these two realms should have different qualities and should enjoy different ways of key management and distribution. The invention divides two different types of user groups, making data access more flexible and user management more fine-grained.

[等级可信机构的划分]本发明划分了具有等级的多信任可信机构,突破了单一可信机构管理所有用户的传统方法。采用单一的信任机制,用户和信任机构的频繁交互不仅给系统负载能力带来瓶颈,同时增加了潜在的安全隐患。一旦可信机构被没有权限的不合法用户窃取,则他有可能利用不合法手段窃取所有用户的数据,给团体用户带来巨大的损失。而且将所有的密钥分发工作都交给一个TA,在实际运用当中并不可行,不同的机构应该有不同的职责,各自管辖自己的子机构。各个子机构应该在自己的权力范围之内定义和指定各种属性集合,并分发给部门所管辖的用户。本发明中的用户处在不同的可信机构,即使某一可信机构受到安全威胁,也不会影响到其他可信机构的安全性,用户的隐私性得到了保护。[Division of Hierarchical Trusted Organizations] The present invention divides multi-trusted trusted organizations with levels, breaking through the traditional method of managing all users by a single trusted organization. With a single trust mechanism, the frequent interaction between users and trust institutions not only brings bottlenecks to the system load capacity, but also increases potential security risks. Once a trusted organization is stolen by an unauthorized user, he may use illegal means to steal all user data, causing huge losses to group users. Moreover, it is not feasible to hand over all the key distribution work to one TA in practice. Different organizations should have different responsibilities and each govern their own sub-organizations. Each sub-organization should define and specify various attribute sets within its own authority, and distribute them to users under the jurisdiction of the department. In the present invention, users are in different trusted institutions, even if a certain trusted institution is threatened, it will not affect the security of other trusted institutions, and the user's privacy is protected.

[访问控制树的建立]本发明为不同领域的用户建立了不同的访问控制树,在公共领域中,由于属性繁多,建立了支持不同属性集之间的联合的访问控制树。在大量的以CP-ABE为基础的模型中,用在访问控制结构中的属性集合只有一个,即数据属主只能在一个属性集合当中,选取属性进行各种组合来满足访问策略。属性集之间是完全孤立的,不能建立属性集之间的联系。这大大降低了访问控制的灵活性。因为在必要的时候用户需要跨越多个属性集合,选取属性来满足某一访问控制结构。本发明的访问控制树的节点有两种类型:普通节点和联合节点。普通节点只支持单个集合内属性的关联,联合节点支持跨越单个集合的多个属性集合的联合访问,大大提高了访问控制结构的灵活性。[Establishment of access control tree] The present invention establishes different access control trees for users in different fields. In the public field, due to the large number of attributes, an access control tree supporting the union between different attribute sets is established. In a large number of CP-ABE-based models, there is only one attribute set used in the access control structure, that is, the data owner can only be in one attribute set, and various combinations of attributes are selected to meet the access policy. The attribute sets are completely isolated, and the connection between the attribute sets cannot be established. This greatly reduces the flexibility of access control. Because users need to span multiple attribute sets when necessary, select attributes to satisfy a certain access control structure. There are two types of nodes in the access control tree of the present invention: ordinary nodes and joint nodes. Ordinary nodes only support the association of attributes within a single collection, while joint nodes support joint access to multiple attribute collections spanning a single collection, which greatly improves the flexibility of the access control structure.

附图说明 Description of drawings

图1是本发明的系统模型图。Fig. 1 is a system model diagram of the present invention.

图2是PUD环境的用户的分层密钥结构示意图。Fig. 2 is a schematic diagram of a hierarchical key structure of a user in a PUD environment.

具体实施方式 Detailed ways

方法流程Method flow

1.系统参数生成1. System parameter generation

在PUD中,Setup(d=2)→(PK.MK).d为密钥的层次,假设为2。可信机构首先随机选择生成元为g,阶为p的双线性群G0和双线性映射e:G0×G0=GT,随机选择随机数α,βi∈Zp,生成公钥和主密钥为:In PUD, Setup(d=2)→(PK.MK).d is the level of the key, which is assumed to be 2. The trusted institution first randomly selects the bilinear group G 0 with generator g and order p and the bilinear map e:G 0 ×G 0 =G T , randomly selects random numbers α,β i ∈ Z p , Generate public and master keys as:

PKPK PUDPUDs == (( GG 00 ,, gg ,, hh 11 == gg ββ 11 ,, hh 22 == gg ββ 22 ,, ee (( gg ,, gg )) αα ))

MKPUD=(β12,gα)MK PUD =(β 12 ,g α )

在PRD中,随机选取参数α3,β3∈Zp生成公钥和主密钥为In PRD, randomly select parameters α 3 , β 3 ∈ Z p to generate public key and master key as

PKPK PRDPRD == {{ GG 00 ,, gg ,, hh 33 == gg ββ 33 ,, ee (( gg ,, gg )) αα 33 }}

MKMK PRDPRD == (( ββ 33 ,, gg αα 33 ))

2.生成用户私钥2. Generate user private key

分配PRD用户私钥.PRD中,用户u获得的属性集为随机选取r∈Zp,并为每一个属性aj选择一个随机值rj∈Zp,调用keyGen生成用户u的私钥为 SK u = { D ^ = g α 3 + r β 3 , ∀ a j ∈ A ^ : D ^ j = g r · H ( j ) r j , D ^ j ′ = g r j } Assign PRD user private key. In PRD, the attribute set obtained by user u is Randomly select r∈Z p , and select a random value r j ∈ Z p for each attribute a j , call keyGen to generate the private key of user u as SK u = { D. ^ = g α 3 + r β 3 , ∀ a j ∈ A ^ : D. ^ j = g r · h ( j ) r j , D. ^ j ′ = g r j }

第一级区域可信机构授权.在PUD中,每一个第一级DA由两部分组成:ID和他管辖的属性集合A={A0,A1,...Am}其中Ai={ai,1,ai,2,...ai,n},ai,j表示Ai个属性集合中的第j个属性。第一级DA为权限最大者,如公司的各个分公司。如果有新的第一级DA(设为DAi)加入,可信机构通过调用CreateDA(PK,MK,A)方法为DAi创造主密钥。获得权限后的DAi将有权限为下一级的DA分配权限,如子公司的各个部门。DAi所得到的主密钥形势结果如下:The first-level regional trusted agency authorization. In PUD, each first-level DA consists of two parts: ID and the attribute set A={A 0 ,A 1 ,...A m } where A i = {a i, 1 , a i, 2 ,...a i, n }, a i, j represents the jth attribute in the attribute set of A i . The first-level DA is the one with the most authority, such as the various branches of the company. If a new first-level DA (set as DA i ) joins, the trusted institution creates a master key for DA i by calling the CreateDA(PK, MK, A) method. After obtaining the authority, DA i will have the authority to assign authority to the DA of the next level, such as various departments of the subsidiary. The results of the master key situation obtained by DA i are as follows:

MKMK ii == (( AA ,, DD. == gg αα ++ rr {{ uu }} ββ 11 DD. ii ,, jj == gg rr ii {{ uu }} .. Hh (( aa ii ,, jj )) rr ii ,, jj {{ uu }} ,,

DD. ii ,, jj ′′ == gg rr ii ,, jj {{ uu }} ,, 00 ≤≤ ii ≤≤ mm ,, 11 ≤≤ jj ≤≤ nno ii ,,

EE. ii == gg rr {{ uu }} ++ rr ii {{ uu }} ββ 22 ,, 11 ≤≤ ii ≤≤ mm ))

其中,A为属性结构,r{u}是该DA的唯一ID,也是A0的ID,是每个属性集Ai的ID,Ei用于不同Ai之间的转换,这在下文中的解密部分会详细讲述。Among them, A is the attribute structure, r {u} is the unique ID of the DA, and it is also the ID of A 0 , is the ID of each attribute set A i , and E i is used for conversion between different A i , which will be described in detail in the decryption section below.

下级DA/用户私钥结构.(1)DAi为下级DA授权私钥,记为DAi+1,调用(2)DAi为该DAi内的用户授权私钥,调用 为下一级user/DA的属性结构,它必定是上一级DA的属性结构的一个子集,如A={A0,A1,A2},下一级user/DA私钥结构为Lower-level DA/user private key structure. (1) DA i is the private key authorized by the lower-level DA, denoted as DA i+1 , call (2) DAi authorizes the private key for the user in the DAi , call It is the attribute structure of the next-level user/DA, which must be a subset of the attribute structure of the upper-level DA, such as A={A 0 ,A 1 ,A 2 }, The structure of the next-level user/DA private key is

SKSK uu // MKMK ii ++ 11 == (( AA ~~ ,, DD. ~~ == gg αα ++ rr {{ uu }} ++ rr ~~ {{ uu }} ββ 11 ,,

DD. ~~ ii ,, jj == gg rr ii {{ uu }} ++ rr ~~ ii {{ uu }} .. Hh (( aa ii ,, jj )) rr ii ,, jj {{ uu }} ++ rr ~~ ii .. jj {{ uu }} ,,

DD. ~~ ii ,, jj ′′ == gg rr ii ,, jj {{ uu }} ++ rr ~~ ii .. jj {{ uu }} ,, 00 ≤≤ ii ≤≤ mm ,, 11 ≤≤ jj ≤≤ nno ii ,,

EE. ~~ ii == gg (( rr {{ uu }} ++ rr ii {{ uu }} ++ rr ~~ {{ uu }} ++ rr ~~ ii {{ uu }} )) ββ 22 ,, 11 ≤≤ ii ≤≤ mm ))

3.文件创建3. File Creation

用户主体为上传到云端的文件选取唯一ID,随机选取密钥FEK,对文件对称加密,即EDEK(F)←FEK。接着用户主体调用Encrypt方法对密钥FEK加密生成密文CT,并生成由属性资源组成的访问控制树T,T=(TPUD)OR(TPRD),TPUD为PUD中访问控制树,TPRD为PRD中访问控制树。最后存储在云端的密文形式为E(F)=<CT,EFEK(F)>.The user subject selects a unique ID for the file uploaded to the cloud, randomly selects the key FEK, and encrypts the file symmetrically, that is, E DEK (F)←FEK. Then the user subject invokes the Encrypt method to encrypt the key FEK to generate ciphertext CT, and generate an access control tree T composed of attribute resources, T=(T PUD )OR(T PRD ), T PUD is the access control tree in the PUD, T PRD is the access control tree in PRD. The final ciphertext stored in the cloud is in the form of E(F)=<CT, E FEK (F)>.

建立访问控制树TPUD过程如下:The process of establishing an access control tree T PUD is as follows:

i.为访问控制树中的每一个节点选取一个多项式qx,多项式的阶为dx,则dx=kx-1。i. Select a polynomial q x for each node in the access control tree, and the order of the polynomial is d x , then d x =k x -1.

ii.为根节点R随机选取s∈Zp,满足qR(0)=s,用多项式插值法随机选取qR个值来定义多项式qRii. Randomly select s∈Z p for the root node R, satisfying q R (0)=s, use polynomial interpolation method to randomly select q R values to define the polynomial q R .

iii.对于树上除根节点以外的节点x,令qx(0)=qparent(x)(index(x))然后再随机选取dx个点把所有多项式定义完整。iii. For the node x on the tree except the root node, set q x (0)=q parent(x) (index(x)) and then randomly select d x points to define all polynomials completely.

按照以上三步骤,再为PRD环境中创建访问控制树TPRDFollow the above three steps to create an access control tree T PRD for the PRD environment.

令Y为叶节点的集合,X为转换节点的集合(只在TPUD中用到X),则明文M按如下公式加密:Let Y be the set of leaf nodes, and X be the set of conversion nodes (X is only used in T PUD ), then the plaintext M is encrypted according to the following formula:

CTCT == ++ (( TT PUDPUDs ,, TT PRDPRD ,,

CC ~~ == Mm &CenterDot;&Center Dot; ee (( gg ,, gg )) &alpha;&alpha; &CenterDot;&Center Dot; sthe s ,, CC == hh 11 sthe s ,, CC &OverBar;&OverBar; == hh 22 sthe s ,, CC ^^ == hh 33 sthe s ,,

&ForAll;&ForAll; ythe y &Element;&Element; YY &SubsetEqual;&SubsetEqual; TT PUDPUDs :: CC ythe y == gg qq ythe y (( 00 )) ,, CC ythe y &prime;&prime; == Hh (( attatt (( ythe y )) )) qq ythe y (( 00 )) ,,

&ForAll;&ForAll; ythe y &Element;&Element; YY &SubsetEqual;&SubsetEqual; TT PRDPRD :: CC ^^ ythe y == gg qq ^^ ythe y (( 00 )) ,, CC ^^ ythe y &prime;&prime; == Hh (( attatt (( ythe y )) )) qq ^^ ythe y (( 00 )) ,,

&ForAll;&ForAll; xx &Element;&Element; Xx &SubsetEqual;&SubsetEqual; TT PUDPUDs :: CC ^^ xx == hh 22 qq xx (( 00 )) ))

定义一个帮助数据W用来帮助PRD中的用户来获得明文:Define a helper data W to help users in PRD to obtain plaintext:

WW == ee (( gg ,, gg )) &gamma;s&gamma;s == ee (( gg ,, gg )) &alpha;s&alpha;s &CenterDot;&CenterDot; ee (( gg ,, gg )) &alpha;&alpha; 33 sthe s ,,

即α3=γ-αThat is, α 3 =γ-α

CT和W一同存储在云端。CT and W are stored together in the cloud.

4.文件访问4. File Access

用户u向云端发送请求申请访问文件,则云端将相应的密文发送给用户。用户调用利用Decrypt(CT,SKu)算法解密:User u sends a request to the cloud to apply for accessing files, and the cloud sends the corresponding ciphertext to the user. The user invokes the Decrypt(CT, SK u ) algorithm to decrypt:

(1)若u为PUD中用户,调用T(A)确认SKu中的的属性是否满足访问控制树TPUD。T(A)是从叶节点到根节点的递归方式。(1) If u is a user in PUD, call T(A) to confirm whether the attributes in SK u satisfy the access control tree T PUD . T(A) is the recursive way from the leaf node to the root node.

i t为叶节点,如果Ai∈A则DecryptDode(CT,SKu,t,i)=null,如果att(t)=ai,j∈Ai,Ai∈A,则i t is a leaf node, if A i ∈ A then DecryptDode(CT, SK u , t, i) = null, if att(t) = a i, j ∈ A i , A i ∈ A, then

DecryptDodeDecryptDode (( CTCT ,, SKSK uu ,, tt ,, ii ))

== ee (( DD. ii ,, jj ,, CC tt )) // ee (( DD. ii ,, jj &prime;&prime; ,, CC tt &prime;&prime; ))

== ee (( gg ,, gg )) rr ii {{ uu }} &CenterDot;&CenterDot; qq tt (( 00 ))

ii t为非叶节点,定义t的孩子节点为z,Bt为满足门限的kt个z节点的集合,Sz为kx个z节点的label集合,定义Fz=DecryptDode(CT,SKu,t,i)为T中任意节点与A中属性的判定结果,如果没有这样的集合Sz,则Fz=⊥。如果有,且(1)label i∈Sz,(2)label i′∈Sz且存在i′≠i,则z是一个转换节点,令DecryptDode(CT,SKu,z,i′)=F′Z,如果i≠0(不在A0内)将F′Z转换成Fzii t is a non-leaf node, define the child node of t as z, B t is the set of k t z nodes that meet the threshold, S z is the label set of k x z nodes, define F z =DecryptDode(CT, SK u , t, i) is the judgment result of any node in T and the attribute in A, if there is no such set S z , then F z =⊥. If yes, and (1) label i∈S z , (2) label i′∈S z and there exists i′≠i, then z is a transition node, let DecryptDode(CT,SK u ,z,i′)= F′ Z , if i≠0 (not in A 0 ) convert F′ Z to F z :

Ff zz == ee (( CC ^^ zz ,, EE. ii // EE. ii `` )) &CenterDot;&CenterDot; Ff zz &prime;&prime; == ee (( gg ,, gg )) rr ii {{ uu }} &CenterDot;&Center Dot; qq zz (( 00 ))

否则 F z = e ( C ^ z , E i &prime; ) F z &prime; = e ( g , g ) r { u } &CenterDot; q z ( 0 ) . otherwise f z = e ( C ^ z , E. i &prime; ) f z &prime; = e ( g , g ) r { u } &CenterDot; q z ( 0 ) .

iii 根据lagrange性质,计算父节点t时,iii According to the lagrange property, when calculating the parent node t,

F t = &Pi; z &Element; B t F Z &Delta; k , B z &prime; ( 0 ) = e ( g , g ) r i { u } &CenterDot; q t ( 0 ) , i &NotEqual; 0 e ( g , g ) r { u } , i = 0 , 其中 f t = &Pi; z &Element; B t f Z &Delta; k , B z &prime; ( 0 ) = e ( g , g ) r i { u } &Center Dot; q t ( 0 ) , i &NotEqual; 0 e ( g , g ) r { u } , i = 0 , in

k=index(z),B′z={index(z):z∈Bt}k=index(z),B′ z ={index(z):z∈B t }

iv R为根节点,iv R is the root node,

Ff rr == ee (( gg ,, gg )) rr {{ uu }} &CenterDot;&Center Dot; qq rr (( 00 )) == ee (( gg ,, gg )) rr {{ uu }} &CenterDot;&Center Dot; sthe s

则解密过程如下:Then the decryption process is as follows:

C ~ &CenterDot; F r e ( C , D ) = M &CenterDot; e ( g , g ) &alpha; &CenterDot; s &CenterDot; e ( g , g ) r { u } &CenterDot; s e ( g s &CenterDot; &beta; 1 , g ( r { u } + &alpha; ) &beta; 1 ) = M 得到明文。 C ~ &CenterDot; f r e ( C , D. ) = m &Center Dot; e ( g , g ) &alpha; &Center Dot; the s &Center Dot; e ( g , g ) r { u } &Center Dot; the s e ( g the s &CenterDot; &beta; 1 , g ( r { u } + &alpha; ) &beta; 1 ) = m get plaintext.

(2)若u为PRD中用户,调用T(A)确认SKu中的的属性是否满足访问控制树TPRD,解密过程和CP-ABE过程类似,(2) If u is a user in PRD, call T(A) to confirm whether the attributes in SK u satisfy the access control tree T PRD , the decryption process is similar to the CP-ABE process,

Ff rr == DecrptNodeDecrptNode (( CTCT ,, SKSK uu ,, RR ))

== ee (( gg ,, gg )) rr qq ^^ RR (( 00 )) == ee (( gg ,, gg )) rsrs ,,

利用W得到明文Use W to get the plaintext

Mm == CC ~~ &CenterDot;&CenterDot; (( CC ,, ^^ DD. ^^ )) Ff rr .. WW == Mm &CenterDot;&CenterDot; ee (( gg ,, gg )) &alpha;s&alpha;s ee (( gg ,, gg )) (( &alpha;&alpha; 33 ++ rr )) sthe s ee (( gg ,, gg )) rsrs ee (( gg ,, gg )) (( &alpha;&alpha; ++ &alpha;&alpha; 33 )) sthe s

5.文件撤销5. File revocation

用户要撤销文件,只需要将文件ID和自己的签名发送到云端。云端确认是该用户主体发出的请求后就将该文件删除。To revoke a file, the user only needs to send the file ID and his own signature to the cloud. After the cloud confirms that it is the request sent by the user subject, the file is deleted.

6.属性撤销6. Attribute revocation

MAH-ABE具有高效的属性撤销机制。在DA为用户分配属性施时为每一个属性集增加一个失效时间(expiration_time)X。在访问控制树中的属性含有时间属性Y,如果X≥Y,且属性相匹配,则能访问该文件。用户就可以通过改变时间属性的值来控制用户的访问权限。MAH-ABE has an efficient attribute revocation mechanism. When DA assigns attributes to users, an expiration time (expiration_time) X is added to each attribute set. The attributes in the access control tree contain the time attribute Y, if X≥Y, and the attributes match, the file can be accessed. The user can control the user's access rights by changing the value of the time attribute.

用户属性撤销.该任务主要由用户所属的DA完成。User attribute revocation. This task is mainly completed by the DA to which the user belongs.

(1)DA计算出能使用户访问权限撤销的最小属性集Minim alSet(A)→Amin,Anew=A-Amin,使得T(Anew)返回空。(1) DA calculates the minimum attribute set MinimalSet(A)→A min that can revoke the user's access right, A new =AA min , so that T(A new ) returns empty.

(2)对Amin中的每一个属性集赋予新的失效时间,并生成相应的新的私钥组件, keyUpdate ( S k u , t i new ) &RightArrow; Sk u new = { A min , { D i &CenterDot; j new , D i , j &prime; new } &Element; A min } (2) Assign a new failure time to each attribute set in A min , And generate the corresponding new private key component, keyUpdate ( S k u , t i new ) &Right Arrow; Sk u new = { A min , { D. i &Center Dot; j new , D. i , j &prime; new } &Element; A min }

(3)发回给用户。send(Sku)这里采用懒惰重加密,即用户在下次登录系统的时候会自动更新用户的私钥,而不需要及时更新,避免给系统造成负担。(3) send back to the user. send(Sk u ) here adopts lazy re-encryption, that is, the user's private key will be automatically updated when the user logs in to the system next time, and does not need to be updated in time to avoid burdening the system.

文件属性撤销.如果用户想更新文件的访问权限,只需要改变叶节点的失效时间,再将相应的更新信息发送到云端,通过云端代理加密。因为云端只得到一部分的节点属性信息,无法就此推断出整个明文,数据的安全隐私得到了保护。(1)设置需要更新的叶节点的属性集合为Ymin。File attribute revocation. If the user wants to update the access rights of the file, he only needs to change the expiration time of the leaf node, and then send the corresponding update information to the cloud, which is encrypted by the cloud proxy. Because the cloud only obtains part of the node attribute information, it is impossible to deduce the entire plaintext from this, and the security and privacy of the data are protected. (1) Set the attribute set of the leaf node to be updated as Ymin.

(2)更新叶节点的失效时间,生成新组建(2) Update the failure time of leaf nodes and generate new components

ythe y ii &Element;&Element; YY minmin ,, updateAttFileupdateAttFile (( ythe y ii ,, tt ii )) &RightArrow;&Right Arrow; {{ ythe y ii newnew ,, CC ythe y ii newnew ,, CC ythe y ii &prime;&prime; newnew }}

(3)更新访问控制树叶节点内容 y i &Element; Y min , update ( C y i , C y i &prime; ) &RightArrow; C y i new , C y i &prime; new , 删除废弃的节点yi∈{Y-Ymin},delete  (3) Update the content of the access control leaf node the y i &Element; Y min , update ( C the y i , C the y i &prime; ) &Right Arrow; C the y i new , C the y i &prime; new , Delete obsolete nodes y i ∈ {Y-Ymin}, delete

(4)输出新密文 CT new = ( T new , C ~ , C , C &OverBar; , &ForAll; y &Element; Y : C y new &prime; , &ForAll; x &Element; X : C ^ x ) . (4) Output new ciphertext CT new = ( T new , C ~ , C , C &OverBar; , &ForAll; the y &Element; Y : C the y new &prime; , &ForAll; x &Element; x : C ^ x ) .

为了方便描述,我们假定有如下应用实例:For the convenience of description, we assume the following application examples:

一个数据属主O将一个文件F存储在云端,用户U向可信机构申请获得私钥,然后向云端发起对文件F的访问。数据属主对文件执行三个操作:1.撤销相关用户的属性。2.更新访问控制结构树。3.删除该文件。则其具体实施方式为:A data owner O stores a file F in the cloud, and the user U applies to a trusted organization for a private key, and then initiates access to the file F to the cloud. The data owner performs three operations on the file: 1. Revokes the attribute of the relevant user. 2. Update the access control structure tree. 3. Delete the file. Then its specific implementation method is:

(1)可信机构首先随机选择生成元,生成双线性群和双线性映射,接着选择PUD领域的密钥层次,生成PUD的主密钥和公钥。主密钥保留,公钥公开。(1) The trusted organization first randomly selects generators to generate bilinear groups and bilinear maps, and then selects the key hierarchy in the PUD field to generate the master key and public key of the PUD. The master key is kept and the public key is made public.

(2)可信机构接着生成PRD的主密钥和公钥。主密钥保留,公钥公开。(2) The trusted authority then generates the master key and public key of the PRD. The master key is kept and the public key is made public.

(3)可信机构分配下一级可信子机构的主密钥(有子机构的时候分配)。(3) The trusted organization distributes the master key of the next level trusted sub-organization (distributed when there are sub-organizations).

(4)数据属主为上传到云端的文件F选取唯一ID,对文件对称加密,保留密钥K。(4) The data owner selects a unique ID for the file F uploaded to the cloud, encrypts the file symmetrically, and retains the key K.

(5)数据属主选取PUD领域属性集组成访问控制树TPUD,选取PRD领域属性集组成访问控制树TPRD,用两种树对密钥K加密生成密文CT,并发送到云端。(5) The data owner selects the PUD domain attribute set to form the access control tree T PUD , selects the PRD domain attribute set to form the access control tree T PRD , encrypts the key K with the two trees to generate the ciphertext CT, and sends it to the cloud.

(6)用户向可信机构提供相关信息,申请相关领域的合法用户权限。如果申请PUD领域的权限,执行(7),申请PRD领域的权限执行(8)。(6) The user provides relevant information to the trusted organization and applies for legal user authority in the relevant field. If applying for the authority of the PUD field, execute (7), and apply for the authority of the PRD field to execute (8).

(7)可信机构根据用户提交的信息,判断该用户能否申请到PUD领域的权限。如果不能,则返回空。如果能,将根据该用户提供的信息发送给对应的可信子机构(符合条件的子机构可能不止一个)。不同的子机构分配给该用户不同的角色属性集。最后生成相关的密钥组件SK,发送给用户。(7) The trusted organization judges whether the user can apply for permission in the PUD field based on the information submitted by the user. If not, return empty. If yes, send the information provided by the user to the corresponding trusted sub-organization (there may be more than one qualified sub-organization). Different sub-organizations assign different sets of role attributes to the user. Finally, the relevant key component SK is generated and sent to the user.

(8)PRD根据用户提交的信息,判断该用户能否申请到PRD领域的权限。如果不能,则返回空。如果能,将根据该用户提供的信息分配对应的数据属性,生成密钥组件SK,发送给用户。(8) Based on the information submitted by the user, PRD judges whether the user can apply for permission in the PRD field. If not, return empty. If yes, the corresponding data attribute will be assigned according to the information provided by the user, and the key component SK will be generated and sent to the user.

(9)用户U向云端发起对文件F的访问,云端返回密文CT,用户输入私钥SK,和相关领域的访问控制树T进行匹配,若匹配则执行(10),若不匹配,则执行(11)。(9) The user U initiates access to the file F to the cloud, the cloud returns the ciphertext CT, the user enters the private key SK, and matches it with the access control tree T of the relevant field. If it matches, execute (10), if it does not match, then Execute (11).

(10)返回给用户文件F的密钥K,解密后获得文件F。(10) Return the key K of the file F to the user, and obtain the file F after decryption.

(11)返回空。(11) returns empty.

(12)数据属主向可信机构发出通知,递交相关属性序列S和失效时间,委托可信机构更新S对应的相关用户。(12) The data owner sends a notification to the trusted organization, submits the relevant attribute sequence S and expiration time, and entrusts the trusted organization to update the relevant users corresponding to S.

(13)可信机构向相关可信子机构发出通知,可信子机构更新相关属性的失效时间,生成新的私钥组件,发送给相关用户。(13) The trusted organization sends a notification to the relevant trusted sub-organization, and the trusted sub-organization updates the expiration time of the relevant attributes, generates a new private key component, and sends it to the relevant user.

(14)数据属主向云端发出通知,递交相关属性序列S和失效时间,委托云端更新访问控制结构树T。(14) The data owner sends a notification to the cloud, submits the relevant attribute sequence S and expiration time, and entrusts the cloud to update the access control structure tree T.

(15)云端接收到更新信息后,生成相关组件,最后更新到相关访问控制树中。(15) After the cloud receives the update information, it generates relevant components and finally updates them to the relevant access control tree.

(16)云端输出新密文CT,替换原来的密文。(16) The cloud outputs new ciphertext CT to replace the original ciphertext.

(17)用户属主撤销文件:将文件ID和自己的签名发送到云端。(17) User owner revocation file: Send the file ID and your own signature to the cloud.

(18)云端确认签名后将该文件删除,返回属主删除成功的信息。(18) The cloud deletes the file after confirming the signature, and returns the information that the owner deleted it successfully.

(19)全过程结束。(19) The whole process is over.

Claims (3)

1., based on a cloud computing safety access control method for encryption attribute, it is characterized in that the step that the method comprises is:
Step 1). divide two kinds of user environments, public sphere PUD and private domain PRD;
Step 2). trust authority is Stochastic choice generator first, generates Bilinear Groups and bilinear map, then selects the key hierarchy in PUD field, and generate master key and the PKI of PUD, master key retains, and PKI is open;
Step 3). trust authority utilizes step 2) Bilinear Groups that generates and bilinear map, generate master key and the PKI of PRD, master key retains, and PKI is open;
Step 4). trust authority creates the lower credible clamp mechanism of one deck, distribute ground floor attribute individuality or community set, and generate master key, lower one deck trust authority can create less clamp mechanism, distribute second layer attribute individuality or community set, second layer attribute individuality or community set are the subset of ground floor attribute individuality or community set, and distribute key, the like;
Step 5). user provides relevant information to trust authority, the validated user authority of application association area, if the authority in application PUD field, performs step 6), the authority in application PRD field performs step 7);
Step 6). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PUD field, if can not, then return sky; If can, will send to corresponding credible clamp mechanism according to this user profile, corresponding credible clamp mechanism distributes corresponding attribute individuality or community set, generates a key module, sends to user; Redirect performs step 8);
Step 7). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PRD field, if can not, then return sky, if can, by data attribute corresponding for the information distribution that provides according to this user, generate key module, send to user;
Step 8). data owner is that the file uploading to high in the clouds chooses unique identification to file symmetric cryptography, retain key, and choose public sphere property set composition public visit control tree, choose the private visit of private domain's property set composition and control tree, with two kinds of trees to file key encryption generating ciphertext, and be sent to high in the clouds;
Step 9). user initiates the access to file to high in the clouds, high in the clouds returns the ciphertext of respective file, user's input step 6) or 7) private key in key module, mate with the access control tree T in ciphertext, if coupling obtains respective file key, obtain file after deciphering, if do not mate, return sky;
Step 10). data owner give notice to trust authority, cancels associated user's attribute, submits association attributes sequence and out-of-service time, entrusts trust authority to upgrade associated user's authority;
Step 11). trust authority is given notice to relevant credible clamp mechanism, and credible clamp mechanism upgrades the out-of-service time of association attributes, generates new private key assembly, sends to associated user;
Step 12). data owner give notice to high in the clouds, upgrades access control tree, submit association attributes sequence and out-of-service time, entrusts high in the clouds to upgrade access control structure tree;
Step 13). after high in the clouds receives lastest imformation, generate associated component, final updating in relevant access control tree, and exports new ciphertext, replaces original ciphertext;
Step 14). user owner cancels file, and file identification and the signature of oneself are sent to high in the clouds;
Step 15). by this file erase after high in the clouds confirmation signature, return owner and delete successful information.
2. the cloud computing safety access control method based on encryption attribute according to claim 1, is characterized in that, described public sphere PUD, and its key structure is hierarchical encryption structure, and described trust authority is the gradational trust authority of tool.
3. the cloud computing safety access control method based on encryption attribute according to claim 1, it is characterized in that, access control tree controls tree for public visit and private visit controls two kinds, tree, and the node that public visit controls in tree exists association node, supports the access of federation properties collection.
CN201210389845.5A 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method Active CN102916954B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210389845.5A CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210389845.5A CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Publications (2)

Publication Number Publication Date
CN102916954A CN102916954A (en) 2013-02-06
CN102916954B true CN102916954B (en) 2015-04-01

Family

ID=47615188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210389845.5A Active CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Country Status (1)

Country Link
CN (1) CN102916954B (en)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5576563B2 (en) 2011-06-23 2014-08-20 インターナショナル・ビジネス・マシーンズ・コーポレーション Information processing apparatus, method, and program for managing confidential information
US9292673B2 (en) * 2013-03-15 2016-03-22 International Business Machines Corporation Virtual key management and isolation of data deployments in multi-tenant environments
CN103179114B (en) * 2013-03-15 2015-09-23 华中科技大学 Data fine-grained access control method during a kind of cloud stores
CN104166821B (en) * 2013-05-17 2017-07-21 华为技术有限公司 A kind of method and apparatus of data processing
CN103346999B (en) * 2013-05-28 2016-06-15 北京航空航天大学 A kind of NOT of support operator also has the CP-ABE method of CCA safety
CN103297227B (en) * 2013-07-02 2016-03-23 西安电子科技大学 Support flexibly and based on the encryption of attribute under the Ciphertext policy of directly cancelling
CN103391192B (en) * 2013-07-16 2016-09-21 国家电网公司 A kind of based on secret protection across security domain access control system and control method thereof
US10158649B2 (en) 2013-08-20 2018-12-18 Nokia Technologies Oy Method and apparatus for privacy-enhanced evidence evaluation
CN103701833B (en) * 2014-01-20 2018-02-16 深圳大学 A kind of ciphertext access control method and system based on cloud computing platform
CN103825903A (en) * 2014-03-06 2014-05-28 武汉大学 Safe file sharing method based on mobile social network
CN104022869B (en) * 2014-06-17 2017-03-29 西安电子科技大学 Data fine-grained access control method based on key burst
CN104023027B (en) * 2014-06-18 2017-03-29 西安电子科技大学 High in the clouds data definitiveness delet method based on ciphertext sampling burst
CN104144056B (en) * 2014-07-10 2017-05-17 北京大学 Self-authorized CP-ABE system and method
CN104135495B (en) * 2014-08-25 2017-06-16 南京财经大学 The attribute base encryption method of the ciphertext policy of the without authority with secret protection
CN104486307B (en) * 2014-12-03 2017-08-15 中国电子科技集团公司第三十研究所 A kind of fraction key management method based on homomorphic cryptography
CN104753947A (en) * 2015-04-02 2015-07-01 河海大学 Attribute-based verifiable outsourcing decryption system and method with fixed ciphertext length
CN104901948B (en) * 2015-04-15 2017-11-10 南方电网科学研究院有限责任公司 Encryption access control system and method based on hierarchical attributes in smart power grid
CN104780175B (en) * 2015-04-24 2018-03-13 广东电网有限责任公司信息中心 The authorization management method that the classification of based role accesses
CN105025012B (en) * 2015-06-12 2017-12-08 深圳大学 Towards the access control system and its access control method of cloud storage service platform
CN104993926B (en) * 2015-06-30 2018-05-01 南方电网科学研究院有限责任公司 Hierarchical key management system and method based on cloud computing in smart power grid
US9853820B2 (en) * 2015-06-30 2017-12-26 Microsoft Technology Licensing, Llc Intelligent deletion of revoked data
CN105025021B (en) * 2015-07-13 2018-05-29 西安理工大学 Principal disjunctive normal form access strategy based on encryption attribute method on lattice
CN105450650B (en) * 2015-12-03 2019-03-08 中国人民大学 A secure mobile electronic health record access control system
CN105406967B (en) * 2015-12-10 2018-10-19 西安电子科技大学 A kind of hierarchical attribute encipherment scheme
CN105721448B (en) * 2016-01-27 2019-04-19 北京航空航天大学 Batch attribute-based encryption method and system
CN105897709B (en) * 2016-04-01 2019-02-22 西安电子科技大学 User Attribute Encryption and Decryption Method for Non-monotonic Access Structure in Distributed Network
CN109074463A (en) * 2016-04-27 2018-12-21 三菱电机株式会社 Attribute cooperation device, conveyer system, attribute collaboration method and attribute program interoperability
CN106209354A (en) * 2016-06-28 2016-12-07 电子科技大学 A kind of support attribute hide can verify that attribute base encrypt outsourcing scheme
CN105991278B (en) * 2016-07-11 2019-06-28 河北省科学院应用数学研究所 A kind of ciphertext access control method based on CP-ABE
CN108259422B (en) * 2016-12-29 2021-07-16 中兴通讯股份有限公司 A multi-tenant access control method and device
CN106911702B (en) * 2017-03-08 2019-08-02 福建师范大学 Based on the cloud storage block encryption access control method for improving CP-ABE
CN107181590B (en) * 2017-04-14 2020-05-26 南京邮电大学 Anti-leakage CP-ABE method under policy hiding and outsourcing decryption
CN107302524B (en) * 2017-06-02 2020-10-09 西安电子科技大学 A ciphertext data sharing system in cloud computing environment
CN108418784B (en) * 2017-12-04 2020-09-25 重庆邮电大学 Distributed cross-domain authorization and access control method based on attribute password
CN108200074A (en) * 2018-01-14 2018-06-22 南京邮电大学 A kind of logistics big data access control system and method based on encryption attribute
CN108494724B (en) * 2018-01-26 2021-05-07 国家计算机网络与信息安全管理中心 Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN108540280B (en) * 2018-02-09 2020-09-15 上海交通大学 A resource-efficient security data sharing method and system
CN109347833B (en) * 2018-10-24 2020-05-22 中国科学院信息工程研究所 Access control method and system used in machine learning environment based on attribute encryption
CN111212084B (en) * 2020-01-15 2021-04-23 广西师范大学 Attribute encryption access control method facing edge calculation
CN111614680B (en) * 2020-05-25 2021-04-02 华中科技大学 CP-ABE-based traceable cloud storage access control method and system
CN112532591B (en) * 2020-11-06 2022-03-11 西安电子科技大学 Cross-domain access control method, system, storage medium, computer equipment and terminal
CN113098683B (en) * 2021-03-17 2022-05-03 武汉理工大学 An attribute-based data encryption method and system
CN113079177B (en) * 2021-04-15 2022-05-31 河南大学 A Remote Sensing Data Sharing Method Based on Time and Decryption Times Limitation
CN113378230B (en) * 2021-07-05 2024-11-15 东南大学 A data access control method for DDS distributed system
CN114978578B (en) * 2022-04-06 2023-09-19 中债金科信息技术有限公司 Data unauthorized access control method and device based on attribute key derivation

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011045723A1 (en) * 2009-10-15 2011-04-21 Koninklijke Philips Electronics N.V. Ciphertext-policy attribute-based encryption and re-encryption

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
邵菊.《一种基于隐私保护的云端访问控制系统》.《中国优秀硕士学位论文全文数据库(电子期刊)》.2013,全文. *
陈丹伟等.《基于MAH-ABE的云计算隐私保护访问控制》.《电子学报》.2014,第42卷(第4期),821-827. *

Also Published As

Publication number Publication date
CN102916954A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
CN102916954B (en) Attribute-based encryption cloud computing safety access control method
CN110727737B (en) Intelligent medical data storage method based on multilevel block chain system architecture
WO2016106752A1 (en) Shared data access control method, device and system
CN113067857A (en) A cross-hospital sharing method of electronic medical records based on double-chain structure
Sabu et al. Implementation of a secure and privacy-aware E-Health record and IoT data sharing using blockchain
CN110099043A (en) The hiding more authorization center access control methods of support policy, cloud storage system
CN109741803A (en) Blockchain-based medical data security collaboration system
CN107103252A (en) Data access control method based on block chain
CN102073817B (en) Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model
CN102487377A (en) An Authentication and Authority Management System
CN111079191A (en) A blockchain-based CP-ABE access control scheme
CN106131225A (en) The security system accessed for medical treatment case information
CN108243194B (en) A semantic-based cloud storage access control method
CN110289060A (en) A kind of personal medical data storage method under the chain based on random Merkle tree
Sun et al. [Retracted] Obstetrics Nursing and Medical Health System Based on Blockchain Technology
Kumari et al. Design of a secure and smart healthcare IoT with blockchain: a review
CN114285867A (en) Air-railway combined transport data sharing method and system based on alliance chain and attribute encryption
Li et al. Double chain system for online and offline medical data sharing via private and consortium blockchain: a system design study
CN116432207A (en) Power data authority hierarchical management method based on blockchain
CN117675265A (en) Mandatory access control method and system for power grid data based on attribute encryption
CN104144048A (en) Key management method, device and system in a trusted cloud storage environment
CN116318630A (en) Space environment ground simulation device data safety sharing method based on block chain
CN104935588B (en) A kind of hierarchical encryption management method of safe cloud storage system
Singh et al. A digital asset inheritance model to convey online persona posthumously
CN113434880A (en) Efficient access method and system for multi-level block chain government affair data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Chen Danwei

Inventor after: Gao Jing

Inventor after: Shao Ju

Inventor before: Chen Danwei

Inventor before: Shao Ju

COR Change of bibliographic data
TR01 Transfer of patent right

Effective date of registration: 20160331

Address after: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee after: Guangzhou Heng Electrical Technology Co., Ltd.

Address before: 210046 Nanjing City, Jiangsu Province, the new model road No. 66

Patentee before: Nanjing Post & Telecommunication Univ.

C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee after: Guangdong Heng electrical information Polytron Technologies Inc

Address before: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee before: Guangzhou Heng Electrical Technology Co., Ltd.