CN102916954B - Attribute-based encryption cloud computing safety access control method - Google Patents

Attribute-based encryption cloud computing safety access control method Download PDF

Info

Publication number
CN102916954B
CN102916954B CN201210389845.5A CN201210389845A CN102916954B CN 102916954 B CN102916954 B CN 102916954B CN 201210389845 A CN201210389845 A CN 201210389845A CN 102916954 B CN102916954 B CN 102916954B
Authority
CN
China
Prior art keywords
user
attribute
access control
key
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210389845.5A
Other languages
Chinese (zh)
Other versions
CN102916954A (en
Inventor
陈丹伟
邵菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Heng electrical information Polytron Technologies Inc
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201210389845.5A priority Critical patent/CN102916954B/en
Publication of CN102916954A publication Critical patent/CN102916954A/en
Application granted granted Critical
Publication of CN102916954B publication Critical patent/CN102916954B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an ABE (Attribute-Based Encryption) cloud computing safety access control method, mainly aiming to solve the problems of safety and privacy protection of a cloud computing access control structure. The invention aims to provides a CP-ABE-based brand-new framework MAH-ABE (multiple and hierarchical attribute-based encryption) access control model which is a hierarchic domain-division multi-authority ABE safety framework-MAH-ABE. According to the framework, the attributes are differentiated as private domain and public domain, and the attributes of the public domain are divided as the levels of the authorities, and the authorities with different rights master different attribute key distribution mechanisms, thereby greatly reducing workload of the single authority, improving the user data privacy protection; and in addition, the characteristics of high efficiency, flexibility and fine grit are achieved.

Description

A kind of cloud computing safety access control method based on encryption attribute
Technical field
The present invention is a kind of security solution of cloud computing environment.Be mainly used in the fail safe and the secret protection sex chromosome mosaicism that solve cloud computing access control structure, belong to cloud computing security technology area.
Background technology
Cloud computing be based upon virtual, a kind of brand-new computing architecture on Parallel distributed computing.In recent years, cloud computing upgraded to one of IT industry the most with strongest influence power, and a large number of services is transplanted to cloud service center by many enterprises one after another.On the one hand, user no longer needs a large amount of software and hardware facility of investment to employ software talent to safeguard these facilities, thus saves infrastructure construction expense and human cost.On the other hand, cloud computing, according to lower price, is paid according to the demand for services of user, is had very high flexibility and convenience.
The outsourcing stores service pattern that cloud stores result in the existence of superuser, and they have the ability of unauthorized access user data, easily cause data message and privacy leakage etc. to internal attack problem.Fail safe is one of widely used key factor of restriction cloud computing technology, and the safety problem therefore studied under cloud computing environment is significant.The research of access control model is the large focus solving safety issue.
Three large subject matters of access control model are: the division of (1) faith mechanism.(2) foundation of access control control tree.(3) the fine-grained division of calling party.The method in past has certain defect and deficiency in the realization of these three problems.Current most of researcher only has large quantity research to Second Problem, as key policy attribute encipherment scheme KP-ABE (key-policy attribute-based encryption) and ciphertext policy ABE encipherment scheme CP-ABE (ciphertext-policy attribute-based encryption), the research of (1) and (3) individual problem is also in the elementary step.And one is improved and practical access control system only leans on single trust authority and single customer group to be far from being enough, various fail safe and privacy problem can be brought.The existence of these problems brings certain difficulty to the popularization of cloud computing.
Summary of the invention
Technical problem: the object of this invention is on the basis of CP-ABE, a kind of brand-new framework MAH-ABE (Multiple and Hierarchical attribute based encryption) access control model is proposed, solve the fail safe in cloud computing access control system and privacy problem, the invention provides a kind of cloud computing safety access control method based on encryption attribute, reach efficient, flexibly, fine-grained feature.
Technical scheme: the ABE security framework-MAH-ABE. framework that the present invention proposes a kind of tool gradational point of many trust authority in field not only according to private domain and public sphere to distinguish attribute; and the grade of the attribute of public sphere according to trust authority is divided; the trust authority of different rights is made to administer different attribute key distribution mechanisms; greatly reduce the workload of single trust authority, improve the data-privacy protectiveness of user simultaneously.
One of instrument very crucial when Bilinear Pairing is design ABE encipherment scheme.First the theorem of Bilinear Pairing is provided: choose the group G that two rank are a Big prime p 1and G 2, define a bilinear map e:G that can effectively calculate 1× G 1→ G 2, this mapping must meet:
(a) bilinearity: one maps e:G 1× G 1→ G 2there is bilinearity, as e (g a, h b)=e (g, h) ab, for all g, h ∈ G 1with all a, b ∈ Z p.
(b) non-degeneracy: there is g, h ∈ G 1, make e (g, h) ≠ 1.Namely can not by all G 1× G 1element be all mapped to G 2in certain identical element.
One, architecture
Fig. 1 gives the system model figure of MAH-ABE, forms primarily of following main body, and cloud service providing end (a cloud service provider) is called for short CSP, a first order trust authority, multiple regions trust authority, data subject and data user.CSP provides cloud stores service, and the data of having encrypted are stored in high in the clouds, for data users share by data subject.In order to obtain high in the clouds data, from high in the clouds, the encrypt file downloaded required for them is decrypted data user.Compared with traditional access control structure, this structure mainly have modified 5 parts: the setting transforming node in foundation (5) the access control tree of layering (3) public sphere of division (2) attribute structure of (1) grade trust authority and the multi-field access control tree of customer group classification (4) of private domain.Have modified these parts, is very little to the increase of the expense based on encryption attribute model, but is very large to the efficient of whole access control structure and fine-grained raising, and the fail safe of system and privacy are not impaired.
We provide the explanation of several concrete part below:
Public sphere and private domain: in the present invention, divided two kinds of fields, public sphere (PUD) and private domain (PRD).PRD mainly has the user of special access right towards a part, as the household of data subject, and Personal Assistant etc., when main body is agreed to authorize, the authorities such as this types of populations not only can have reading authority, also can have management document, amendment file.The feature in this field is that user is few, property set small scale, is easy to management, and PUD is mainly towards overall situation user, and as the employee of group company, the client of health insurance company, because customer volume is huge, attribute number is various, needs fine-grained attribute assignment mechanism.And data owner does not need to know specifically which user is in PUD environment.
Encryption key distribution mode: in PRD environment, because user is few, attribute small scale, adopts CP ABE access control scheme.User agent can entrust trust authority to distribute and managing keys, or oneself in person participates in distribution and the management of key.The attribute that user in PRD obtains is called data attribute (data attribute), and it is the categorical attribute of file.Each file sticks data attribute, as blog_file, photo_file etc.So the number of the size of user key and the data attribute of acquisition is linear.And in PUD environment, because customer volume is huge, attribute number is various, therefore we adopt tool gradational region trust authority (domain authority, DA) leading subscriber attribute is carried out, different DA has the authority of different size, and each DA is administered by his father's trust authority mandate, forms the gradational mechanism of tool.User in PUD has role attribute (role attribute, RA), and each DA is responsible for the private key distributing and manage the user that it is administered.In PUD field, user does not need to know which user has access rights when encryption upload file, only needs regulation to have and specifies the user of RA can access this file, significantly reduce the workload of user agent.
Hierarchical encryption structure: in PUD, this programme adopts hierarchical encryption structure, as shown in Figure 2.Suppose that the level of key is 2, then ground floor is attribute individuality or community set, and the second layer can only be that attribute is individual.As: { Dept:Hospital A, Addr:West, { Position:physician, level:3}, { Position:nurse, level:4}}, ground floor is that { Dept:Hospital A, Addr:West} is denoted as A 0, the second layer is that { { Position:physician, level:3}, { Position:nurse, level:4}} are denoted as A 1and A 2.In sum, remember that user key structure is A={A 0, A 1..., A m, A 0represent ground floor key, A irepresenting i-th community set (1≤i≤m) of second layer key. this key structure simply can be expressed as A by us like this 0={ 0, Dept:HospitalA}, A 1={ 1, Position:physician}, A 2={ 2, Position:nurse}.
Access control tree and conversion node: in two kinds of fields, we all adopt access control to set, and leaf node is property value, and nonleaf node is threshold value.Suppose num xfor child's number of node, k xfor the threshold value of node x, as the k of AND and OR xvalue is respectively 2 and 1.Our defined function parent (x) returns the father node of x simultaneously, the sequence number of index (x) return node x, and att (x) returns the property value of leaf node representative.If an attribute structure meets an access control tree, then at least a property set of this attribute structure meets all properties of access control tree.In general, it is unallowed that the attribute between different attribute collection joins together to meet access control tree.But because PUD domain attribute collection is various, we define a kind of node and are called switching node (translating node), and the property value of the child nodes of switching node from different property sets, namely can allow federation properties.
The step comprised based on the cloud computing safety access control method of encryption attribute of the present invention is:
Step 1). divide two kinds of user environments, public sphere PUD and private domain PRD;
Step 2). trust authority is Stochastic choice generator first, generates Bilinear Groups and bilinear map, then selects the key hierarchy in PUD field, and generate master key and the PKI of PUD, master key retains, and PKI is open;
Step 3). the Bilinear Groups that trust authority utilizes step 2 to generate and bilinear map, generate master key and the PKI of PRD, master key retains, and PKI is open;
Step 4). trust authority creates the lower credible clamp mechanism of one deck, distribute ground floor attribute individuality or community set, and generate master key, lower one deck trust authority can create less clamp mechanism, distribute second layer attribute individuality or community set, second layer attribute individuality or community set are the subset of ground floor attribute individuality or community set, and distribute key, the like;
Step 5). user provides relevant information to trust authority, the validated user authority of application association area, if the authority in application PUD field, performs step 6, and the authority in application PRD field performs step 7;
Step 6). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PUD field, if can not, then return sky; If can, will send to corresponding credible clamp mechanism according to this user profile, corresponding credible clamp mechanism distributes corresponding attribute individuality or community set, generates a key module, sends to user; Redirect performs step 8;
Step 7). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PRD field, if can not, then return sky, if can, by data attribute corresponding for the information distribution that provides according to this user, generate key module, send to user;
Step 8). data owner is that the file uploading to high in the clouds chooses unique identification to file symmetric cryptography, retain key, and choose public sphere property set composition public visit control tree, choose the private visit of private domain's property set composition and control tree, with two kinds of trees to file key encryption generating ciphertext, and be sent to high in the clouds;
Step 9). user initiates the access to file to high in the clouds, high in the clouds returns the ciphertext of respective file, the private key that user's input step 6 or 7 generates, mate with the access control tree T in ciphertext, if coupling obtains respective file key, after deciphering, obtain file, if do not mate, return sky;
Step 10). data owner give notice to trust authority, cancels associated user's attribute, submits association attributes sequence and out-of-service time, entrusts trust authority to upgrade associated user's authority;
Step 11). trust authority is given notice to relevant credible clamp mechanism, and credible clamp mechanism upgrades the out-of-service time of association attributes, generates new private key and sets up, send to associated user;
Step 12). data owner give notice to high in the clouds, upgrades access control tree, submit association attributes sequence and out-of-service time, entrusts high in the clouds to upgrade access control structure tree;
Step 13). after high in the clouds receives lastest imformation, generate associated component, final updating in relevant access control tree, and exports new ciphertext, replaces original ciphertext;
Step 14). user owner cancels file, and file identification and the signature of oneself are sent to high in the clouds;
Step 15). by this file erase after high in the clouds confirmation signature, return owner and delete successful information.
Described PUD, its key structure is hierarchical encryption structure, and described trust authority is the gradational trust authority of tool.
Access control tree controls tree for public visit and private visit controls two kinds, tree, and the node that public visit controls in tree exists association node, supports the access of federation properties collection.
Beneficial effect: the inventive method is for the fail safe under cloud computing environment and privacy problem, on the basis of CP-ABE, the access control model that MAH-ABE is new is proposed, public sphere and private domain are divided, private domain adopts the access control of CP-ABE ciphertext, public sphere adopts the many trust authority of grade to come management attribute and key, decreases management complexity.Meanwhile, model is introduced this attribute of out-of-service time and is performed attribute renewal rewards theory.This model is efficient, flexibly, and fine granularity and safety.We provide specific description below.
[having divided different field] the present invention is based on the different qualities of customer group, has divided public sphere and private domain not two kinds of fields.In the middle of model in the past, all users are in the middle of a field, by the constraint of same access control model, have same key management and the method for salary distribution.Inconvenience is brought to there being the user of special access right.In such as individual health record cloud computing system, private domain is the relatives of data owner, friend, and they enjoy special authority, and data owner can authorize the file system of this kind of user management oneself.Public sphere is the doctor of each hospital, nurse, the staff etc. of insurance company.They have the authority etc. of checking user owner data.The attribute in these two kinds of fields should have different speciality, should enjoy different key managements and the method for salary distribution.The present invention has divided two kinds of dissimilar customer groups, makes the access of data more flexible, the management fine granularity more of user.
[division of grade trust authority] the present invention has divided tool is gradational trusts trust authority more, breaches the conventional method that there is user in single trust authority administrative institute.Adopt single faith mechanism, the frequent mutual system load ability of not only giving of user and trust authority brings bottleneck, adds potential potential safety hazard simultaneously.Once trust authority is not had the illegal user of authority to steal, then he likely utilizes illegal means to steal the data of all users, brings huge loss to corporate users.And all give a TA by all key distribution work, infeasible in the middle of practice, should there be different responsibilities in different mechanisms, the clamp mechanism of administration oneself separately.Each clamp mechanism should define and specify various community set within the scope of authority of oneself, and the user that the department that is distributed to administers.User in the present invention is in different trust authority, even if a certain trust authority is subject to security threat, also can not have influence on the fail safe of other trust authority, the privacy of user obtains protection.
[foundation of access control tree] the present invention is that the user of different field establishes different access control trees, in public sphere, because attribute is various, establishes the access control tree of the associating supported between different attribute collection.In a large amount of models based on CP-ABE, the community set be used in access control structure only has one, and namely data owner in the middle of a community set, can only choose attribute and carry out various combination to meet access strategy.Isolate completely between property set, the contact between property set can not be set up.This greatly reduces the flexibility of access control.Because user needs to cross over multiple community set when being necessary, choose attribute to meet a certain access control structure.The node of access control tree of the present invention has two types: ordinary node and association node.Ordinary node only supports the association of attribute in single set, and what multiple community sets of single set were crossed in association node support combines access, substantially increases the flexibility of access control structure.
Accompanying drawing explanation
Fig. 1 is system model figure of the present invention.
Fig. 2 is the hierarchical encryption structural representation of the user of PUD environment.
Embodiment
Method flow
1. system parameters generates
In PUD, Setup (d=2) → (PK.MK) .d is the level of key, is assumed to be 2.Trust authority first Stochastic choice generator is g, and rank are the Bilinear Groups G of p 0with bilinear map e:G 0× G 0=G t, Stochastic choice random number α, β i∈ Z p, generation PKI and master key are:
PK PUD = ( G 0 , g , h 1 = g β 1 , h 2 = g β 2 , e ( g , g ) α )
MK PUD=(β 12,g α)
In PRD, random selecting parameter alpha 3, β 3∈ Z pgeneration PKI and master key are
PK PRD = { G 0 , g , h 3 = g β 3 , e ( g , g ) α 3 }
MK PRD = ( β 3 , g α 3 )
2. generate private key for user
Distribute in PRD private key for user .PRD, the property set that user u obtains is random selecting r ∈ Z p, and be each attribute a jselect a random value r j∈ Z p, the private key calling keyGen generation user u is SK u = { D ^ = g α 3 + r β 3 , ∀ a j ∈ A ^ : D ^ j = g r · H ( j ) r j , D ^ j ′ = g r j }
The trust authority mandate of first order region. in PUD, each first order DA is made up of two parts: the community set A={A of ID and his administration 0, A 1... A mwherein A i={ a i, 1, a i, 2... a i, n, a i, jrepresent A ia jth attribute in individual community set.First order DA is authority the maximum, as each branch company of company.If there is new first order DA(to be set to DA i) add, trust authority is DA by calling CreateDA (PK, MK, A) method icreate master key.Obtain the DA after authority ithe DA being limited to next stage by having the right distributes authority, as each department of subsidiary.DA ithe master key situation result obtained is as follows:
MK i = ( A , D = g α + r { u } β 1 D i , j = g r i { u } . H ( a i , j ) r i , j { u } ,
D i , j ′ = g r i , j { u } , 0 ≤ i ≤ m , 1 ≤ j ≤ n i ,
E i = g r { u } + r i { u } β 2 , 1 ≤ i ≤ m )
Wherein, A is attribute structure, r { u}being unique ID of this DA, is also A 0iD, each property set A iiD, E ifor different A ibetween conversion, this decryption part branch is hereinafter told about in detail.
Subordinate DA/ private key for user structure. (1) DA ifor subordinate DA authorizes private key, be designated as DA i+1, call (2) DAi is this DA iinterior subscriber authorisation private key, calls for the attribute structure of next stage user/DA, it must be a subset of the attribute structure of upper level DA, as A={A 0, A 1, A 2, next stage user/DA private key structure is
SK u / MK i + 1 = ( A ~ , D ~ = g α + r { u } + r ~ { u } β 1 ,
D ~ i , j = g r i { u } + r ~ i { u } . H ( a i , j ) r i , j { u } + r ~ i . j { u } ,
D ~ i , j ′ = g r i , j { u } + r ~ i . j { u } , 0 ≤ i ≤ m , 1 ≤ j ≤ n i ,
E ~ i = g ( r { u } + r i { u } + r ~ { u } + r ~ i { u } ) β 2 , 1 ≤ i ≤ m )
3. document creation
User agent is that unique ID chosen by the file uploading to high in the clouds, and random selecting key FEK, to file symmetric cryptography, i.e. E dEK(F) ← FEK.Then user agent calls Encrypt method and encrypts generating ciphertext CT to key FEK, and generates access control tree T, the T=(T be made up of attribute resource pUD) OR (T pRD), T pUDfor access control tree in PUD, T pRDfor access control tree in PRD.The ciphertext form being finally stored in high in the clouds is E (F)=<CT, E fEK(F) >.
Set up access control tree T pUDprocess is as follows:
I. be each node selection multinomial q in access control tree x, order of a polynomial is d x, then d x=k x-1.
Ii. be root node R random selecting s ∈ Z p, meet q r(0)=s, with polynomial interpolation random selecting q rindividual value carrys out defining polynomial q r.
Iii. for the upper node x except root node of tree, q is made x(0)=q parent (x)(index (x)) and then random selecting d xindividual complete for all polynomial.
According to above three steps, then for creating access control tree T in PRD environment pRD.
Make Y be the set of leaf node, X is that the set of switching node is (only at T pUDin use X), then plaintext M is by the encryption of following formula:
CT = + ( T PUD , T PRD ,
C ~ = M &CenterDot; e ( g , g ) &alpha; &CenterDot; s , C = h 1 s , C &OverBar; = h 2 s , C ^ = h 3 s ,
&ForAll; y &Element; Y &SubsetEqual; T PUD : C y = g q y ( 0 ) , C y &prime; = H ( att ( y ) ) q y ( 0 ) ,
&ForAll; y &Element; Y &SubsetEqual; T PRD : C ^ y = g q ^ y ( 0 ) , C ^ y &prime; = H ( att ( y ) ) q ^ y ( 0 ) ,
&ForAll; x &Element; X &SubsetEqual; T PUD : C ^ x = h 2 q x ( 0 ) )
Defining one helps data W to obtain expressly with the user helped in PRD:
W = e ( g , g ) &gamma;s = e ( g , g ) &alpha;s &CenterDot; e ( g , g ) &alpha; 3 s ,
I.e. α 3=γ-α
CT and W is together stored in high in the clouds.
4. file access
User u sends request application access file to high in the clouds, then corresponding ciphertext is sent to user by high in the clouds.User calls and utilizes Decrypt (CT, SK u) algorithm deciphering:
(1) if u is user in PUD, call T (A) and confirm SK uin attribute whether meet access control tree T pUD.T (A) is the recursive fashion from leaf node to root node.
I t is leaf node, if a i∈ A is DecryptDode (CT, SK then u, t, i) and=null, if att (t)=a i, j∈ A i, A i∈ A, then
DecryptDode ( CT , SK u , t , i )
= e ( D i , j , C t ) / e ( D i , j &prime; , C t &prime; )
= e ( g , g ) r i { u } &CenterDot; q t ( 0 )
Ii t is nonleaf node, and the child nodes of definition t is z, B tfor meeting the k of thresholding tthe set of individual z node, S zfor k xthe label set of individual z node, definition F z=DecryptDode (CT, SK u, t, i) and be the result of determination of attribute in arbitrary node in T and A, if there is no such S set z, then F z=⊥.If had, and (1) label i ∈ S z, (2) label i ' ∈ S zand there is i ' ≠ i, then z is a switching node, makes DecryptDode (CT, SK u, z, i ') and=F ' zif i ≠ 0(is not at A 0in) by F ' zconvert F to z:
F z = e ( C ^ z , E i / E i ` ) &CenterDot; F z &prime; = e ( g , g ) r i { u } &CenterDot; q z ( 0 )
Otherwise F z = e ( C ^ z , E i &prime; ) F z &prime; = e ( g , g ) r { u } &CenterDot; q z ( 0 ) .
Iii according to lagrange character, calculate father node t time,
F t = &Pi; z &Element; B t F Z &Delta; k , B z &prime; ( 0 ) = e ( g , g ) r i { u } &CenterDot; q t ( 0 ) , i &NotEqual; 0 e ( g , g ) r { u } , i = 0 , Wherein
k=index(z),B′ z={index(z):z∈B t}
Iv R is root node,
F r = e ( g , g ) r { u } &CenterDot; q r ( 0 ) = e ( g , g ) r { u } &CenterDot; s
Then decrypting process is as follows:
C ~ &CenterDot; F r e ( C , D ) = M &CenterDot; e ( g , g ) &alpha; &CenterDot; s &CenterDot; e ( g , g ) r { u } &CenterDot; s e ( g s &CenterDot; &beta; 1 , g ( r { u } + &alpha; ) &beta; 1 ) = M Obtain expressly.
(2) if u is user in PRD, call T (A) and confirm SK uin attribute whether meet access control tree T pRD, decrypting process and CP-ABE process similar,
F r = DecrptNode ( CT , SK u , R )
= e ( g , g ) r q ^ R ( 0 ) = e ( g , g ) rs ,
W is utilized to obtain expressly
M = C ~ &CenterDot; ( C , ^ D ^ ) F r . W = M &CenterDot; e ( g , g ) &alpha;s e ( g , g ) ( &alpha; 3 + r ) s e ( g , g ) rs e ( g , g ) ( &alpha; + &alpha; 3 ) s
5. file is cancelled
User will cancel file, only needs file ID and the signature of oneself to be sent to high in the clouds.High in the clouds is confirmed to be request that this user agent sends afterwards just by this file erase.
6. attribute is cancelled
MAH-ABE has efficient attribute revocation mechanism.DA for when user's distributive property is executed for each property set increases out-of-service time (expiration_time) X.Attribute in access control tree contains time attribute Y, if X >=Y, and attribute matches, then can access this file.User just can control the access rights of user by the value changing time attribute.
User property is cancelled. and this task completes primarily of the DA belonging to user.
(1) DA calculates minimal attribute set Minim alSet (the A) → A that access privilege can be made to cancel min, A new=A-A min, make T (A new) return sky.
(2) to A minin each property set give the new out-of-service time, and generate private key assembly new accordingly, keyUpdate ( S k u , t i new ) &RightArrow; Sk u new = { A min , { D i &CenterDot; j new , D i , j &prime; new } &Element; A min }
(3) user is sent back to.Send (Sk u) adopt lazy re-encryption here, namely user can upgrade the private key of user automatically when next login system, and does not need to upgrade in time, avoids causing burden to system.
If file attribute is cancelled. user thinks the access rights of transaction file, only needs the out-of-service time changing leaf node, more corresponding lastest imformation is sent to high in the clouds, proxy-encrypted by high in the clouds.Because the node attribute information of a part is had in high in the clouds, cannot infer whole plaintext, the security privacy of data obtains protection at this point.(1) arranging the community set needing the leaf node upgraded is Ymin.
(2) upgrade the out-of-service time of leaf node, generate and newly set up
y i &Element; Y min , updateAttFile ( y i , t i ) &RightArrow; { y i new , C y i new , C y i &prime; new }
(3) access control leaf nodes content is upgraded y i &Element; Y min , update ( C y i , C y i &prime; ) &RightArrow; C y i new , C y i &prime; new , Delete discarded node y i∈ { Y-Ymin}, delete
(4) new ciphertext is exported CT new = ( T new , C ~ , C , C &OverBar; , &ForAll; y &Element; Y : C y new &prime; , &ForAll; x &Element; X : C ^ x ) .
For convenience of description, we suppose there is following application example:
A file F is stored in high in the clouds by a data owner O, and user U obtains private key to trust authority application, then initiates the access to file F to high in the clouds.Data owner performs three operations to file: 1. the attribute of cancelling associated user.2. upgrade access control structure tree.3. delete this file.Then its embodiment is:
(1) trust authority first Stochastic choice generator, generates Bilinear Groups and bilinear map, then selects the key hierarchy in PUD field, generates master key and the PKI of PUD.Master key retains, and PKI is open.
(2) trust authority then generates master key and the PKI of PRD.Master key retains, and PKI is open.
(3) trust authority distributes the master key (have when clamp mechanism and distribute) of the credible clamp mechanism of next stage.
(4) data owner is that the file F uploading to high in the clouds chooses unique ID, to file symmetric cryptography, retains key K.
(5) data owner chooses PUD domain attribute collection composition access control tree T pUD, choose PRD domain attribute collection composition access control tree T pRD, with two kinds of trees to key K encryption generating ciphertext CT, and be sent to high in the clouds.
(6) user provides relevant information to trust authority, the validated user authority of application association area.If the authority in application PUD field, performs (7), the authority in application PRD field performs (8).
(7) information submitted to according to user of trust authority, judges that can this user apply for the authority in PUD field.If can not, then return sky.If can, the information provided according to this user is sent to corresponding credible clamp mechanism (qualified more than one of clamp mechanism possibility).Different clamp mechanisms distributes to the different role attribute collection of this user.Finally generate relevant key module SK, send to user.
(8) information submitted to according to user of PRD, judges that can this user apply for the authority in PRD field.If can not, then return sky.If can, by data attribute corresponding for the information distribution that provides according to this user, generate key module SK, send to user.
(9) user U initiates the access to file F to high in the clouds, and high in the clouds returns ciphertext CT, and user inputs private key SK, and the access control tree T of association area mates, if coupling, performs (10), if do not mate, then performs (11).
(10) return to the key K of user file F, after deciphering, obtain file F.
(11) sky is returned.
(12) data owner gives notice to trust authority, submits association attributes sequence S and out-of-service time, entrusts trust authority to upgrade associated user corresponding to S.
(13) trust authority is given notice to relevant credible clamp mechanism, and credible clamp mechanism upgrades the out-of-service time of association attributes, generates new private key assembly, sends to associated user.
(14) data owner gives notice to high in the clouds, submits association attributes sequence S and out-of-service time, entrusts high in the clouds to upgrade access control structure tree T.
(15) after high in the clouds receives lastest imformation, generate associated component, final updating is in relevant access control tree.
(16) high in the clouds exports new ciphertext CT, replaces original ciphertext.
(17) user owner cancels file: file ID and the signature of oneself are sent to high in the clouds.
(18) high in the clouds confirm signature after by this file erase, return owner and delete successful information.
(19) overall process terminates.

Claims (3)

1., based on a cloud computing safety access control method for encryption attribute, it is characterized in that the step that the method comprises is:
Step 1). divide two kinds of user environments, public sphere PUD and private domain PRD;
Step 2). trust authority is Stochastic choice generator first, generates Bilinear Groups and bilinear map, then selects the key hierarchy in PUD field, and generate master key and the PKI of PUD, master key retains, and PKI is open;
Step 3). trust authority utilizes step 2) Bilinear Groups that generates and bilinear map, generate master key and the PKI of PRD, master key retains, and PKI is open;
Step 4). trust authority creates the lower credible clamp mechanism of one deck, distribute ground floor attribute individuality or community set, and generate master key, lower one deck trust authority can create less clamp mechanism, distribute second layer attribute individuality or community set, second layer attribute individuality or community set are the subset of ground floor attribute individuality or community set, and distribute key, the like;
Step 5). user provides relevant information to trust authority, the validated user authority of application association area, if the authority in application PUD field, performs step 6), the authority in application PRD field performs step 7);
Step 6). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PUD field, if can not, then return sky; If can, will send to corresponding credible clamp mechanism according to this user profile, corresponding credible clamp mechanism distributes corresponding attribute individuality or community set, generates a key module, sends to user; Redirect performs step 8);
Step 7). the information that trust authority is submitted to according to user, judges that can this user apply for the authority in PRD field, if can not, then return sky, if can, by data attribute corresponding for the information distribution that provides according to this user, generate key module, send to user;
Step 8). data owner is that the file uploading to high in the clouds chooses unique identification to file symmetric cryptography, retain key, and choose public sphere property set composition public visit control tree, choose the private visit of private domain's property set composition and control tree, with two kinds of trees to file key encryption generating ciphertext, and be sent to high in the clouds;
Step 9). user initiates the access to file to high in the clouds, high in the clouds returns the ciphertext of respective file, user's input step 6) or 7) private key in key module, mate with the access control tree T in ciphertext, if coupling obtains respective file key, obtain file after deciphering, if do not mate, return sky;
Step 10). data owner give notice to trust authority, cancels associated user's attribute, submits association attributes sequence and out-of-service time, entrusts trust authority to upgrade associated user's authority;
Step 11). trust authority is given notice to relevant credible clamp mechanism, and credible clamp mechanism upgrades the out-of-service time of association attributes, generates new private key assembly, sends to associated user;
Step 12). data owner give notice to high in the clouds, upgrades access control tree, submit association attributes sequence and out-of-service time, entrusts high in the clouds to upgrade access control structure tree;
Step 13). after high in the clouds receives lastest imformation, generate associated component, final updating in relevant access control tree, and exports new ciphertext, replaces original ciphertext;
Step 14). user owner cancels file, and file identification and the signature of oneself are sent to high in the clouds;
Step 15). by this file erase after high in the clouds confirmation signature, return owner and delete successful information.
2. the cloud computing safety access control method based on encryption attribute according to claim 1, is characterized in that, described public sphere PUD, and its key structure is hierarchical encryption structure, and described trust authority is the gradational trust authority of tool.
3. the cloud computing safety access control method based on encryption attribute according to claim 1, it is characterized in that, access control tree controls tree for public visit and private visit controls two kinds, tree, and the node that public visit controls in tree exists association node, supports the access of federation properties collection.
CN201210389845.5A 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method Active CN102916954B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210389845.5A CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210389845.5A CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Publications (2)

Publication Number Publication Date
CN102916954A CN102916954A (en) 2013-02-06
CN102916954B true CN102916954B (en) 2015-04-01

Family

ID=47615188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210389845.5A Active CN102916954B (en) 2012-10-15 2012-10-15 Attribute-based encryption cloud computing safety access control method

Country Status (1)

Country Link
CN (1) CN102916954B (en)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE112012002600T5 (en) 2011-06-23 2014-04-10 International Business Machines Corp. An information processing apparatus, method and program for managing confidential information
US9292673B2 (en) * 2013-03-15 2016-03-22 International Business Machines Corporation Virtual key management and isolation of data deployments in multi-tenant environments
CN103179114B (en) * 2013-03-15 2015-09-23 华中科技大学 Data fine-grained access control method during a kind of cloud stores
CN104166821B (en) * 2013-05-17 2017-07-21 华为技术有限公司 A kind of method and apparatus of data processing
CN103346999B (en) * 2013-05-28 2016-06-15 北京航空航天大学 A kind of NOT of support operator also has the CP-ABE method of CCA safety
CN103297227B (en) * 2013-07-02 2016-03-23 西安电子科技大学 Support flexibly and based on the encryption of attribute under the Ciphertext policy of directly cancelling
CN103391192B (en) * 2013-07-16 2016-09-21 国家电网公司 A kind of based on secret protection across security domain access control system and control method thereof
WO2015024173A1 (en) 2013-08-20 2015-02-26 Nokia Corporation A method and apparatus for privacy-enhanced evidence evaluation
CN103701833B (en) * 2014-01-20 2018-02-16 深圳大学 A kind of ciphertext access control method and system based on cloud computing platform
CN103825903A (en) * 2014-03-06 2014-05-28 武汉大学 Safe file sharing method based on mobile social network
CN104022869B (en) * 2014-06-17 2017-03-29 西安电子科技大学 Data fine-grained access control method based on key burst
CN104023027B (en) * 2014-06-18 2017-03-29 西安电子科技大学 High in the clouds data definitiveness delet method based on ciphertext sampling burst
CN104144056B (en) * 2014-07-10 2017-05-17 北京大学 Self-authorized CP-ABE system and method
CN104135495B (en) * 2014-08-25 2017-06-16 南京财经大学 The attribute base encryption method of the ciphertext policy of the without authority with secret protection
CN104486307B (en) * 2014-12-03 2017-08-15 中国电子科技集团公司第三十研究所 A kind of fraction key management method based on homomorphic cryptography
CN104753947A (en) * 2015-04-02 2015-07-01 河海大学 Attribute-based verifiable outsourcing decryption system and method with fixed ciphertext length
CN104901948B (en) * 2015-04-15 2017-11-10 南方电网科学研究院有限责任公司 Encryption access control system and method based on hierarchical attributes in smart power grid
CN104780175B (en) * 2015-04-24 2018-03-13 广东电网有限责任公司信息中心 The authorization management method that the classification of based role accesses
CN105025012B (en) * 2015-06-12 2017-12-08 深圳大学 Towards the access control system and its access control method of cloud storage service platform
CN104993926B (en) * 2015-06-30 2018-05-01 南方电网科学研究院有限责任公司 Hierarchical key management system and method based on cloud computing in smart power grid
US9853820B2 (en) * 2015-06-30 2017-12-26 Microsoft Technology Licensing, Llc Intelligent deletion of revoked data
CN105025021B (en) * 2015-07-13 2018-05-29 西安理工大学 Principal disjunctive normal form access strategy based on encryption attribute method on lattice
CN105450650B (en) * 2015-12-03 2019-03-08 中国人民大学 A kind of safe mobile e health records access control system
CN105406967B (en) * 2015-12-10 2018-10-19 西安电子科技大学 A kind of hierarchical attribute encipherment scheme
CN105721448B (en) * 2016-01-27 2019-04-19 北京航空航天大学 Batch processing attribute base encryption method and system
CN105897709B (en) * 2016-04-01 2019-02-22 西安电子科技大学 The user property encipher-decipher method of non-monotonic access structure in distributed network
JP6366883B2 (en) * 2016-04-27 2018-08-01 三菱電機株式会社 Attribute linkage device, transfer system, attribute linkage method, and attribute linkage program
CN106209354A (en) * 2016-06-28 2016-12-07 电子科技大学 A kind of support attribute hide can verify that attribute base encrypt outsourcing scheme
CN105991278B (en) * 2016-07-11 2019-06-28 河北省科学院应用数学研究所 A kind of ciphertext access control method based on CP-ABE
CN108259422B (en) * 2016-12-29 2021-07-16 中兴通讯股份有限公司 Multi-tenant access control method and device
CN106911702B (en) * 2017-03-08 2019-08-02 福建师范大学 Based on the cloud storage block encryption access control method for improving CP-ABE
CN107181590B (en) * 2017-04-14 2020-05-26 南京邮电大学 Anti-leakage CP-ABE method under strategy hiding and outsourcing decryption
CN107302524B (en) * 2017-06-02 2020-10-09 西安电子科技大学 Ciphertext data sharing system under cloud computing environment
CN108418784B (en) * 2017-12-04 2020-09-25 重庆邮电大学 Distributed cross-domain authorization and access control method based on attribute password
CN108200074A (en) * 2018-01-14 2018-06-22 南京邮电大学 A kind of logistics big data access control system and method based on encryption attribute
CN108494724B (en) * 2018-01-26 2021-05-07 国家计算机网络与信息安全管理中心 Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN108540280B (en) * 2018-02-09 2020-09-15 上海交通大学 Resource efficient security data sharing method and system
CN109347833B (en) * 2018-10-24 2020-05-22 中国科学院信息工程研究所 Access control method and system used in machine learning environment based on attribute encryption
CN111212084B (en) * 2020-01-15 2021-04-23 广西师范大学 Attribute encryption access control method facing edge calculation
CN111614680B (en) * 2020-05-25 2021-04-02 华中科技大学 CP-ABE-based traceable cloud storage access control method and system
CN112532591B (en) * 2020-11-06 2022-03-11 西安电子科技大学 Cross-domain access control method, system, storage medium, computer equipment and terminal
CN113098683B (en) * 2021-03-17 2022-05-03 武汉理工大学 Data encryption method and system based on attributes
CN113079177B (en) * 2021-04-15 2022-05-31 河南大学 Remote sensing data sharing method based on time and decryption frequency limitation
CN113378230A (en) * 2021-07-05 2021-09-10 东南大学 Data access control method of DDS (direct digital synthesizer) distributed system
CN114978578B (en) * 2022-04-06 2023-09-19 中债金科信息技术有限公司 Data unauthorized access control method and device based on attribute key derivation

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011045723A1 (en) * 2009-10-15 2011-04-21 Koninklijke Philips Electronics N.V. Ciphertext-policy attribute-based encryption and re-encryption

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
邵菊.《一种基于隐私保护的云端访问控制系统》.《中国优秀硕士学位论文全文数据库(电子期刊)》.2013,全文. *
陈丹伟等.《基于MAH-ABE的云计算隐私保护访问控制》.《电子学报》.2014,第42卷(第4期),821-827. *

Also Published As

Publication number Publication date
CN102916954A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
CN102916954B (en) Attribute-based encryption cloud computing safety access control method
CN111371561B (en) Alliance block chain data access control method based on CP-ABE algorithm
CN108833393A (en) A kind of revocable data sharing method calculated based on mist
CN110099043A (en) The hiding more authorization center access control methods of support policy, cloud storage system
CN107359986A (en) The outsourcing encryption and decryption CP ABE methods of user revocation
CN103179114B (en) Data fine-grained access control method during a kind of cloud stores
AU2012252388B2 (en) Method for handling privacy data
CN108418784A (en) A kind of distributed cross-domain authorization and access control method based on properties secret
CN109741803A (en) Medical data security cooperation system based on block chain
Li et al. Unified fine-grained access control for personal health records in cloud computing
CN106059763A (en) Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment
CN105389870A (en) Entrance guard management method and system
CN104935590A (en) HDFS access control method based on role and user trust value
CN103297227B (en) Support flexibly and based on the encryption of attribute under the Ciphertext policy of directly cancelling
CN103944975B (en) Support the file security sharing method based on mobile social networking of user&#39;s revocation
CN107968780A (en) A kind of method for secret protection of mobile cloud storage shared data
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN107426162A (en) A kind of method based on attribute base encryption Implement Core mutual role help
KR20120041904A (en) Proxy based privilege management method and apparatus for accessing health data in cloud computing environment
CN104618366B (en) A kind of network archives safety management system and method based on attribute
CN108540280A (en) A kind of the secure data sharing method and system of resource high-efficiency
Tian et al. Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage.
CN113660278B (en) Quantum attack resistant non-interactive attribute proxy re-encryption method and system
CN110011963A (en) The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD
CN117675265A (en) Mandatory access control method and system for power grid data based on attribute encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Chen Danwei

Inventor after: Gao Jing

Inventor after: Shao Ju

Inventor before: Chen Danwei

Inventor before: Shao Ju

COR Change of bibliographic data
TR01 Transfer of patent right

Effective date of registration: 20160331

Address after: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee after: Guangzhou Heng Electrical Technology Co., Ltd.

Address before: 210046 Nanjing City, Jiangsu Province, the new model road No. 66

Patentee before: Nanjing Post & Telecommunication Univ.

C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee after: Guangdong Heng electrical information Polytron Technologies Inc

Address before: 510000 Guangzhou, Tianhe District, No. five road, No. 246, No. 248, room 1902, the self - made room 01, 02, 03, 250

Patentee before: Guangzhou Heng Electrical Technology Co., Ltd.