CN108600171A - A kind of cloud data certainty delet method for supporting fine granularity to access - Google Patents

A kind of cloud data certainty delet method for supporting fine granularity to access Download PDF

Info

Publication number
CN108600171A
CN108600171A CN201810241812.3A CN201810241812A CN108600171A CN 108600171 A CN108600171 A CN 108600171A CN 201810241812 A CN201810241812 A CN 201810241812A CN 108600171 A CN108600171 A CN 108600171A
Authority
CN
China
Prior art keywords
data
cloud
ciphertext
attribute
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810241812.3A
Other languages
Chinese (zh)
Other versions
CN108600171B (en
Inventor
禹勇
苏西洛·威利
张凌越
薛靓
李艳楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Normal University
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201810241812.3A priority Critical patent/CN108600171B/en
Publication of CN108600171A publication Critical patent/CN108600171A/en
Application granted granted Critical
Publication of CN108600171B publication Critical patent/CN108600171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of cloud data certainty delet methods for supporting fine granularity to access, and include the following steps:Data are encrypted in data owner, and encryption data is contracted out to Cloud Server so that the user for only meeting visiting demand just can be with ciphertext data;When data owner, which wants to delete, stores the data in Cloud Server, it sends removal request and gives trusted authority center first, the center returns to a deletion key, i.e. re-encrypted private key is to data owner, data owner will delete key and be sent to Cloud Server, and Cloud Server carries out delete operation to data.After executing delete operation, Cloud Server, which returns to one, proves that, to data owner, data owner verifies whether target data has been deleted by Merkle Hash trees.The present invention realizes the data that can verify that using attribute revocation and Merkle Hash trees and deletes, while supporting fine-grained access control, achievees the purpose that secret protection, substantially increases the utilization rate of Cloud Server.

Description

Cloud data deterministic deletion method supporting fine-grained access
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a cloud data deterministic deletion method supporting fine-grained access.
Background
Cloud computing is used as a new computing mode, so that data storage and data sharing are more convenient and more economical. The system can integrate a large number of high-quality resources, integrates different resources to provide mass storage and efficient and rapid computing service for users, and users can access shared resources anytime and anywhere, thereby greatly saving the user cost and improving the resource utilization rate. More and more users like to store data on the cloud, which contains a large amount of sensitive data such as health data, financial data, trade secrets, etc., making data privacy and other security issues a focus of public concern.
Due to the separation of ownership and administrative rights of cloud data using cloud computing technology, users lose physical control over cloud data, which leads to security issues such as data leakage, illegal cross-cloud migration of data, unauthorized access, and the like. Therefore, the data needs to be encrypted before being outsourced to the cloud server, and the requirement that the data can be accessed with fine granularity is met. In addition, when the user issues a delete instruction to the cloud server, the cloud server may maliciously retain the file. Sometimes, even if the data is deleted, certain traces may exist, some cloud computing manufacturers may restore the data, and once the cloud server obtains the data key through some illegal way or the server side obtains a stronger decryption capability, the data may be exposed to a risk of being leaked. For example, the security company Carbon Black reports a serious vulnerability of its software products, from which thousands of sensitive files are compromised. Therefore, there is a need to ensure that data stored on the server side is deleted deterministically by technical means.
The purpose of deterministic deletion of data is to clear data from the storage medium so that the data is unrecoverable, preventing an adversary from still having access to the data after it has been deleted. If the storage medium does not need to be reused, physical destruction methods such as incineration and shredding may be employed. However, secure deletion does not delete all stored data at once. In general, not all data of the system need to be deleted, and the deletion of some data cannot affect the normal operation of the system. In particular, when data is stored in the cloud server, some data needs to be deleted according to the user's request.
Currently, most file systems allow users to "delete" their files. Users believe that when they delete data, the data will become unrecoverable. However, because the data is stored in the cloud server, the deleted data may be only a certain link or index data, and is not the entire file of the bottom layer, and the deleted data can still be recovered through a related technology of data recovery, and deterministic deletion of the data cannot be achieved.
In cloud computing, a deletion method based on cryptography is to encrypt data before storage and convert the deleted data into a deletion corresponding key. Therefore, even if the cloud server retains the ciphertext, the data of the user cannot be restored. In 2005, Perlman first proposed a time-based deterministic deletion method for files, in which data could be safely deleted and would never be accessible after a predetermined time. However, the key management of the above system is too simple and does not consider that different files should have different access control policies, and thus fine-grained secure access to the files cannot be realized. On the basis, Tang and the like expand and extend the scheme, and a policy-based file deterministic deletion (FADE) scheme is provided based on the existing cloud computing infrastructure, wherein a system model of the scheme comprises 3 entities which are a data owner, a trusted key manager and a cloud storage server respectively. The FADE system uses a trusted third party server to centrally manage the distribution keys. The FADE scheme enhances the security of the system by utilizing blind encryption and blind decryption technologies while realizing an access control strategy. The main limitations of FADE are that its deletion strategy is limited to one or two-level boolean expressions, cannot achieve diversified fine-grained deterministic deletions, and requires the use of complex public key cryptosystems.
Geambasu et al put forward a novel data self-destruction scheme for the first time, and realized the Vanish prototype system, he put forward a data trusted deletion mechanism based on DHT network: the user encrypts the data before sending the mail, then divides the encryption key into n shares and stores the n shares in the DHT network, the receiver of the mail can normally decrypt the key only by taking k shares, and all the keys are automatically deleted after a specified time, so that anyone can not recover the data plaintext after a certain time. However, in the scheme of implementing data secure deletion based on the DHT network, the life cycle of data is still limited by the update cycle of the DHT node. Wang et al improve the Vanish scheme, and propose an electronic data self-destruction scheme, on the basis of Vanish, SSDD transforms the ciphertext, extracts partial ciphertext information and secret keys, shares the ciphertext information and the secret keys together, generates a secret key component and distributes the secret key component to a DHT network, thereby effectively resisting the cryptoanalysis attack and brute force attack to the cloud.
Mo et al propose a fine-grained deterministic deletion scheme in which a key modulation function of a collision-resistant hash function is designed. The scheme mainly comprises deleting a modulation tree, a modulation hash chain and a modulator adjustment algorithm. All data keys are derived from the master key, which is changed when any data key is deleted to ensure that k is not recoverable in the future, while the corresponding files for the other keys remain unchanged by running the modulator adaptation algorithm.
Karvelas and Kiayias propose a secure delete protocol with the bounded storage advantage of low-cost embedded devices. Through the update of the security code, it can safely clear all content on the device and download the new security code. In 2014, Ateniese proposed a secure deletion method, and the verifier needed to be sure that the remote device has consumed all of its memory to perform a computation. In this way, the verifier can confirm that the contents of the remote embedded device have been successfully deleted. However, the method only aims at the embedded device with limited memory space, and cannot be directly applied to the cloud storage environment.
In a cloud storage environment, although many schemes have been proposed to ensure that a user deletes data stored in the cloud deterministically, there are different levels of security issues. The key centralized management solution proposed by Perlman, Tang, etc. performs secure deletion of a data encryption key by repeatedly overwriting unrecoverable data, but fails to achieve deterministic deletion of diversified fine granularity, and has certain limitations; geambasu, wang proposed a variety of distributed deterministic deletion solutions, however, the DHT network relied on by the Vanish system is vulnerable to Sybil attacks, and if an adversary can capture enough key components before data expiration to recover the original key, the solution still has security holes. The scheme provided by Atenise is suitable for embedded equipment and cannot be applied to a cloud storage environment.
For deterministic deletion of data in a cloud storage environment, user data is considered to be deleted deterministically from the system if an adversary given some system access behavior cannot recover the deleted data from the system within the polynomial time. The scheme realizes the first-layer meaning of deterministic deletion, namely the data ciphertext is unreadable, the safe deletion of user data is realized, the aim of not revealing sensitive information is achieved, a deletion certificate cannot be returned to a data owner after the data is deleted to confirm that the data is safely deleted, and the credible guarantee is provided for the data privacy safety.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a cloud data deterministic deletion method supporting fine-grained access, and provides a key strategy based on attribute encryption method with an attribute revocation function to realize deterministic deletion of cloud data aiming at the safety problems of data leakage, illegal cross-cloud migration of data, unauthorized access and the like possibly existing in cloud storage and the problem that data requested to be deleted by a user is difficult to verify in a cloud storage environment is really deleted. Therefore, the attribute set corresponding to the ciphertext is changed through re-encryption, so that the attribute set cannot meet the access structure of private keys of all users to realize safe data deletion, and whether the data is deleted or not can be verified by constructing a Merkle hash tree. If the evidence returned by the cloud server is valid evidence, the deleted data in the cloud server is guaranteed to be unrecoverable, and malicious users are prevented from obtaining the access right of the data after deletion, so that the privacy of the cloud users is protected. According to the method, key updating is not needed, and only the cloud server is needed to update part of the ciphertext, so that the computing complexity of the cloud user is reduced. Therefore, the achievement of the invention has important theoretical significance and practical value for promoting the sustainable development of cloud computing. The technical problem to be solved by the invention is realized by the following technical scheme: a cloud data deterministic deletion method supporting fine-grained access comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
s200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to a trusted authority center, and the trusted authority center generates an intermediate private key SK according to the system public parameters, the access structure W of the cloud user and the random number rWand then the cloud user selects a pair of signature keys { spk, ssk } and a random number alpha, and the private key of the cloud user is SK ═ (SK)W,ssk,α);
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
s301, data encryption and storage: the data owner selects a group of attribute set gamma and random number s for the data M to be uploaded, encrypts the data M and obtains a ciphertext CT (C)1,C2,C3) Then with C3Each element in the Merkle hash tree is used as a leaf node to construct a Merkle hash tree, and the root node R of the Merkle hash tree is signed by using the signature key ssk to obtain the sigssk(R);
Wherein, the attribute set gamma includes the attribute of accessibility, and the attribute value is accessible;
step S302, uploading data to a cloud server by a data owner: the data owner selects an identifier fname for the data M to be uploaded, and then sets ind to be the ciphertext corresponding to the accessibility attributeSetting AAI as ciphertext corresponding to accessibility attribute at position in Merkle hash treeIn the Merkle hash tree, the data owner calculates a label value sigma for the data M to be uploaded, and finally uploads { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
step S400, accessing data in the cloud server by the cloud user:
different cloud users request to access data in a cloud server and obtain the ciphertext CT, and if the attribute corresponding to the ciphertext CT meets the access structure of the private key SK of the cloud user, the cloud user decrypts the ciphertext CT to access;
step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
step S501, the data owner sends a deletion request DR to the trusted authority center, and the trusted authority center returns a deletion key rk to the data owner.
S502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attributeCorresponding information is given to the data owner, and the data owner verifiesAnd ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S503, the cloud server changes the attribute value contained in the data ciphertext CT to be deleted through re-encrypting the part of the data ciphertext CT to be deleted so as to delete the data, and then recalculates the root node of the new Merkle hash treeWill be provided withAs a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
Further, the specific steps of step S100 are:
step S101: selecting a security parameter k, and selecting two multiplication circulation groups G with prime number p as an order by a credible authority center1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={υi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is the Hash function of collision resistance, H: {0,1}*→Zp,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the public parameterNumber Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parametersGenerating a system public keyAnd a master key
Step S103: trusted authority center publishing system parameters
Further, the specific step of the step S200 is that the cloud user proposes a private key application to the trusted authority center, and the trusted authority center selects a random number r e to ZpG is calculated according to the system parameters, the access structure W of the user and the random number rrAndreturning the intermediate private Key SKW=(gr,DwW) to the cloud user, the cloud user generating a pair of signature keys { spk, ssk }, and selecting a random number α ← Z }pCalculating attribute v-gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
Further, the specific steps of step S301 are: the data owner selects a set of attribute sets gamma and a random number s e Z for the data M to be uploadedPCalculating C1=M·Ys,C2=gsThe ciphertext CT of the data M to be uploaded is (C)1,C2,C3) (ii) a Simultaneous data owner builds Merkle hash tree, its leavesThe child node is a hash value H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
Further, the specific steps of step S302 are: the data owner selects an identifier fname for the data M to be uploaded and calculates a tag value for the data M to be uploadedUploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI representsAnd auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
Further, the specific steps of step S400 are:
different cloud users request to access data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute setAS ═ W; using the private key SK to perform calculations if
The cloud user decrypts the ciphertext CT for access.
Further, the specific steps of step S501 are: data owner sending to trusted authority centerDelete request DR ═ (fname, att)i,vi,j,v′i,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jDenotes accessible, v'i,jIndicating inaccessibility, DR ═ f name, atti,vi,j,v′i,j) Representing the change of the accessibility attribute in the ciphertext from accessible to inaccessible, the trusted authority center selects a random number t'i,jAnd calculateThe deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner.
Further, the specific steps of step S502 are:
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tupleΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verificationWhether or not, if so, thenThe ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according toAnd ΩindGenerating new root node of Merkle Hash treeVerification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs thatValid auxiliary authentication information AAI.
Further, the specific steps of step S503 are:
step S503-1: the cloud server according to the delete request DR ═ (fname, att)i,vi,j,v′i,j) Finding the data ciphertext CT to be deleted, the accessibility attribute attiE.g. rk, cloud server computingBy usingIn place of the data ciphertext CT that needs to be deleted
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C′3γ'). Gamma' is set as an attribute set corresponding to the ciphertext after the re-encryption;
step S503-3 cloud server computingGenerating a new root node of a Merkle hash treeWill be provided withAs a deletion proof back to the data owner.
Further, the specific steps of step S504 are: data owner re-encrypts using the deletion key rkTo obtainThe data owner receives the new root nodeAccording toAnd Ω received from the cloud serverindGenerating new root nodes for Merkle hash treesNew root nodeA root node sent from the cloud serverMake a comparison ifThe cloud server confirms that the data has been deleted.
Compared with the prior art, the invention has the beneficial effects that:
(1) fine-grained access: files stored in the cloud server support fine-grained access control, and data owners can determine who can access and decrypt the data before uploading the data. The data owner can correspond the ciphertext to an attribute set, and when the attribute set meets the access structure of the private key of the cloud user, the cloud user can correctly decrypt the data.
(2) Verifiable data deletion: the invention realizes the deterministic deletion of cloud data. The attribute set corresponding to the ciphertext is changed by enabling the cloud server to re-encrypt part of the ciphertext, so that the ciphertext does not meet the access structures of all users any more, and data cannot be accessed. In addition, a data owner can verify whether the data in the cloud server is deleted or not by reconstructing the Merkle hash tree, so that the data of a user can not be leaked, the data privacy of the cloud user is protected, and the safety of the system is improved.
(3) The calculation cost is low: the invention does not need the user to update the ciphertext and does not need the credible authority to manage and delete the key. Only the cloud server needs to update part of the ciphertext, the cost of the user verification process is low, the system is simple to implement, and the efficiency of data deterministic deletion is improved.
Drawings
FIG. 1 is a schematic diagram of a data storage and deterministic deletion process in accordance with an embodiment of the present invention;
FIG. 2 is a diagram of a verifiable deterministic deletion process in accordance with an embodiment of the present invention.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
The invention provides an attribute-based cloud data deterministic deletion method of a key strategy based on the public key cryptography theory, which simultaneously supports fine-grained access control and is applied to a cloud storage environment with higher security requirements. The data is encrypted before being outsourced to the cloud, the special attribute of 'accessibility' is introduced into the ciphertext attribute set, the value of the special attribute in the ciphertext is changed through re-encryption, the ciphertext does not meet the access structures of all users any more, and data deletion is achieved. The data owner generates a root of the MHT by constructing the MHT, uploads a ciphertext and a signature of the root to the cloud server, when the ciphertext is re-encrypted, the new root of the MHT can be regarded as an evidence for deletion, and the data owner can verify the evidence to realize verifiable data certainty deletion. Any information of user data cannot be revealed in the whole process, so that the method and the system have a promoting effect on the development of cloud computing and have a plurality of theoretical meanings and practical meanings.
Firstly, the applied cryptology theory of the invention is briefly introduced:
(1) bilinear pairings
Let G1,G2Two multiplicative cyclic groups of order p, and G is the generator of group G. If mapping e to G1×G1→G2if the following three conditions are satisfied, it is called bilinear mapping1,h2∈G1,e(h1,h2) can be efficiently calculated.bilinear, for any h1,h2∈G1,a,b∈Zp,(iii) non-degradability, for G1The generator g in (1) satisfies
(2) Attribute-based encryption (ABE)
In an attribute-based encryption scheme, attributes are used to generate keys and construct access policies. Attribute-based encryption can be roughly divided into attribute-based encryption of a key policy and attribute-based encryption of a ciphertext policy. In an attribute-based encryption scheme (KP-ABE) of a key policy, the access structure is contained in the user's private key, while the ciphertext corresponds to a set of attributes. In ciphertext policy attribute-based encryption (CP-ABE), the access policy is built into the ciphertext, and the user's private key corresponds to the attribute the user possesses. The attribute-based encryption scheme of the key strategy consists of four polynomial time algorithms as follows:
setup (k) the algorithm inputs security parameters k, outputs a system public key PK and a master key MSK.
KeyGen(PK,MSK,AU-KP) The algorithm input accesses structure AU-KPAnd outputting the user private key D.
Encrypt(PK,M,ACT) The algorithm inputs a message M, a set of attributes aCTAnd outputting the ciphertext C of the M.
Decrypt (C, D). the algorithm inputs a user private key D and a ciphertext C, and if the ciphertext C meets the access structure of the private key, the user can Decrypt the ciphertext C and output M.
(3) Merkle Hash Tree
The Merkle Hash Tree (MHT) is a widely used authentication structure that can efficiently check whether elements are stored perfectly. MHT is a binary tree in which leaf nodes store hash values of authentication data, and each internal node as well as the root node is generated by its two children. The values of the internal node as well as the root node are the hash values of its two child nodes. Element aiIs aiSiblings of all nodes on the path to the root node, and thus can be according to aiAnd aiThe root node is calculated by the auxiliary authentication information.
Referring to fig. 1, the present invention is embodied as follows:
a cloud data deterministic deletion method supporting fine-grained access comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
step S101: selecting a security parameter k, and selecting two multiplication circulation groups G with prime number p as an order by a credible authority center1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={υi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is a Hash function of collision resistance, H: {0,1}*→Zq,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the common parameter Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parametersGenerating a system public keyAnd a master key
Step S103: trusted authority center publishing system parameters
S200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to a trusted authority center, and the trusted authority center generates an intermediate private key SK according to system public parameters, an access structure W of the cloud user and a random number rWreturning to the cloud user, and then selecting a pair of signature keys { spk, ssk } and a random number α by the cloud user, wherein the private key of the cloud user is SK (SK)W,ssk,α);
The cloud user puts forward a private key application to a trusted authority center, and the trusted authority center selects a random number r E to ZpAnd calculating a parameter g according to the system parameter, the access structure W of the user and the random number rrAndreturning the intermediate private Key SKW=(gr,DwAnd W) to the cloud user,
the cloud user generates a pair of signature keys { spk, ssk }, and selects a random number α ← Z }pCalculating the attribute v ═ gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
step S301. the data owner selects a random number s belonging to Z and a group of attribute sets gamma for the data M to be uploadedPCalculating C1=M·Ys,C2=gsThe ciphertext CT of the data M to be uploaded is (C)1,C2,C3) Wherein the attribute set gamma contains the attribute of accessibility; xi,jIs the third part of the ciphertext, which is related to the specific attributes in the attribute set, and is also the leaf node for constructing the MHT.Meanwhile, the data owner constructs a Merkle hash tree, and leaf nodes of the Merkle hash tree are hash values H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
Step S302, a data owner selects an identifier fname for data M to be uploaded, and calculates a tag value for the data M to be uploadedUploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI representsAnd auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
Step S400, accessing data in the cloud server by the cloud user:
if the attribute corresponding to the ciphertext meets the access structure of the private key held by the user, the user can decrypt the data in the cloud server, different cloud users request to access the data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute setAS ═ W; using the private key SK to perform calculations if
The cloud user decrypts the ciphertext CT for access.
Step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
when a data owner wants to delete data in a cloud server, the data owner first sends a deletion request to a trusted authority center. The trusted authority center returns a deletion key, i.e., a re-encryption key, to the data owner. The data owner sends the deletion key to the cloud server. After the deletion operation is performed, the cloud server will return a deletion certificate to the data owner, verifying that the data has been deleted. Referring to fig. 2, the process is specifically implemented as follows:
step S501, the data owner sends a deletion request DR ═ f name, att to the trusted authority centeri,vi,j,v′i,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jDenotes accessible, v'i,jIndicating inaccessibility, DR ═ (fname, atti, v)i,j,v′i,j) Showing that the accessibility attribute in the ciphertext is changed from accessible to inaccessible, and the trusted authority center selects a random number t'i,jAnd calculateThe deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner. Accessibility has two attribute values, accessible and inaccessible.
S502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attributeCorresponding information is given to the data owner, and the data owner verifiesAnd ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tupleΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verificationWhether or not, if so, thenThe ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according toAnd ΩindGenerating new root node of Merkle Hash treeVerification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs thatValid auxiliary authentication information AAI.
And S503, the cloud server changes the attribute value contained in the ciphertext to delete the data by re-encrypting part of the ciphertext, so that the ciphertext does not meet the access structures of all users any more, and then generates a deletion certificate and returns the deletion certificate to the data owner. The specific steps of data deletion are as follows:
step S503-1: the cloud server according to the delete request DR ═ (fname, att)i,vi,j,v′i,j) The fname in the data search table corresponds to the data ciphertext CT to be deleted and can be accessedProperty attribute attiE.g. rk, cloud server computingBy usingIn place of the data ciphertext CT that needs to be deleted
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C′3γ'). Gamma' is set as an attribute set corresponding to the ciphertext after the re-encryption;
step S503-3 cloud server computingGenerating a new root node of a Merkle hash treeWill be provided withAs a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
Data owner re-encrypts using the deletion key rkTo obtainThe data owner receives the new root nodeAccording toAnd Ω received from the cloud serverindGenerating new root nodes for Merkle hash treesNew root nodeA root node sent from the cloud serverMake a comparison ifThe cloud server confirms that the data has been deleted.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. A cloud data deterministic deletion method supporting fine-grained access is characterized by comprising the following steps: comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
s200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to a trusted authority center, and the trusted authority center generates an intermediate private key SK according to the system public parameters, the access structure W of the cloud user and the random number rWReturn toand then, the cloud user selects a pair of signature keys { spk, ssk } and a random number alpha, wherein the private key of the cloud user is SK ═ SKW,ssk,α);
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
s301, data encryption and storage: the data owner selects a group of attribute set gamma and random number s for the data M to be uploaded, encrypts the data M and obtains a ciphertext CT (C)1,C2,C3) Then with C3Each element in the Merkle hash tree is used as a leaf node to construct a Merkle hash tree, and the root node R of the Merkle hash tree is signed by using the signature key ssk to obtain the sigssk(R);
Wherein, the attribute set gamma includes the attribute of accessibility, and the attribute value is accessible;
step S302, uploading data to a cloud server by a data owner: the data owner selects an identifier fname for the data M to be uploaded, and then sets ind to be the ciphertext corresponding to the accessibility attributeSetting AAI as ciphertext corresponding to accessibility attribute at position in Merkle hash treeIn the Merkle hash tree, the data owner calculates a label value sigma for the data M to be uploaded, and finally uploads { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
step S400, accessing data in the cloud server by the cloud user:
different cloud users request to access data in a cloud server and obtain the ciphertext CT, and if the attribute corresponding to the ciphertext CT meets the access structure of the private key SK of the cloud user, the cloud user decrypts the ciphertext CT to access;
step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
step S501, the data owner sends a deletion request DR to the trusted authority center, and the trusted authority center returns a deletion key rk to the data owner.
S502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attributeCorresponding information is given to the data owner, and the data owner verifiesAnd ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S503, the cloud server changes the attribute value contained in the data ciphertext CT to be deleted through re-encrypting the part of the data ciphertext CT to be deleted so as to delete the data, and then recalculates the root node of the new Merkle hash treeWill be provided withAs a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
2. The cloud data deterministic deletion method supporting fine-grained access according to claim 1, characterized in that: the specific steps of step S100 are:
step S101: selecting a security parameter k, and selecting two multiplication circulation groups G with prime number p as an order by a credible authority center1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={υi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is the Hash function of collision resistance, H: {0,1}*→Zp,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the common parameter Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parametersGenerating a system public keyAnd a master key
Step S103: trusted authority center publishing system parameters
3. The cloud data deterministic deletion method supporting fine-grained access according to claim 2, characterized in that: the specific step of the step S200 is that the cloud user provides a private key application to the trusted authority center, and the trusted authority center selects a random number r E to ZpAccording to the system parameters, the access structure W of the user and the random numberr calculating grAndreturning the intermediate private Key SKW=(gr,DwW) to the cloud user, the cloud user generating a pair of signature keys { spk, ssk }, and selecting a random number α ← Z }pCalculating attribute v-gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
4. The cloud data deterministic deletion method supporting fine-grained access according to claim 3, characterized in that: the specific steps of step S301 are: the data owner selects a set of attribute sets gamma and a random number s e Z for the data M to be uploadedPCalculating C1=M·Ys,C2=gsThe ciphertext CT of the data M to be uploaded is (C)1,C2,C3) (ii) a Meanwhile, the data owner constructs a Merkle hash tree, and leaf nodes of the Merkle hash tree are hash values H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
5. The cloud data deterministic deletion method supporting fine-grained access according to claim 4, characterized in that: the specific steps of step S302 are: the data owner selects an identifier fname for the data M to be uploaded and calculates a tag value for the data M to be uploadedUploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI representsAnd auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
6. The method for cloud data deterministic deletion supporting fine-grained access according to claim 5, wherein: the specific steps of step S400 are:
different cloud users request to access data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute setAS ═ W; using the private key SK to perform calculations if
The cloud user decrypts the ciphertext CT for access.
7. The method for cloud data deterministic deletion supporting fine-grained access according to claim 6, characterized in that: the specific steps of step S501 are: the data owner sends a delete request DR ═ (fname, att) to the trusted authority centeri,vi,j,vi,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jRepresentation accessible, vi,jIndicating inaccessibility, DR ═ f name, atti,vi,j,vi,j) Indicating that the accessibility attribute in the ciphertext is changed from accessible to inaccessible, the trusted authority center selects a random number ti,jAnd calculateThe deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner.
8. The method for cloud data deterministic deletion supporting fine-grained access according to claim 7, characterized in that: the specific steps of step S502 are:
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tupleΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verificationWhether or not, if so, thenThe ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according toAnd ΩindGenerating new root node of Merkle Hash treeVerification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs thatValid auxiliary authentication information AAI.
9. The method for cloud data deterministic deletion supporting fine-grained access according to claim 8, characterized in that: the specific steps of step S503 are:
step S503-1: the cloud server requests DR ═ (fname, atti, v) according to the deletioni,j,vi,j) Finding the data ciphertext CT to be deleted, the accessibility attribute attiE.g. rk, cloud server computingBy usingIn place of the data ciphertext CT that needs to be deleted
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C3', γ'). Gamma' is set as an attribute set corresponding to the ciphertext after the re-encryption;
step S503-3 cloud server computingGenerating a new root node of a Merkle hash treeWill be provided withAs a deletion proof back to the data owner.
10. The method for cloud data deterministic deletion supporting fine-grained access according to claim 9, characterized in that: the specific steps of step S504 are: data owner re-encrypts using the deletion key rkTo obtainThe data owner receives the new root nodeAccording toAnd Ω received from the cloud serverindGenerating new root nodes for Merkle hash treesNew root nodeRoot node sent by the cloud serverMake a comparison ifThe cloud server confirms that the data has been deleted.
CN201810241812.3A 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access Active CN108600171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810241812.3A CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810241812.3A CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Publications (2)

Publication Number Publication Date
CN108600171A true CN108600171A (en) 2018-09-28
CN108600171B CN108600171B (en) 2021-01-19

Family

ID=63627117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810241812.3A Active CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Country Status (1)

Country Link
CN (1) CN108600171B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347833A (en) * 2018-10-24 2019-02-15 中国科学院信息工程研究所 The access control method and system being used under machine learning environment based on encryption attribute
CN109981288A (en) * 2019-03-26 2019-07-05 中国人民大学 A kind of quick external method of proof of the fine granularity cloud server terminal based on aggregate signature
CN110868288A (en) * 2019-11-08 2020-03-06 中国人民解放军国防科技大学 Strategy-based outsourced data fine-grained credible deletion method in cloud storage environment
CN111596862A (en) * 2020-05-20 2020-08-28 南京如般量子科技有限公司 Independent optimization method and system for block chain historical transaction data
CN111737708A (en) * 2020-05-26 2020-10-02 桂林电子科技大学 Verifiable deletion method and system supporting efficient update of outsourced data
CN111832073A (en) * 2020-07-05 2020-10-27 桂林电子科技大学 Deterministic deletion method supporting dynamic insertion of outsourcing data in cloud environment
CN112612426A (en) * 2020-12-30 2021-04-06 海尔数字科技(青岛)有限公司 Method and device for deleting data, electronic equipment and storage medium
CN113704830A (en) * 2021-07-26 2021-11-26 王旭 Intelligent website data tamper-proof system and method
CN114157421A (en) * 2021-11-30 2022-03-08 福建师范大学 Encryption system and method for ensuring data deletion of multiple authorization centers based on attributes
CN114287001A (en) * 2019-08-26 2022-04-05 皇家飞利浦有限公司 Restricted full privacy conjunctive database queries for protecting user privacy and identity
CN114629661A (en) * 2022-04-27 2022-06-14 中国科学技术大学 Encrypted information processing method and device
CN116992494A (en) * 2023-09-27 2023-11-03 四川启明芯智能科技有限公司 Security protection method, equipment and medium for scenic spot data circulation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN105592100A (en) * 2016-01-26 2016-05-18 西安电子科技大学 Government services cloud access control method based on attribute encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN105592100A (en) * 2016-01-26 2016-05-18 西安电子科技大学 Government services cloud access control method based on attribute encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LICHAOLING: ""A Data Assured Deletion Scheme in Cloud Storage"", 《IEEE》 *
熊金波: ""基于密码学的云数据确定性删除研究进展"", 《通信学报》 *
王丽娜: ""一种适于云存储的数据确定性删除方法"", 《电子学报》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347833A (en) * 2018-10-24 2019-02-15 中国科学院信息工程研究所 The access control method and system being used under machine learning environment based on encryption attribute
CN109981288A (en) * 2019-03-26 2019-07-05 中国人民大学 A kind of quick external method of proof of the fine granularity cloud server terminal based on aggregate signature
CN109981288B (en) * 2019-03-26 2021-11-09 中国人民大学 Fine-grained cloud server side rapid external certification method based on aggregated signature
CN114287001A (en) * 2019-08-26 2022-04-05 皇家飞利浦有限公司 Restricted full privacy conjunctive database queries for protecting user privacy and identity
CN110868288A (en) * 2019-11-08 2020-03-06 中国人民解放军国防科技大学 Strategy-based outsourced data fine-grained credible deletion method in cloud storage environment
CN110868288B (en) * 2019-11-08 2022-05-20 中国人民解放军国防科技大学 Strategy-based outsourced data fine-grained credible deletion method in cloud storage environment
CN111596862A (en) * 2020-05-20 2020-08-28 南京如般量子科技有限公司 Independent optimization method and system for block chain historical transaction data
CN111596862B (en) * 2020-05-20 2022-11-01 南京如般量子科技有限公司 Independent optimization method and system for block chain historical transaction data
CN111737708A (en) * 2020-05-26 2020-10-02 桂林电子科技大学 Verifiable deletion method and system supporting efficient update of outsourced data
CN111737708B (en) * 2020-05-26 2024-01-12 桂林电子科技大学 Verifiable deleting method and system supporting efficient update of outsourced data
CN111832073A (en) * 2020-07-05 2020-10-27 桂林电子科技大学 Deterministic deletion method supporting dynamic insertion of outsourcing data in cloud environment
CN111832073B (en) * 2020-07-05 2023-07-18 桂林电子科技大学 Deterministic deleting method for supporting dynamic insertion of outsourced data in cloud environment
CN112612426A (en) * 2020-12-30 2021-04-06 海尔数字科技(青岛)有限公司 Method and device for deleting data, electronic equipment and storage medium
CN113704830A (en) * 2021-07-26 2021-11-26 王旭 Intelligent website data tamper-proof system and method
CN113704830B (en) * 2021-07-26 2023-08-29 山东赛宝电子信息工程有限责任公司 Intelligent website data tamper-proof system and method
CN114157421A (en) * 2021-11-30 2022-03-08 福建师范大学 Encryption system and method for ensuring data deletion of multiple authorization centers based on attributes
CN114157421B (en) * 2021-11-30 2023-06-09 福建师范大学 Encryption system and method for ensuring data deletion based on attributes of multiple authorization centers
CN114629661A (en) * 2022-04-27 2022-06-14 中国科学技术大学 Encrypted information processing method and device
CN114629661B (en) * 2022-04-27 2024-02-23 中国科学技术大学 Encryption information processing method and device
CN116992494A (en) * 2023-09-27 2023-11-03 四川启明芯智能科技有限公司 Security protection method, equipment and medium for scenic spot data circulation
CN116992494B (en) * 2023-09-27 2023-12-08 四川启明芯智能科技有限公司 Security protection method, equipment and medium for scenic spot data circulation

Also Published As

Publication number Publication date
CN108600171B (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN108600171B (en) Cloud data deterministic deletion method supporting fine-grained access
CN108881314B (en) Privacy protection method and system based on CP-ABE ciphertext under fog computing environment
CN114039790B (en) Fine-grained cloud storage security access control method based on blockchain
WO2018045568A1 (en) Access control method oriented to cloud storage service platform and system thereof
WO2016197770A1 (en) Access control system and access control method thereof for cloud storage service platform
CN104168108B (en) It is a kind of to reveal the traceable attribute base mixed encryption method of key
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN108111540B (en) Hierarchical access control system and method supporting data sharing in cloud storage
CN107086911B (en) CCA (clear channel assessment) safe proxy re-encryption method capable of delegating verification
Saroj et al. Threshold cryptography based data security in cloud computing
CN111614680B (en) CP-ABE-based traceable cloud storage access control method and system
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
Tiwari et al. SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation
CN104901968A (en) Method for managing and distributing secret keys in secure cloud storage system
Imine et al. Revocable attribute-based access control in mutli-autority systems
Chaudhary et al. RMA-CPABE: A multi-authority CPABE scheme with reduced ciphertext size for IoT devices
Koe et al. Offline privacy preserving proxy re-encryption in mobile cloud computing
CN115426136A (en) Cross-domain access control method and system based on block chain
Sammy et al. An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP‐ABE Using ECC Scheme for Patient Health Record
Guo et al. Attribute-based data sharing scheme using blockchain for 6g-enabled vanets
Shen et al. Trust Mechanism Privacy Protection Scheme Combining Blockchain and Multi-Party Evaluation
Fan et al. Secure and private key management scheme in big data networking
CN117200966A (en) Trusted authorization data sharing method based on distributed identity and alliance chain
Di et al. A Novel Identity‐Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks
CN110225041B (en) Data management method, system and related components

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant