CN108600171B - Cloud data deterministic deletion method supporting fine-grained access - Google Patents

Cloud data deterministic deletion method supporting fine-grained access Download PDF

Info

Publication number
CN108600171B
CN108600171B CN201810241812.3A CN201810241812A CN108600171B CN 108600171 B CN108600171 B CN 108600171B CN 201810241812 A CN201810241812 A CN 201810241812A CN 108600171 B CN108600171 B CN 108600171B
Authority
CN
China
Prior art keywords
data
cloud
attribute
ciphertext
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810241812.3A
Other languages
Chinese (zh)
Other versions
CN108600171A (en
Inventor
禹勇
苏西洛·威利
张凌越
薛靓
李艳楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Normal University
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201810241812.3A priority Critical patent/CN108600171B/en
Publication of CN108600171A publication Critical patent/CN108600171A/en
Application granted granted Critical
Publication of CN108600171B publication Critical patent/CN108600171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a cloud data deterministic deletion method supporting fine-grained access, which comprises the following steps: the data owner encrypts the data and outsources the encrypted data to the cloud server, so that only users meeting the access requirements can decrypt the data; when a data owner wants to delete data stored in the cloud server, the data owner firstly sends a deletion request to the trusted authority center, the center returns a deletion key, namely a re-encryption key to the data owner, the data owner sends the deletion key to the cloud server, and the cloud server deletes the data. After the deletion operation is performed, the cloud server returns a certificate to the data owner, and the data owner verifies whether the target data is deleted through the Merkle hash tree. The invention realizes verifiable data deletion by using the attribute revocation and the Merkle hash tree, supports fine-grained access control, achieves the purpose of privacy protection, and greatly improves the utilization rate of the cloud server.

Description

Cloud data deterministic deletion method supporting fine-grained access
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a cloud data deterministic deletion method supporting fine-grained access.
Background
Cloud computing is used as a new computing mode, so that data storage and data sharing are more convenient and more economical. The system can integrate a large number of high-quality resources, integrates different resources to provide mass storage and efficient and rapid computing service for users, and users can access shared resources anytime and anywhere, thereby greatly saving the user cost and improving the resource utilization rate. More and more users like to store data on the cloud, which contains a large amount of sensitive data such as health data, financial data, trade secrets, etc., making data privacy and other security issues a focus of public concern.
Due to the separation of ownership and administrative rights of cloud data using cloud computing technology, users lose physical control over cloud data, which leads to security issues such as data leakage, illegal cross-cloud migration of data, unauthorized access, and the like. Therefore, the data needs to be encrypted before being outsourced to the cloud server, and the requirement that the data can be accessed with fine granularity is met. In addition, when the user issues a delete instruction to the cloud server, the cloud server may maliciously retain the file. Sometimes, even if the data is deleted, certain traces may exist, some cloud computing manufacturers may restore the data, and once the cloud server obtains the data key through some illegal way or the server side obtains a stronger decryption capability, the data may be exposed to a risk of being leaked. For example, the security company Carbon Black reports a serious vulnerability of its software products, from which thousands of sensitive files are compromised. Therefore, there is a need to ensure that data stored on the server side is deleted deterministically by technical means.
The purpose of deterministic deletion of data is to clear data from the storage medium so that the data is unrecoverable, preventing an adversary from still having access to the data after it has been deleted. If the storage medium does not need to be reused, physical destruction methods such as incineration and shredding may be employed. However, secure deletion does not delete all stored data at once. In general, not all data of the system need to be deleted, and the deletion of some data cannot affect the normal operation of the system. In particular, when data is stored in the cloud server, some data needs to be deleted according to the user's request.
Currently, most file systems allow users to "delete" their files. Users believe that when they delete data, the data will become unrecoverable. However, because the data is stored in the cloud server, the deleted data may be only a certain link or index data, and is not the entire file of the bottom layer, and the deleted data can still be recovered through a related technology of data recovery, and deterministic deletion of the data cannot be achieved.
In cloud computing, a deletion method based on cryptography is to encrypt data before storage and convert the deleted data into a deletion corresponding key. Therefore, even if the cloud server retains the ciphertext, the data of the user cannot be restored. In 2005, Perlman first proposed a time-based deterministic deletion method for files, in which data could be safely deleted and would never be accessible after a predetermined time. However, the key management of the above system is too simple and does not consider that different files should have different access control policies, and thus fine-grained secure access to the files cannot be realized. On the basis, Tang and the like expand and extend the scheme, and a policy-based file deterministic deletion (FADE) scheme is provided based on the existing cloud computing infrastructure, wherein a system model of the scheme comprises 3 entities which are a data owner, a trusted key manager and a cloud storage server respectively. The FADE system uses a trusted third party server to centrally manage the distribution keys. The FADE scheme enhances the security of the system by utilizing blind encryption and blind decryption technologies while realizing an access control strategy. The main limitations of FADE are that its deletion strategy is limited to one or two-level boolean expressions, cannot achieve diversified fine-grained deterministic deletions, and requires the use of complex public key cryptosystems.
Geambasu et al put forward a novel data self-destruction scheme for the first time, and realized the Vanish prototype system, he put forward a data trusted deletion mechanism based on DHT network: the user encrypts the data before sending the mail, then divides the encryption key into n shares and stores the n shares in the DHT network, the receiver of the mail can normally decrypt the key only by taking k shares, and all the keys are automatically deleted after a specified time, so that anyone can not recover the data plaintext after a certain time. However, in the scheme of implementing data secure deletion based on the DHT network, the life cycle of data is still limited by the update cycle of the DHT node. Wang et al improve the Vanish scheme, and propose an electronic data self-destruction scheme, on the basis of Vanish, SSDD transforms the ciphertext, extracts partial ciphertext information and secret keys, shares the ciphertext information and the secret keys together, generates a secret key component and distributes the secret key component to a DHT network, thereby effectively resisting the cryptoanalysis attack and brute force attack to the cloud.
Mo et al propose a fine-grained deterministic deletion scheme in which a key modulation function of a collision-resistant hash function is designed. The scheme mainly comprises deleting a modulation tree, a modulation hash chain and a modulator adjustment algorithm. All data keys are derived from the master key, which is changed when any data key is deleted to ensure that k is not recoverable in the future, while the corresponding files for the other keys remain unchanged by running the modulator adaptation algorithm.
Karvelas and Kiayias propose a secure delete protocol with the bounded storage advantage of low-cost embedded devices. Through the update of the security code, it can safely clear all content on the device and download the new security code. In 2014, Ateniese proposed a secure deletion method, and the verifier needed to be sure that the remote device has consumed all of its memory to perform a computation. In this way, the verifier can confirm that the contents of the remote embedded device have been successfully deleted. However, the method only aims at the embedded device with limited memory space, and cannot be directly applied to the cloud storage environment.
In a cloud storage environment, although many schemes have been proposed to ensure that a user deletes data stored in the cloud deterministically, there are different levels of security issues. The key centralized management solution proposed by Perlman, Tang, etc. performs secure deletion of a data encryption key by repeatedly overwriting unrecoverable data, but fails to achieve deterministic deletion of diversified fine granularity, and has certain limitations; geambasu, wang proposed a variety of distributed deterministic deletion solutions, however, the DHT network relied on by the Vanish system is vulnerable to Sybil attacks, and if an adversary can capture enough key components before data expiration to recover the original key, the solution still has security holes. The scheme provided by Atenise is suitable for embedded equipment and cannot be applied to a cloud storage environment.
For deterministic deletion of data in a cloud storage environment, user data is considered to be deleted deterministically from the system if an adversary given some system access behavior cannot recover the deleted data from the system within the polynomial time. The scheme realizes the first-layer meaning of deterministic deletion, namely the data ciphertext is unreadable, the safe deletion of user data is realized, the aim of not revealing sensitive information is achieved, a deletion certificate cannot be returned to a data owner after the data is deleted to confirm that the data is safely deleted, and the credible guarantee is provided for the data privacy safety.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a cloud data deterministic deletion method supporting fine-grained access, and provides a key strategy based on attribute encryption method with an attribute revocation function to realize deterministic deletion of cloud data aiming at the safety problems of data leakage, illegal cross-cloud migration of data, unauthorized access and the like possibly existing in cloud storage and the problem that data requested to be deleted by a user is difficult to verify in a cloud storage environment is really deleted. Therefore, the attribute set corresponding to the ciphertext is changed through re-encryption, so that the attribute set cannot meet the access structure of private keys of all users to realize safe data deletion, and whether the data is deleted or not can be verified by constructing a Merkle hash tree. If the evidence returned by the cloud server is valid evidence, the deleted data in the cloud server is guaranteed to be unrecoverable, and malicious users are prevented from obtaining the access right of the data after deletion, so that the privacy of the cloud users is protected. According to the method, key updating is not needed, and only the cloud server is needed to update part of the ciphertext, so that the computing complexity of the cloud user is reduced. Therefore, the achievement of the invention has important theoretical significance and practical value for promoting the sustainable development of cloud computing. The technical problem to be solved by the invention is realized by the following technical scheme: a cloud data deterministic deletion method supporting fine-grained access comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
s200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to a trusted authority center, and the trusted authority center generates an intermediate private key SK according to the system public parameters, the access structure W of the cloud user and the random number rWReturning to the cloud user; the cloud user then selects a pair of signature keys { spk, ssk } and a random number α, the cloud user's private key being SK ═ (SK ═ forW,ssk,α);
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
s301, data encryption and storage: the data owner selects a group of attribute set gamma and random number s for the data M to be uploaded, encrypts the data M and obtains a ciphertext CT (C)1,C2,C3) Then with C3Each element in the Merkle hash tree is used as a leaf node to construct a Merkle hash tree, and the root node R of the Merkle hash tree is signed by using the signature key ssk to obtain the sigssk(R);
Wherein, the attribute set gamma includes the attribute of accessibility, and the attribute value is accessible;
step S302, uploading data to a cloud server by a data owner: the data owner selects an identifier fname for the data M to be uploaded, and then sets ind to be the ciphertext corresponding to the accessibility attribute
Figure BDA0001605434860000044
Setting AAI as ciphertext corresponding to accessibility attribute at position in Merkle hash tree
Figure BDA0001605434860000045
In the Merkle hash tree, the data owner calculates a label value sigma for the data M to be uploaded, and finally uploads { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
step S400, accessing data in the cloud server by the cloud user:
different cloud users request to access data in a cloud server and obtain the ciphertext CT, and if the attribute corresponding to the ciphertext CT meets the access structure of the private key SK of the cloud user, the cloud user decrypts the ciphertext CT to access;
step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
step S501, the data owner sends a deletion request DR to the trusted authority center, and the trusted authority center returns a deletion key rk to the data owner.
S502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attribute
Figure BDA0001605434860000041
Corresponding information is given to the data owner, and the data owner verifies
Figure BDA0001605434860000042
And ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S503, the cloud server changes the attribute value contained in the data ciphertext CT to be deleted through re-encrypting the part of the data ciphertext CT to be deleted so as to delete the data, and then recalculates the root node of the new Merkle hash tree
Figure BDA0001605434860000046
Will be provided with
Figure BDA0001605434860000043
As a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
Further, the specific steps of step S100 are:
step S101: selecting an ampereWith full parameters k, the trusted authority center selects two multiplication cycle groups G of order prime p1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={υi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is the Hash function of collision resistance, H: {0,1}*→Zp,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the common parameter Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parameters
Figure BDA0001605434860000057
Generating a system public key
Figure BDA0001605434860000051
And a master key
Figure BDA0001605434860000052
Step S103: trusted authority center publishing system parameters
Figure BDA0001605434860000053
Further, the specific step of the step S200 is that the cloud user proposes a private key application to the trusted authority center, and the trusted authority center selects a random number r e to ZpCalculating according to the system parameters, the access structure W of the user and the random number rgrAnd
Figure BDA0001605434860000054
returning the intermediate private Key SKW=(gr,DwW) to the cloud user; the cloud user generates a pair of signature keys { spk, ssk }, and selects a random number α ← Z }pCalculating attribute v-gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
Further, the specific steps of step S301 are: the data owner selects a set of attribute sets gamma and a random number s e Z for the data M to be uploadedPCalculating C1=M·Ys,C2=gs
Figure BDA0001605434860000055
The ciphertext CT of the data M to be uploaded is (C)1,C2,C3) (ii) a Meanwhile, the data owner constructs a Merkle hash tree, and leaf nodes of the Merkle hash tree are hash values H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
Further, the specific steps of step S302 are: the data owner selects an identifier fname for the data M to be uploaded and calculates a tag value for the data M to be uploaded
Figure BDA0001605434860000056
Uploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,
Figure BDA0001605434860000061
is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI represents
Figure BDA0001605434860000062
And auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
Further, the specific steps of step S400 are:
different cloud users request to access data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute set
Figure BDA0001605434860000063
AS ═ W; using the private key SK to perform calculations if
Figure BDA0001605434860000064
The cloud user decrypts the ciphertext CT for access.
Further, the specific steps of step S501 are: the data owner sends a delete request DR ═ (fname, att) to the trusted authority centeri,vi,j,v′i,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jDenotes accessible, v'i,jIndicating inaccessibility, DR ═ f name, atti,vi,j,v′i,j) Representing the change of the accessibility attribute in the ciphertext from accessible to inaccessible, the trusted authority center selects a random number t'i,jAnd calculate
Figure BDA0001605434860000065
The deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner.
Further, the specific steps of step S502 are:
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tuple
Figure BDA0001605434860000066
ΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verification
Figure BDA0001605434860000067
Whether or not, if so, then
Figure BDA0001605434860000068
The ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according to
Figure BDA0001605434860000069
And ΩindGenerating new root node of Merkle Hash tree
Figure BDA00016054348600000610
Verification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs that
Figure BDA00016054348600000614
Valid auxiliary authentication information AAI.
Further, the specific steps of step S503 are:
step S503-1: the cloud server according to the delete request DR ═ (fname, att)i,vi,j,v′i,j) Finding the data ciphertext CT to be deleted, the accessibility attribute attiE.g. rk, cloud server computing
Figure BDA00016054348600000611
By using
Figure BDA00016054348600000612
In place of the data ciphertext CT that needs to be deleted
Figure BDA00016054348600000613
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C′3γ'). Gamma' is set as an attribute set corresponding to the ciphertext after the re-encryption;
step S503-3 cloud server computing
Figure BDA0001605434860000071
Generating a new root node of a Merkle hash tree
Figure BDA0001605434860000072
Will be provided with
Figure BDA0001605434860000073
As a deletion proof back to the data owner.
Further, the specific steps of step S504 are: data owner re-encrypts using the deletion key rk
Figure BDA0001605434860000074
To obtain
Figure BDA0001605434860000075
The data owner receives the new root node
Figure BDA0001605434860000076
According to
Figure BDA0001605434860000077
And Ω received from the cloud serverindGenerating new root nodes for Merkle hash trees
Figure BDA0001605434860000078
New root node
Figure BDA0001605434860000079
A root node sent from the cloud server
Figure BDA00016054348600000710
Make a comparison if
Figure BDA00016054348600000711
The cloud server confirms that the data has been deleted.
Compared with the prior art, the invention has the beneficial effects that:
(1) fine-grained access: files stored in the cloud server support fine-grained access control, and data owners can determine who can access and decrypt the data before uploading the data. The data owner can correspond the ciphertext to an attribute set, and when the attribute set meets the access structure of the private key of the cloud user, the cloud user can correctly decrypt the data.
(2) Verifiable data deletion: the invention realizes the deterministic deletion of cloud data. The attribute set corresponding to the ciphertext is changed by enabling the cloud server to re-encrypt part of the ciphertext, so that the ciphertext does not meet the access structures of all users any more, and data cannot be accessed. In addition, a data owner can verify whether the data in the cloud server is deleted or not by reconstructing the Merkle hash tree, so that the data of a user can not be leaked, the data privacy of the cloud user is protected, and the safety of the system is improved.
(3) The calculation cost is low: the invention does not need the user to update the ciphertext and does not need the credible authority to manage and delete the key. Only the cloud server needs to update part of the ciphertext, the cost of the user verification process is low, the system is simple to implement, and the efficiency of data deterministic deletion is improved.
Drawings
FIG. 1 is a schematic diagram of a data storage and deterministic deletion process in accordance with an embodiment of the present invention;
FIG. 2 is a diagram of a verifiable deterministic deletion process in accordance with an embodiment of the present invention.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
The invention provides an attribute-based cloud data deterministic deletion method of a key strategy based on the public key cryptography theory, which simultaneously supports fine-grained access control and is applied to a cloud storage environment with higher security requirements. The data is encrypted before being outsourced to the cloud, the special attribute of 'accessibility' is introduced into the ciphertext attribute set, the value of the special attribute in the ciphertext is changed through re-encryption, the ciphertext does not meet the access structures of all users any more, and data deletion is achieved. The data owner generates a root of the MHT by constructing the MHT, uploads a ciphertext and a signature of the root to the cloud server, when the ciphertext is re-encrypted, the new root of the MHT can be regarded as an evidence for deletion, and the data owner can verify the evidence to realize verifiable data certainty deletion. Any information of user data cannot be revealed in the whole process, so that the method and the system have a promoting effect on the development of cloud computing and have a plurality of theoretical meanings and practical meanings.
Firstly, the applied cryptology theory of the invention is briefly introduced:
(1) bilinear pairings
Let G1,G2Two multiplicative cyclic groups of order p, and G is the generator of group G. If mapping e to G1×G1→G2If the following three conditions are satisfied, the method is called bilinear mapping. Computability: for any h1,h2∈G1,e(h1,h2) Can be efficiently calculated. Bilinear, for arbitrary h1,h2∈G1,a,b∈Zp,
Figure BDA0001605434860000082
If true; non-degenerating, for G1The generator g in (1) satisfies
Figure BDA0001605434860000081
(2) Attribute-based encryption (ABE)
In an attribute-based encryption scheme, attributes are used to generate keys and construct access policies. Attribute-based encryption can be roughly divided into attribute-based encryption of a key policy and attribute-based encryption of a ciphertext policy. In an attribute-based encryption scheme (KP-ABE) of a key policy, the access structure is contained in the user's private key, while the ciphertext corresponds to a set of attributes. In ciphertext policy attribute-based encryption (CP-ABE), the access policy is built into the ciphertext, and the user's private key corresponds to the attribute the user possesses. The attribute-based encryption scheme of the key strategy consists of four polynomial time algorithms as follows:
setup (k) the algorithm inputs the security parameters k, exports the system public key PK and the master key MSK.
KeyGen(PK,MSK,AU-KP) The algorithm input accesses structure AU-KPAnd outputting the user private key D.
Encrypt(PK,M,ACT) The algorithm inputs a message M, a set of attributes aCTAnd outputting the ciphertext C of the M.
Decrypt (C, D). the algorithm inputs a user private key D and a ciphertext C, and if the ciphertext C meets the access structure of the private key, the user can Decrypt the ciphertext C and output M.
(3) Merkle Hash Tree
The Merkle Hash Tree (MHT) is a widely used authentication structure that can efficiently check whether elements are stored perfectly. MHT is a binary tree in which leaf nodes store hash values of authentication data, and each internal node as well as the root node is generated by its two children. The values of the internal node as well as the root node are the hash values of its two child nodes. Element aiIs aiSiblings of all nodes on the path to the root node, and thus can be according to aiAnd aiThe root node is calculated by the auxiliary authentication information.
Referring to fig. 1, the present invention is embodied as follows:
a cloud data deterministic deletion method supporting fine-grained access comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
step S101: selecting a security parameter k, and selecting two multiplication circulation groups G with prime number p as an order by a credible authority center1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={υi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is a Hash function of collision resistance, H: {0,1}*→Zq,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the common parameter Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parameters
Figure BDA0001605434860000095
Generating a system public key
Figure BDA0001605434860000091
And a master key
Figure BDA0001605434860000092
Step S103: trusted authority center publishing system parameters
Figure BDA0001605434860000093
S200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to the trusted authority center, and the trusted authority center accesses the cloud user according to the system public parametersStructure W and random number r generate an intermediate private key SKWReturning to the cloud user; then, the cloud user selects a pair of signature key { spk, ssk } and random number α, and the private key of the cloud user is SK ═ (SK ═W,ssk,α);
The cloud user puts forward a private key application to a trusted authority center, and the trusted authority center selects a random number r E to ZpAnd calculating a parameter g according to the system parameter, the access structure W of the user and the random number rrAnd
Figure BDA0001605434860000094
returning the intermediate private Key SKW=(gr,DwAnd W) to the cloud user,
the cloud user generates a pair of signature keys { spk, ssk }, and selects a random number α ← Z }pCalculating the attribute v ═ gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
step S301. the data owner selects a random number s belonging to Z and a group of attribute sets gamma for the data M to be uploadedPCalculating C1=M·Ys,C2=gs
Figure BDA0001605434860000101
The ciphertext CT of the data M to be uploaded is (C)1,C2,C3) Wherein the attribute set gamma contains the attribute of accessibility; xi,jIs the third part of the ciphertext, which is related to the specific attributes in the attribute set, and is also the leaf node for constructing the MHT. Meanwhile, the data owner constructs a Merkle hash tree, and leaf nodes of the Merkle hash tree are hash values H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
Step S302, a data owner selects an identifier for data M to be uploadedIs given by fname, and calculates a tag value for the data M to be uploaded
Figure BDA0001605434860000102
Uploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,
Figure BDA0001605434860000103
is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI represents
Figure BDA0001605434860000104
And auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
Step S400, accessing data in the cloud server by the cloud user:
if the attribute corresponding to the ciphertext meets the access structure of the private key held by the user, the user can decrypt the data in the cloud server, different cloud users request to access the data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute set
Figure BDA0001605434860000105
AS ═ W; using the private key SK to perform calculations if
Figure BDA0001605434860000106
The cloud user decrypts the ciphertext CT for access.
Step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
when a data owner wants to delete data in a cloud server, the data owner first sends a deletion request to a trusted authority center. The trusted authority center returns a deletion key, i.e., a re-encryption key, to the data owner. The data owner sends the deletion key to the cloud server. After the deletion operation is performed, the cloud server will return a deletion certificate to the data owner, verifying that the data has been deleted. Referring to fig. 2, the process is specifically implemented as follows:
step S501, the data owner sends a deletion request DR ═ f name, att to the trusted authority centeri,vi,j,v′i,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jDenotes accessible, v'i,jIndicating inaccessibility, DR ═ (fname, atti, v)i,j,v′i,j) Showing that the accessibility attribute in the ciphertext is changed from accessible to inaccessible, and the trusted authority center selects a random number t'i,jAnd calculate
Figure BDA0001605434860000111
The deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner. Accessibility has two attribute values, accessible and inaccessible.
S502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attribute
Figure BDA0001605434860000112
Corresponding information is given to the data owner, and the data owner verifies
Figure BDA0001605434860000113
And ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tuple
Figure BDA0001605434860000114
ΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verification
Figure BDA0001605434860000115
Whether or not, if so, then
Figure BDA0001605434860000116
The ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according to
Figure BDA0001605434860000117
And ΩindGenerating new root node of Merkle Hash tree
Figure BDA0001605434860000118
Verification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs that
Figure BDA0001605434860000119
Valid auxiliary authentication information AAI.
And S503, the cloud server changes the attribute value contained in the ciphertext to delete the data by re-encrypting part of the ciphertext, so that the ciphertext does not meet the access structures of all users any more, and then generates a deletion certificate and returns the deletion certificate to the data owner. The specific steps of data deletion are as follows:
step S503-1: the cloud server according to the delete request DR ═ (fname, att)i,vi,j,v′i,j) The fname in the data search table corresponds to the data ciphertext CT to be deleted, and the accessibility attribute attiE.g. rk, cloud server computing
Figure BDA00016054348600001110
By using
Figure BDA00016054348600001111
In place of the data ciphertext CT that needs to be deleted
Figure BDA00016054348600001112
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C′3γ'). Is gamma' is providedSetting an attribute set corresponding to the encrypted ciphertext;
step S503-3 cloud server computing
Figure BDA0001605434860000121
Generating a new root node of a Merkle hash tree
Figure BDA0001605434860000122
Will be provided with
Figure BDA0001605434860000123
As a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
Data owner re-encrypts using the deletion key rk
Figure BDA0001605434860000124
To obtain
Figure BDA0001605434860000125
The data owner receives the new root node
Figure BDA0001605434860000126
According to
Figure BDA0001605434860000127
And Ω received from the cloud serverindGenerating new root nodes for Merkle hash trees
Figure BDA0001605434860000128
New root node
Figure BDA0001605434860000129
A root node sent from the cloud server
Figure BDA00016054348600001210
Make a comparison if
Figure BDA00016054348600001211
The cloud server confirms that the data has been deleted.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. A cloud data deterministic deletion method supporting fine-grained access is characterized by comprising the following steps: comprises the following steps:
s100, system establishment is carried out, and system parameters are generated: selecting a security parameter k, and generating a public parameter of the system by the trusted authority center;
s200, applying and generating a private key of a cloud user:
the cloud user provides a private key application to a trusted authority center, and the trusted authority center generates an intermediate private key SK according to the system public parameters, the access structure W of the cloud user and the random number rWReturning to the cloud user; the cloud user then selects a pair of signature keys { spk, ssk } and a random number α, the cloud user's private key being SK ═ (SK ═ forw,ssk,α);
The access structure W of the cloud user comprises an accessibility attribute, and a data owner is contained in the cloud user;
s300, the data owner encrypts and stores the data and uploads the data to a cloud server:
s301, data encryption and storage: the data owner selects a group of attribute set gamma and random number s for the data M to be uploaded, encrypts the data M and obtains a ciphertext CT (C)1,C2,C3) Then with C3Each element in the Merkle hash tree is used as a leaf node to construct a Merkle hash tree, and the root node R of the Merkle hash tree is signed by using the signature key ssk to obtain the sigssk(R);
Wherein, the attribute set gamma includes the attribute of accessibility, and the attribute value is accessible;
step S302, uploading data to a cloud server by a data owner: the data owner selects an identifier fname for the data M to be uploaded, and then sets ind to be the ciphertext corresponding to the accessibility attribute
Figure FDA0002616083260000011
Setting AAI as ciphertext corresponding to accessibility attribute at position in Merkle hash tree
Figure FDA0002616083260000012
In the Merkle hash tree, the data owner calculates a label value sigma for the data M to be uploaded, and finally uploads { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
step S400, accessing data in the cloud server by the cloud user:
different cloud users request to access data in a cloud server and obtain the ciphertext CT, and if the attribute corresponding to the ciphertext CT meets the access structure of the private key SK of the cloud user, the cloud user decrypts the ciphertext CT to access;
step S500, the data owner carries out deterministic deletion on the data stored in the cloud server:
s501, the data owner sends a deletion request DR to the trusted authority center, and the trusted authority center returns a deletion key rk to the data owner;
s502, the data owner sends the deletion key rk to the cloud server, and the cloud server returns a ciphertext corresponding to the accessibility attribute
Figure FDA0002616083260000013
Corresponding information is given to the data owner, and the data owner verifies
Figure FDA0002616083260000014
And ΩindWhether it is valid information; wherein omegaindAuxiliary authentication information representing ind;
step S503, the cloud server needs to pass the re-encryption partThe deleted data ciphertext CT changes the attribute values contained in the data ciphertext CT to be deleted to achieve data deletion, and then recalculates the root node of the new Merkle hash tree
Figure FDA0002616083260000021
Will be provided with
Figure FDA0002616083260000022
As a deletion proof back to the data owner;
step S504, the data owner verifies whether the cloud server deletes the data needing to be deleted deterministically by reconstructing a new Merkle hash tree.
2. The cloud data deterministic deletion method supporting fine-grained access according to claim 1, characterized in that: the specific steps of step S100 are:
step S101: selecting a security parameter k, and selecting two multiplication circulation groups G with prime number p as an order by a credible authority center1And G2Selecting G as the group G1One generator of (e) G1×G1→G2Representing a bilinear map;
wherein, the attribute complete set is omega ═ { att ═ att1,att2,…attn},Ai={vi,1i,2,…υi,niIs attribute AiAll possible values of (A), attribute AiContaining niA possible value;
the access structure of the cloud user is W ═ omega12,…ωkThe attribute set corresponding to the ciphertext is gamma ═ gamma12,…γt]H is the Hash function of collision resistance, H: {0,1}*→Zp,ZpA cyclic group modulo p;
step S102: the trusted authority center selects a random number h belonging to G1And the system private key y ∈ ZpCalculating the common parameter Y ═ e (g, h)yThen the trusted authority center selects a random number ti,j∈Zp(i∈[1,n],j∈[1,ni]) Calculating common parameters
Figure FDA0002616083260000023
Generating a system public key
Figure FDA0002616083260000024
And a master key
Figure FDA0002616083260000025
Step S103: trusted authority center publishing system parameters
Figure FDA0002616083260000026
3. The cloud data deterministic deletion method supporting fine-grained access according to claim 2, characterized in that: the specific step of the step S200 is that the cloud user provides a private key application to the trusted authority center, and the trusted authority center selects a random number r E to ZpG is calculated according to the system parameters, the access structure W of the user and the random number rrAnd
Figure FDA0002616083260000027
returning the intermediate private Key SKW=(gr,DwW) to the cloud user; the cloud user generates a pair of signature keys { spk, ssk }, and selects a random number α ← Z }pCalculating attribute v-gαThe private key of the cloud user is SK ═ (SK)W,ssk,α)。
4. The cloud data deterministic deletion method supporting fine-grained access according to claim 3, characterized in that: the specific steps of step S301 are: the data owner selects a set of attribute sets gamma and a random number s e Z for the data M to be uploadedPCalculating C1=M·Ys,C2=gs
Figure FDA0002616083260000032
The ciphertext CT of the data M to be uploaded is (C)1,C2,C3) (ii) a Meanwhile, the data owner constructs a Merkle hash tree, and leaf nodes of the Merkle hash tree are hash values H (X)i,j) In which X isi,j∈C3Signing the root node R of the Merkle hash tree with the signing key ssk to obtain the sigssk(R)。
5. The cloud data deterministic deletion method supporting fine-grained access according to claim 4, characterized in that: the specific steps of step S302 are: the data owner selects an identifier fname for the data M to be uploaded and calculates a tag value for the data M to be uploaded
Figure FDA0002616083260000033
Uploading { fname, ind, CT, sigma, AAI, sigssk(R) } to a cloud server;
wherein,
Figure FDA0002616083260000034
is represented by C3In the ciphertext corresponding to the accessibility attribute, ind represents the index of the leaf node corresponding to the accessibility attribute in the Merkle Hash Tree, and AAI represents
Figure FDA0002616083260000035
And auxiliary authentication information of leaf nodes corresponding to the accessibility attribute in the Merkle hash tree.
6. The method for cloud data deterministic deletion supporting fine-grained access according to claim 5, wherein: the specific steps of step S400 are:
different cloud users request to access data in the cloud server and obtain the ciphertext CT and the system public key PK, wherein the cloud user attribute set
Figure FDA0002616083260000036
AS ═ W; make itComputing with the private key SK of the cloud user if
Figure FDA0002616083260000031
The cloud user decrypts the ciphertext CT for access.
7. The method for cloud data deterministic deletion supporting fine-grained access according to claim 6, characterized in that: the specific steps of step S501 are: the data owner sends a delete request DR ═ (fname, att) to the trusted authority centeri,vi,j,v′i,j) (ii) a Wherein, attiRepresenting accessibility attribute, vi,jDenotes accessible, v'i,jIndicating inaccessibility, DR ═ f name, atti,vi,j,v′i,j) Representing the change of the accessibility attribute in the ciphertext from accessible to inaccessible, the trusted authority center selects a random number t'i,jAnd calculate
Figure FDA0002616083260000037
The deletion key rk ═ (fname, att) is then assignedi,cki) And returning to the data owner.
8. The method for cloud data deterministic deletion supporting fine-grained access according to claim 7, characterized in that: the specific steps of step S502 are:
step S502-1, the data owner will delete the key rk ═ (fname, att)i,cki) Sending the data to a cloud server, and returning att with the accessibility attribute by the cloud serveriCorresponding tuple
Figure FDA0002616083260000041
ΩindAuxiliary authentication information representing the node ind;
step S502-2 data owner verification
Figure FDA0002616083260000042
Whether or not, if so, then
Figure FDA0002616083260000043
The ciphertext corresponding to the ciphertext accessibility attribute;
step S502-3, the data owner according to
Figure FDA0002616083260000044
And ΩindGenerating new root node of Merkle Hash tree
Figure FDA0002616083260000045
Verification equation sigssk(R)=sigssk(R') is true, if true, ΩindIs that
Figure FDA0002616083260000046
Valid auxiliary authentication information AAI.
9. The method for cloud data deterministic deletion supporting fine-grained access according to claim 8, characterized in that: the specific steps of step S503 are:
step S503-1: the cloud server according to the delete request DR ═ (fname, att)i,vi,j,v′i,j) Finding the data ciphertext CT to be deleted, the accessibility attribute attiE.g. rk, cloud server computing
Figure FDA0002616083260000047
By using
Figure FDA0002616083260000048
In place of the data ciphertext CT that needs to be deleted
Figure FDA0002616083260000049
Step S503-2, the cloud server outputs a new ciphertext CT ═ (C)1,C2,C′3,γ') to a host; gamma' is set as an attribute set corresponding to the ciphertext after the re-encryption;
step S503-3 cloud server computing
Figure FDA00026160832600000410
Generating a new root node of a Merkle hash tree
Figure FDA00026160832600000411
Will be provided with
Figure FDA00026160832600000412
As a deletion proof back to the data owner.
10. The method for cloud data deterministic deletion supporting fine-grained access according to claim 9, characterized in that: the specific steps of step S504 are: data owner re-encrypts using the deletion key rk
Figure FDA00026160832600000413
To obtain
Figure FDA00026160832600000414
The data owner receives the new root node
Figure FDA00026160832600000415
According to
Figure FDA00026160832600000416
And Ω received from the cloud serverindGenerating new root nodes for Merkle hash trees
Figure FDA00026160832600000417
New root node
Figure FDA00026160832600000418
A root node sent from the cloud server
Figure FDA00026160832600000419
Make a comparison if
Figure FDA00026160832600000420
The cloud server confirms that the data has been deleted.
CN201810241812.3A 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access Active CN108600171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810241812.3A CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810241812.3A CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Publications (2)

Publication Number Publication Date
CN108600171A CN108600171A (en) 2018-09-28
CN108600171B true CN108600171B (en) 2021-01-19

Family

ID=63627117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810241812.3A Active CN108600171B (en) 2018-03-22 2018-03-22 Cloud data deterministic deletion method supporting fine-grained access

Country Status (1)

Country Link
CN (1) CN108600171B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347833B (en) * 2018-10-24 2020-05-22 中国科学院信息工程研究所 Access control method and system used in machine learning environment based on attribute encryption
CN109981288B (en) * 2019-03-26 2021-11-09 中国人民大学 Fine-grained cloud server side rapid external certification method based on aggregated signature
CN110868288B (en) * 2019-11-08 2022-05-20 中国人民解放军国防科技大学 Strategy-based outsourced data fine-grained credible deletion method in cloud storage environment
CN111596862B (en) * 2020-05-20 2022-11-01 南京如般量子科技有限公司 Independent optimization method and system for block chain historical transaction data
CN111737708B (en) * 2020-05-26 2024-01-12 桂林电子科技大学 Verifiable deleting method and system supporting efficient update of outsourced data
CN111832073B (en) * 2020-07-05 2023-07-18 桂林电子科技大学 Deterministic deleting method for supporting dynamic insertion of outsourced data in cloud environment
CN112612426A (en) * 2020-12-30 2021-04-06 海尔数字科技(青岛)有限公司 Method and device for deleting data, electronic equipment and storage medium
CN113704830B (en) * 2021-07-26 2023-08-29 山东赛宝电子信息工程有限责任公司 Intelligent website data tamper-proof system and method
CN114157421B (en) * 2021-11-30 2023-06-09 福建师范大学 Encryption system and method for ensuring data deletion based on attributes of multiple authorization centers
CN114629661B (en) * 2022-04-27 2024-02-23 中国科学技术大学 Encryption information processing method and device
CN116992494B (en) * 2023-09-27 2023-12-08 四川启明芯智能科技有限公司 Security protection method, equipment and medium for scenic spot data circulation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN105592100A (en) * 2016-01-26 2016-05-18 西安电子科技大学 Government services cloud access control method based on attribute encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN105592100A (en) * 2016-01-26 2016-05-18 西安电子科技大学 Government services cloud access control method based on attribute encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"A Data Assured Deletion Scheme in Cloud Storage";lichaoling;《IEEE》;20140609;全文 *
"一种适于云存储的数据确定性删除方法";王丽娜;《电子学报》;20120228;全文 *
"基于密码学的云数据确定性删除研究进展";熊金波;《通信学报》;20160831;全文 *

Also Published As

Publication number Publication date
CN108600171A (en) 2018-09-28

Similar Documents

Publication Publication Date Title
CN108600171B (en) Cloud data deterministic deletion method supporting fine-grained access
Xue et al. Efficient attribute-based encryption with attribute revocation for assured data deletion
Qin et al. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing
CN108881314B (en) Privacy protection method and system based on CP-ABE ciphertext under fog computing environment
CN114039790B (en) Fine-grained cloud storage security access control method based on blockchain
WO2016197770A1 (en) Access control system and access control method thereof for cloud storage service platform
WO2018045568A1 (en) Access control method oriented to cloud storage service platform and system thereof
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN104168108B (en) It is a kind of to reveal the traceable attribute base mixed encryption method of key
US20090097657A1 (en) Constructive Channel Key
Saroj et al. Threshold cryptography based data security in cloud computing
CN111614680B (en) CP-ABE-based traceable cloud storage access control method and system
CN108111540A (en) The hierarchical access control system and method for data sharing are supported in a kind of cloud storage
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
Tiwari et al. SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation
CN104901968A (en) Method for managing and distributing secret keys in secure cloud storage system
Imine et al. Revocable attribute-based access control in mutli-autority systems
Chaudhary et al. RMA-CPABE: A multi-authority CPABE scheme with reduced ciphertext size for IoT devices
Koe et al. Offline privacy preserving proxy re-encryption in mobile cloud computing
CN115426136A (en) Cross-domain access control method and system based on block chain
Sammy et al. An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP‐ABE Using ECC Scheme for Patient Health Record
Guo et al. Attribute-based data sharing scheme using blockchain for 6g-enabled vanets
CN117200966A (en) Trusted authorization data sharing method based on distributed identity and alliance chain
Havanje et al. Secure and reliable data access control mechanism in multi-cloud environment with inter-server communication security
Aziz et al. Assured data deletion in cloud computing: security analysis and requirements

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant