CN110502918A - A kind of electronic document access control method and system based on classification safety encryption - Google Patents

A kind of electronic document access control method and system based on classification safety encryption Download PDF

Info

Publication number
CN110502918A
CN110502918A CN201910614814.7A CN201910614814A CN110502918A CN 110502918 A CN110502918 A CN 110502918A CN 201910614814 A CN201910614814 A CN 201910614814A CN 110502918 A CN110502918 A CN 110502918A
Authority
CN
China
Prior art keywords
electronic document
user
level
key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910614814.7A
Other languages
Chinese (zh)
Inventor
王秋华
姚晔
张祯
袁理锋
陈临强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN201910614814.7A priority Critical patent/CN110502918A/en
Publication of CN110502918A publication Critical patent/CN110502918A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of electronic document access control methods and system based on classification safety encryption.The level of confidentiality of electronic document is arranged in the method for the present invention first, and then electron file sender distributes grading key, carries out graded encryption to electronic document, carries out hierarchical access control, final updating key.Present system includes user's registration/management module, electronic document Encryption management module, electronic document graded encryption module, electronic document classification deciphering module, encryption key distribution management module, cipher key calculation recovery module, electronic document transmission/reception module and database module.The present invention carries out graded encryption to electronic document according to the level of confidentiality of electronic document and carries out classification decryption and access control to electronic document according to the security level of user, realize the multi-level safety of electronic document, the effective protection safety of electronic document.The present invention realizes the hierarchical access control of electronic document by graded encryption and classification decryption.

Description

A kind of electronic document access control method and system based on classification safety encryption
Technical field
The invention belongs to safety of electronic file to manage field, and in particular to a kind of electronic document based on classification safety encryption Access control method and system.
Background technique
It is single in departments, Party and government offices at different levels, defence and military and enterprises and institutions with the deep development of the degree of office automation In position, more and more information exist in the form of electronic document, so that the safety of electronic document and sharing are by more next More attention.The electronic document of state secret and trade secret information is especially related to, once it divulges a secret, it will it seriously affects To national security, interests and the development of enterprise.
The extent of damage of safety and interests caused by after generally divulging a secret according to it for electronic document, divides it Level security protection.For business secret, it is secret that electronic document can be divided into core business secret, important business secret, general business Four grades such as close and open;For state secret, electronic document is generally divided into top-secret, secret, secret, internal and disclosure etc. five A rank.Equally, the division for needing to carry out rank is also known according to different work using the user of these electronic documents, such as It can be core concerning security matters personnel, important concerning security matters personnel, general concerning security matters personnel and non-concerning security matters personnel the safety status classification of user. But access the technology of control to electronic document at present, both do not solved for user security grade to electronics effectively The safe handling problem of file does not also solve the visit that graded encryption and multi-stage authentication are carried out to electronic document from cryptography angle It asks control problem, thus the behavior of user's unauthorized access electronic document can not be effectively prevent.Moreover, the electronics of current many units File is mainly stored in unit service device database in the form of plaintext, without encrypting to electronic document, is easy Cause the leakage of sensitive information.
Summary of the invention
The purpose of the present invention is directed to the safety and sharing problem of Current electronic file, proposes a kind of based on classification safety The electronic document access control method and system of encryption are, it can be achieved that carry out graded encryption to electronic document, it is ensured that different safety levels Other user is able to access that the electronic document needed for oneself, effectively prevents the leakage of important electronic document information.
It is a kind of based on classification safety encryption electronic document access control method, it can be achieved that carrying out classification visit to electronic document It asks control, specifically includes and graded encryption is carried out to electronic document according to the level of confidentiality of electronic document and according to the security level control of user Make its access to electronic document.
Each user in system registers with unique identity ID number, and each user has been set centainly Security level,Expression security level is CiAll users set, niIndicate that security level is CiAll numbers of users, Ui,mBe security level be CiUser set in m-th of user, m ∈ 1,2 ..., ni};Each use Family Ui,mA unique secret value s is obtained by safe lanei,m, individual private key as user.The safe lane is to add Secret letter road or physical route.
The access control method specifically includes:
The level of confidentiality of step 1. setting electronic document:
Electronic document all has unique electronic document ID, when security level is CiElectronic document sender Ui,aIt needs to send out When power transmission subfile j, the level of confidentiality F of the electronic document is set first in clientt, and the close of electronic document ID and electronic document Grade FtIt is sent to server.The level of confidentiality of the electronic document is electronic document sender Ui,aAccording to fixed close foundation accordingly to electricity The confidential of subfile setting.
Preferably, for being related to the application scenarios of state secret, t ∈ { 1,2,3,4,5 }, F1、F2、F3、F4、F5Table respectively Show that the level of confidentiality of electronic document is open, internal, secret, secret, top-secret;For being related to the application scenarios of business secret, t ∈ 1, 2,3,4 }, F1、F2、F3、F4The level of confidentiality of electronic document is respectively indicated as open, general business secret, important business secret, core Business secret.
The level of confidentiality for the electronic document that the user can set is equal to or less than the security level of user, i.e. t≤i.Such as Security level is C2User, the safe level of confidentiality that can be set to electronic document is F1And F2, and electronic document cannot be set and be pacified Full level of confidentiality is F3、F4Or F5
Step 2. electron file sender distributes grading key Kt:
(1) server by utilizing set GiIn user individual private key, construction access multinomialWherein VIDiFor a virtual identifying, its value is different from the individual private key of all users, It is for each electronic document j and Λi(x) it randomly selects.It is C for level of confidentialityiUser Ui,m, Λi(si,m)=1;For other The user U of level of confidentialityj,m,Then Λi(sj,m) it is a random value.Virtual identifying VIDjPurpose be in order to enable all Λi(x) different comprising the individual private key of identical user in.
(2) computation key distributes multinomial:
If electronic document level of confidentiality is equal to the security level of user, t=i, then grading key KtEncryption key distribution multinomial be Φi(x)=Λi(x)·Kt
If electronic document level of confidentiality is less than the security level of user, t < i, then grading key KtEncryption key distribution multinomial be Φi(x)=Λi(x)·Ki∪EKi(Kt), EK() indicates asymmetric encryption function;
(3) by encryption key distribution multinomial Φi(x) it is sent to client, client is according to the encryption key distribution multinomial received Φi(x) and user Ui,aIndividual private key si,aCalculate Φi(si,a) recover the graded encryption key K of electronic document jt.Specifically such as Under:
If electronic document level of confidentiality is equal to the security level of user, t=i, then for legitimate user Ui,a, Λj(si,a)=1, Therefore graded encryption key K can directly be calculatedti(si,a);For the user U of other levels of confidentialityj,m,Λi (sj,m) it is random value, therefore the user of other levels of confidentiality can only obtain a random value, and graded encryption key can not be calculated Kt
If electronic document level of confidentiality is less than the security level of user, t < i, then user Ui,aKey K is calculated firstii (si,a), then calculate Kt=DKi(EKi(Kt)), graded encryption key K can be obtainedt;For the user U of other levels of confidentialityj,m,Λi(sj,m) it is random value, therefore the user of other levels of confidentiality can only obtain a random value, and can not be calculated Graded encryption key Kt
Step 3. carries out graded encryption to electronic document j:
Utilize grading key KtWith Encryption Algorithm EtIt is F to level of confidentialitytElectronic document j encrypted, and encrypted electricity The ciphertext of subfile j is sent to server and is stored.
For the electronic document of different security level, Encryption Algorithm EtIt can be the same or different.
The Encryption Algorithm is symmetric encipherment algorithm, such as SM4, AES, therefore, the grading key K in the present inventiontIt is Electronic document encryption key and electronic document decruption key.
The grading key KtBeing respectively applied to safe level of confidentiality is FtElectronic document encryption and decryption.
It is C that the grading key, which will be respectively allocated to security level,tUser.
Step 4. hierarchical access control:
When security level is CiUser Ui,bApplication access level of confidentiality is FtElectronic document j when, server check user Ui,b Security level: if security level be less than electronic document j level of confidentiality, refuse the access application;If user Ui,bSecurity level More than or equal to the level of confidentiality of electronic document j, then the ciphertext of electronic document j and grading key KtDistribute to user Ui,b
Electron file access person Ui,bDistribute grading key KtMethod particularly includes:
(1) server distributes multinomial Φ grading keyi(x) it is sent to client:
If electronic document level of confidentiality FtEqual to the security level C of useri, then distributed to the grading key that client is sent multinomial Formula is Φi(x)=Λi(x)·Kt
If electronic document level of confidentiality FtLess than the security level C of useri, then distributed to the grading key that client is sent multinomial Formula is
(2) client is according to the encryption key distribution multinomial Φ receivedi(x) and user Ui,bIndividual private key si,bIt calculates and restores The classification decruption key K of electronic document j outt.Method particularly includes:
If electronic document level of confidentiality FtEqual to the security level C of useri, then user Ui,bDirectly calculate classification decruption key Kti(si,a);
If electronic document level of confidentiality FtLess than the security level C of useri, then user Ui,bKey K is calculated firstii (si,b), then calculateClassification decruption key K can be obtainedt
Then, user Ui,bUtilize grading key KtWith decipherment algorithm DtElectronic document j is decrypted, is recovered in plain text, User Ui,bElectronic document j can be read and be checked.
The decipherment algorithm DtCorresponding to Encryption Algorithm Et, even electronic document is with Encryption Algorithm EtEncryption, then with solution Close algorithm DtIt is decrypted.
The security level of the user has to be larger than or equal to the electronic document level of confidentiality that can be accessed, i.e. i >=t.Such as pacify Full rank is C2User, can only access safety level of confidentiality be F1And F2Electronic document, and be unable to access safety level of confidentiality be F3、F4Or F5Electronic document.
The update of step 5. key:
If needing to increase level of confidentiality in system is CiNew user, then only need to be according to user's set GiGenerate new grading key Distribute multinomial.If deletion level of confidentiality is CiUser, then need the encryption key to the electronic document, encryption key distribution is multinomial Formula and the ciphertext of electronic document are updated, to prevent the user from continuing to access electronic document j.Method particularly includes:
It (1) be level of confidentiality is FtElectronic document j randomly choose a new grading key Kt';
(2) it calculates new grading key and distributes multinomial:
If electronic document level of confidentiality FtEqual to the security level C of useri, then new grading key distribution multinomial is Φi′(x) =Λ 'i(x)·K′t
If electronic document level of confidentiality FtLess than the security level C of useri, then new grading key distribution multinomial be
(3) multinomial Φ is distributed grading keyi' (x) be sent to client;
(4) new graded encryption key K is usedt' encrypted electronic file j and store.
The present invention also provides a kind of electronic document access control system based on classification safety encryption in turn, for realizing right Electronic document carries out graded encryption and is accessed control according to the security level of user to electronic document, specifically includes user and infuses Volume/management module, electronic document Encryption management module, electronic document graded encryption module, electronic document classification deciphering module, close Key allocation managing module, cipher key calculation recovery module, electronic document transmission/reception module and database module.Phase between module Mutually linkage forms the unified electronic document access control system based on classification safety encryption.
User's registration/the management module, registration and management for system user.
The electronic document Encryption management module, for being that secret classifications are arranged in electronic document according to fixed close foundation.It is secret The number of rank can carry out different settings according to actual application environment.Preferably for state secret, electronic document is set Level of confidentiality is top secret, and secret is secret, five grades such as internal and open;For business secret, the level of confidentiality that electronic document is arranged is core Heart business secret, important business secret, general business secret disclose four grades.
The electronic document graded encryption module, for calling Encryption Algorithm pair according to the graded encryption key of electronic document Electronic document is encrypted in plain text.For the electronic document of different security level, Encryption Algorithm can be the same or different.It is preferred that Ground, the Encryption Algorithm are symmetric encipherment algorithm, such as SM4, AES, and therefore, the electronic document encryption key in the present invention is also Electronic document decruption key.
The electronic document is classified deciphering module, for the classification decruption key and decipherment algorithm according to electronic document to electricity Subfile ciphertext is decrypted.
The encryption key distribution management module is distributed the key of different stage for it for the security level according to user, is made Higher leveled grading key can not be obtained by obtaining low security level user, and high security level user can obtain the grading key of the same level With the classification decruption key for being lower than itself rank, the electronic document of the accessible low level of higher-level user, and low level are realized User cannot access high level electronic document, complete electronic document classification safety control.
The cipher key calculation recovery module, for the individual private key according to the grading key distribution multinomial and user that receive The grading key of electronic document is calculated, and the key is sent to electronic document graded encryption module or electronic document classification decryption Module.
The electronic document transmission/reception module, for realizing sending and receiving for electronic document ciphertext.
The database module, for store user information, electronic document ciphertext, the level of confidentiality of electronic document, grading key, Encryption key distribution multinomial, individual private key of each user etc..
The operation of above-mentioned all modules is all transparent, details of the user without knowing specific implementation to user.
The beneficial effects of the present invention are:
(1) present invention establishes a kind of electronic document access control method and system based on classification safety encryption, realizes Graded encryption is carried out to electronic document according to the level of confidentiality of electronic document and electronic document is carried out according to the security level of user Classification decryption and access control, the multi-level safety for realizing electronic document by " primary encryption, multistage decryption ", solve electricity Safety problem in subfile safe transmission and sharing application, especially access privilege control problem are effective using technological means Protect the safety of electronic document.
(2) present invention improves safety of the electronic document in storage and use process, passes through graded encryption and classification Decryption, realizes grading authorized, solves the problems, such as the access control of different security level users, realizes the classification of electronic document Access control.And electronic document remains encrypted state during application system circulates, and ensure that the biography of electronic document Defeated safety.
Detailed description of the invention
Fig. 1 is graded encryption electronic document flow chart;
Fig. 2 is classification decryption and access control flow chart;
Fig. 3 is present system structural schematic diagram;
Specific embodiment
Implementation of the invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to It is as described below.
Each user in system registers with unique identity ID number, and each user has been set centainly Security level,Expression security level is CiAll users set, niExpression safety level is Ci All numbers of users, Ui,mBe security level be CiM-th of user in the set of user, m ∈ 1,2 ..., ni};Each user Ui,mA unique secret value s is obtained by safe lanei,m, individual private key as user.Safe lane is encryption channel Or physical route.
As shown in Figure 1, security level is CiUser Ui,aClassification is carried out to electronic document j according to electronic document level of confidentiality to add Close detailed process the following steps are included:
Step a1: user Ui,aIt inputs username and password and logs in client.
Step a2: user Ui,aElectronic document j is created, client is that electronic document j generates unique electronic document ID.
Step a3: user Ui,aFor electronic document j, level of confidentiality F is sett.The level of confidentiality of the electronic document is user Ui,aAccording to phase The confidential that the fixed close foundation answered sets electronic document.
For being related to the application scenarios of state secret, t ∈ { 1,2,3,4,5 }, F1、F2、F3、F4、F5Respectively indicate electronics text The level of confidentiality of part is open, internal, secret, secret, top-secret;For being related to the application scenarios of business secret, t ∈ { 1,2,3,4 }, F1、F2、F3、F4It is secret for open, general business secret, important business secret, core business to respectively indicate the level of confidentiality of electronic document It is close.
The level of confidentiality for the electronic document that user can set is equal to or less than the security level of user, i.e. t≤i.Such as it is safe Rank is C2User, the safe level of confidentiality that can be set to electronic document is F1And F2, and it is close to set safety to electronic document Grade is F3、F4Or F5
Step a4: client sends electronic document ID and electronic document level of confidentiality FtTo server.
Step a5: server gives user Ui,aDistribute grading key Kt
(1) server is according to the security level C of useri, utilize set GiIn all users individual private key, construction visit Ask multinomialWherein VIDiFor a virtual identifying, its value is different from of all users Body private key is for each electronic document j and Λi(x) it randomly selects.It is C for level of confidentialityiUser Ui,m, Ui,m∈Gi, Λi (si,m)=1.And for the user U of other levels of confidentialityj,m,Λi(sj,m) it is a random value.
(2) computation key distributes multinomial.
If electronic document level of confidentiality FtEqual to the security level C of useri, then grading key KtEncryption key distribution multinomial be Φi (x)=Λi(x)·Kt
If electronic document level of confidentiality FtLess than the security level C of useri, then grading key KtEncryption key distribution multinomial beEK() indicates asymmetric encryption function.
(3) encryption key distribution multinomial Φi(x) it is sent to client, client is according to the encryption key distribution multinomial received Φi(x) and user Ui,aIndividual private key si,aCalculate Φi(si,a) recover the graded encryption key K of electronic document jt.Specific side Method are as follows:
If electronic document level of confidentiality FtEqual to the security level C of useri, then for legitimate user Ui,a, Λj(si,a)=1, because This can directly calculate graded encryption key Kti(si,a), for the user U of other levels of confidentialityj,m,Λi(sj,m) It is a random value, therefore the user of other levels of confidentiality can only obtain a random value, and graded encryption key can not be calculated Kt
If electronic document level of confidentiality FtLess than the security level C of useri, then user Ui,aFirst calculate key Kii (si,a), then calculateGraded encryption key K can be obtainedt.For the user U of other levels of confidentialityj,m,Λi(sj,m) it is a random value, therefore the user of other levels of confidentiality can only obtain a random value, and can not calculate Obtain graded encryption key Kt
Step a6: client carries out graded encryption to electronic document j.Utilize grading key KtWith Encryption Algorithm EtTo level of confidentiality For FtElectronic document j encrypted.
For the electronic document of different security level, Encryption Algorithm EtIt can be the same or different.
The Encryption Algorithm is symmetric encipherment algorithm, such as SM4, AES, grading key KtIt is electronic document encryption key It is also electronic document decruption key.
The grading key Kt, being respectively applied to safe level of confidentiality is FtElectronic document encryption and decryption.
The grading key Kt, will be respectively allocated to security level is CtUser.
Step a7: the ciphertext of encrypted electronic document j is sent to server by client, and is stored in server data Library.
As shown in Fig. 2, security level is CiUser Ui,bApplication access level of confidentiality is FtElectronic document j specifically controlled Journey the following steps are included:
Step b1: user Ui,bIt inputs username and password and logs in client.
Step b2: user Ui,bApplication access electronic document j, client send the request to server.
Step b3: server checks user Ui,bSecurity level, if security level be less than electronic document j level of confidentiality, refuse The exhausted access application.If user Ui,bSecurity level be greater than or equal to electronic document j level of confidentiality, then the ciphertext of electronic document j And grading key KtDistribute to user Ui,b
It is described to give user Ui,bDistribute grading key KtMethod particularly includes:
(1) server distributes multinomial Φ grading keyi(x) it is sent to client.
If electronic document level of confidentiality FtEqual to the security level C of useri, then distributed to the grading key that client is sent multinomial Formula is Φi(x)=Λi(x)·Kt
If electronic document level of confidentiality FtLess than the security level C of useri, then distributed to the grading key that client is sent multinomial Formula is
(2) client is according to the encryption key distribution multinomial Φ receivedi(x) and user Ui,bIndividual private key si,bIt calculates and restores The classification decruption key K of electronic document j outt.Method particularly includes:
If electronic document level of confidentiality FtEqual to the security level C of useri, then user Ui,bDirectly calculate classification decruption key Kti(si,a)。
If electronic document level of confidentiality FtLess than the security level C of useri, then user Ui,bFirst calculate key Kii (si,b), then calculateClassification decruption key K can be obtainedt
Step b4: client utilizes grading key KtWith decipherment algorithm DtElectronic document j is decrypted, is recovered in plain text, Then user Ui,bElectronic document j can be read and be checked.
The decipherment algorithm DtCorresponding to Encryption Algorithm Et
The security level of the user has to be larger than or equal to the electronic document level of confidentiality that can be accessed, i.e. Ci≥Ft.Such as pacify Full rank is C2User, can only access safety level of confidentiality be F1And F2Electronic document, and be unable to access safety level of confidentiality be F3And F4 Electronic document.
Fig. 3 is a kind of electronic document access control system structural schematic diagram based on classification safety encryption, specifically includes use Family registration/management module, electronic document Encryption management module, electronic document graded encryption module, electronic document classification decryption mould Block, encryption key distribution management module, cipher key calculation recovery module, electronic document transmission/reception module and database module.
User's registration/management module is used for the registration and management of system user.
Electronic document Encryption management module is used to according to fixed close foundation be that secret classifications are arranged in electronic document.Secret classifications Number can carry out different settings according to actual application environment.For state secret, the level of confidentiality of electronic document is set for top secret, machine It is close, secret, five grades such as internal and open;For business secret, the level of confidentiality that electronic document is arranged is that core business is secret, weight Business secret is wanted, general business secret discloses four grades.
Electronic document graded encryption module is used to call Encryption Algorithm to electronics according to the graded encryption key of electronic document Plaintext document is encrypted.For the electronic document of different security level, Encryption Algorithm can be the same or different.Preferably, institute Stating Encryption Algorithm is symmetric encipherment algorithm, such as SM4, AES, electronic document encryption key are also electronic document decruption key.
Electronic document is classified deciphering module, for the classification decruption key and decipherment algorithm according to electronic document to electronics text Part ciphertext is decrypted.The decipherment algorithm corresponds to aforementioned Encryption Algorithm.
Encryption key distribution management module is used to distribute the key of different stage for it according to the security level of user, so that low peace Full class subscribers can not obtain higher leveled grading key, and high security level user can obtain the grading key of the same level and be lower than The classification decruption key of itself rank, the electronic document of the realization accessible low level of higher-level user, and the user of low level High level electronic document cannot be accessed, the classification safety control of electronic document is completed.
Cipher key calculation recovery module is used to be calculated according to the individual private key of the grading key distribution multinomial and user that receive The grading key of electronic document, and the key is sent to electronic document graded encryption module or electronic document classification decryption mould Block.
Electronic document transmission/reception module sends and receives for realizing electronic document ciphertext.
Database module is for storing user information, electronic document ciphertext, the level of confidentiality of electronic document, grading key, key Distribute multinomial, individual private key of each user etc..
The operation of all modules is all transparent, details of the user without knowing specific implementation to user.
By above system, may be implemented according to the level of confidentiality of electronic document to electronic document carry out graded encryption and according to The security level at family accesses control to electronic document.

Claims (8)

1. a kind of electronic document access control method based on classification safety encryption, including the level of confidentiality according to electronic document to electronics File carries out graded encryption and controls its access to electronic document according to the security level of user;
Each user in system registers with unique identity ID number, and each user is set security level,Expression security level is CiAll users set, niExpression security level is CiAll users Number, Ui,mBe security level be CiUser set in m-th of user, m ∈ 1,2 ..., ni};Each user Ui,mPass through safety Channel obtains a unique secret value si,m, individual private key as user;It is characterized in that this method is specifically:
The level of confidentiality of step 1. setting electronic document:
Electronic document all has unique electronic document ID, when security level is CiElectronic document sender Ui,aIt needs to send electronics When file j, the level of confidentiality F of the electronic document is set first in clientt, and the level of confidentiality F of electronic document ID and electronic documenttHair Give server;The level of confidentiality of the electronic document is electronic document sender Ui,aAccording to fixed close foundation accordingly to electronic document The confidential of setting;The level of confidentiality for the electronic document that user can set is equal to or less than the security level of user, i.e. t≤i;
Step 2. electron file sender distributes grading key Kt:
(2-1) server by utilizing set GiIn user individual private key, construction access multinomialWherein VIDiFor a virtual identifying, value is different from the individual private key of all users, is For each electronic document j and Λi(x) it randomly selects;It is C for level of confidentialityiUser Ui,m, Λi(si,m)=1;It is close for other The user U of gradej,m,Then Λi(sj,m) it is a random value;
(2-2) computation key distributes multinomial:
If electronic document level of confidentiality is equal to the security level of user, t=i, then grading key KtEncryption key distribution multinomial be Φi(x) =Λi(x)·Kt
If electronic document level of confidentiality is less than the security level of user, t < i, then grading key KtEncryption key distribution multinomial beEK() indicates asymmetric encryption function;
(2-3) is by encryption key distribution multinomial Φi(x) it is sent to client, client is according to the encryption key distribution multinomial Φ receivedi (x) and user Ui,aIndividual private key si,aCalculate Φi(si,a) recover the graded encryption key K of electronic document jt
Step 3. carries out graded encryption to electronic document j:
Utilize grading key KtWith Encryption Algorithm EtIt is F to level of confidentialitytElectronic document j encrypted, and encrypted electronics text The ciphertext of part j is sent to server and is stored;Grading key KtBeing respectively applied to safe level of confidentiality is FtElectronic document encryption And decryption;For the electronic document of different security level, Encryption Algorithm EtIt can be the same or different;Grading key will be divided respectively Dispensing security level is CtUser;
Step 4. hierarchical access control:
When security level is CiUser Ui,bApplication access level of confidentiality is FtElectronic document j when, server check user Ui,bPeace Full rank: if security level is less than the level of confidentiality of electronic document j, refuse the access application;If user Ui,bSecurity level be greater than Or the level of confidentiality equal to electronic document j, then the ciphertext of electronic document j and grading key KtDistribute to user Ui,b
The security level of the user is greater than or equal to the electronic document level of confidentiality that can be accessed, i.e. i >=t;
The update of step 5. key:
If needing to increase level of confidentiality in system is CiNew user, then only need to be according to user's set GiGenerate new grading key distribution Multinomial;If deletion level of confidentiality is CiUser, then need the encryption key to the electronic document, encryption key distribution multinomial with And the ciphertext of electronic document is updated, to prevent the user from continuing to access electronic document j;Method particularly includes:
(5-1) is that level of confidentiality is FtElectronic document j randomly choose a new grading key K 't
(5-2) calculates new grading key and distributes multinomial:
If electronic document level of confidentiality FtEqual to the security level C of useri, then new grading key distribution multinomial is Φ 'i(x)= Λ′i(x)·K′t
If electronic document level of confidentiality FtLess than the security level C of useri, then new grading key distribution multinomial be
(5-3) distributes multinomial Φ grading keyi' (x) be sent to client;
(5-4) uses new graded encryption key K 'tEncrypted electronic file j is simultaneously stored.
2. a kind of electronic document access control method based on classification safety encryption as described in claim 1, it is characterised in that: The safe lane is encryption channel or physical route.
3. a kind of electronic document access control method based on classification safety encryption as described in claim 1, it is characterised in that: The level of confidentiality of the electronic document, for being related to the application scenarios of state secret, t ∈ { 1,2,3,4,5 }, F1、F2、F3、F4、F5Point Not Biao Shi electronic document level of confidentiality be open, internal, secret, secret, it is top-secret;For being related to the application scenarios of business secret, t ∈ { 1,2,3,4 }, F1、F2、F3、F4The level of confidentiality of electronic document is respectively indicated as open, general business secret, important business secret, core Heart business secret.
4. a kind of electronic document access control method based on classification safety encryption as described in claim 1, which is characterized in that Φ is calculated in (2-3)i(si,a) recover the graded encryption key K of electronic document jtThe specific method is as follows:
If electronic document level of confidentiality is equal to the security level of user, t=i, then for legitimate user Ui,a, Λj(si,a)=1, therefore can Directly calculate graded encryption key Kti(si,a);For the user U of other levels of confidentialityj,m,Λi(sj,m) be with Machine value, therefore the user of other levels of confidentiality can only obtain a random value, and graded encryption key K can not be calculatedt
If electronic document level of confidentiality is less than the security level of user, t < i, then user Ui,aKey K is calculated firstii(si,a), Then it calculatesGraded encryption key K can be obtainedt;For the user U of other levels of confidentialityj,m, Λi(sj,m) it is random value, therefore the user of other levels of confidentiality can only obtain a random value, and graded encryption can not be calculated Key Kt
5. a kind of electronic document access control method based on classification safety encryption as described in claim 1, it is characterised in that: Encryption Algorithm E described in step 3tFor symmetric encipherment algorithm.
6. a kind of electronic document access control method based on classification safety encryption as described in claim 1, it is characterised in that: Electron file access person U in step 4i,bDistribute grading key KtMethod particularly includes:
(4-1) server distributes multinomial Φ grading keyi(x) it is sent to client:
If electronic document level of confidentiality FtEqual to the security level C of useri, then it is to the grading key distribution multinomial that client is sent Φi(x)=Λi(x)·Kt
If electronic document level of confidentiality FtLess than the security level C of useri, then it is to the grading key distribution multinomial that client is sent
(4-2) client is according to the encryption key distribution multinomial Φ receivedi(x) and user Ui,bIndividual private key si,bCalculating recovers The classification decruption key K of electronic document jt;Method particularly includes:
If electronic document level of confidentiality FtEqual to the security level C of useri, then user Ui,bDirectly calculate classification decruption key Kti (si,a);
If electronic document level of confidentiality FtLess than the security level C of useri, then user Ui,bKey K is calculated firstii(si,b), so After calculateClassification decruption key K can be obtainedt
Then, user Ui,bUtilize grading key KtWith decipherment algorithm DtElectronic document j is decrypted, is recovered in plain text, user Ui,bElectronic document j can be read and be checked.
7. a kind of electronic document access control method based on classification safety encryption as claimed in claim 6, it is characterised in that:
The decipherment algorithm DtCorresponding to Encryption Algorithm Et, even electronic document is with Encryption Algorithm EtEncryption, then it is calculated with decryption Method DtIt is decrypted.
8. it is a kind of realize based on classification safety encryption electronic document access control method system, it is characterised in that: including with Family registration/management module, electronic document Encryption management module, electronic document graded encryption module, electronic document classification decryption mould Block, encryption key distribution management module, cipher key calculation recovery module, electronic document transmission/reception module and database module;Module it Between mutually link, form the unified electronic document access control system based on classification safety encryption;
User's registration/the management module, registration and management for system user;
The electronic document Encryption management module, for being that secret classifications are arranged in electronic document according to fixed close foundation;Secret classifications Number different settings is carried out according to actual application environment;
The electronic document graded encryption module, for calling Encryption Algorithm to electronics according to the graded encryption key of electronic document Plaintext document is encrypted;For the electronic document of different security level, Encryption Algorithm can be the same or different;
The electronic document is classified deciphering module, for the classification decruption key and decipherment algorithm according to electronic document to electronics text Part ciphertext is decrypted;
The encryption key distribution management module distributes the key of different stage for the security level according to user, so that low for it Security level user can not obtain higher leveled grading key, and high security level user can obtain the grading key of the same level and low In the classification decruption key of itself rank, the electronic document of the accessible low level of higher-level user is realized, and the use of low level Family cannot access high level electronic document, complete the classification safety control of electronic document;
The cipher key calculation recovery module, for being calculated according to the individual private key of the grading key distribution multinomial and user that receive The grading key of electronic document, and the key is sent to electronic document graded encryption module or electronic document classification decryption mould Block;
The electronic document transmission/reception module, for realizing sending and receiving for electronic document ciphertext;
The database module, for storing user information, electronic document ciphertext, the level of confidentiality of electronic document, grading key, key Distribute the individual private key of multinomial, each user.
CN201910614814.7A 2019-07-09 2019-07-09 A kind of electronic document access control method and system based on classification safety encryption Pending CN110502918A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910614814.7A CN110502918A (en) 2019-07-09 2019-07-09 A kind of electronic document access control method and system based on classification safety encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910614814.7A CN110502918A (en) 2019-07-09 2019-07-09 A kind of electronic document access control method and system based on classification safety encryption

Publications (1)

Publication Number Publication Date
CN110502918A true CN110502918A (en) 2019-11-26

Family

ID=68585566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910614814.7A Pending CN110502918A (en) 2019-07-09 2019-07-09 A kind of electronic document access control method and system based on classification safety encryption

Country Status (1)

Country Link
CN (1) CN110502918A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111340459A (en) * 2020-03-25 2020-06-26 江苏安泰信息科技发展有限公司 Evaluation report management system and operation method for safety production and occupational health
CN111953676A (en) * 2020-08-10 2020-11-17 四川阵风科技有限公司 File encryption method based on hardware equipment grade
CN112131589A (en) * 2020-09-27 2020-12-25 江苏天创科技有限公司 Expandable information security service system
CN112235298A (en) * 2020-10-14 2021-01-15 国网电子商务有限公司 Data security classification dynamic access control method based on zero trust model
CN112272090A (en) * 2020-10-27 2021-01-26 深圳安捷丽新技术有限公司 Key generation method and device
CN112307449A (en) * 2020-11-10 2021-02-02 上海市数字证书认证中心有限公司 Permission hierarchical management method and device, electronic equipment and readable storage medium
CN113079011A (en) * 2021-03-18 2021-07-06 长鑫存储技术有限公司 Key pushing method, file operating method, storage medium and computer equipment
WO2021139075A1 (en) * 2020-01-09 2021-07-15 平安科技(深圳)有限公司 Contract encryption and decryption method and apparatus, and device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100246827A1 (en) * 2009-03-27 2010-09-30 Microsoft Corporation User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
CN104917604A (en) * 2014-03-12 2015-09-16 北京信威通信技术股份有限公司 Key distribution method
WO2016108987A1 (en) * 2014-10-23 2016-07-07 Northrop Grumman Systems Corporation Multi-level security system for enabling secure file sharing across multiple security levels and method thereof
CN108959891A (en) * 2018-07-19 2018-12-07 南京邮电大学 Brain electricity identity identifying method based on privacy sharing
CN109614792A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 A kind of hierarchial file structure key management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100246827A1 (en) * 2009-03-27 2010-09-30 Microsoft Corporation User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
CN104917604A (en) * 2014-03-12 2015-09-16 北京信威通信技术股份有限公司 Key distribution method
WO2016108987A1 (en) * 2014-10-23 2016-07-07 Northrop Grumman Systems Corporation Multi-level security system for enabling secure file sharing across multiple security levels and method thereof
CN108959891A (en) * 2018-07-19 2018-12-07 南京邮电大学 Brain electricity identity identifying method based on privacy sharing
CN109614792A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 A kind of hierarchial file structure key management method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TAO PENG 等: "A Multilevel Access Control Scheme for Data Security in Transparent Computing", 《COMPUTING IN SCIENCE & ENGINEERING》 *
余彩霞 等: ""基于多级安全加密的电子文件流转中的访问控制研究"", 《档案学通讯》 *
王秋华: "无线网络的密钥分配与协商技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021139075A1 (en) * 2020-01-09 2021-07-15 平安科技(深圳)有限公司 Contract encryption and decryption method and apparatus, and device and storage medium
CN111340459A (en) * 2020-03-25 2020-06-26 江苏安泰信息科技发展有限公司 Evaluation report management system and operation method for safety production and occupational health
CN111953676A (en) * 2020-08-10 2020-11-17 四川阵风科技有限公司 File encryption method based on hardware equipment grade
CN111953676B (en) * 2020-08-10 2022-07-15 四川阵风科技有限公司 File encryption method based on hardware equipment grade
CN112131589A (en) * 2020-09-27 2020-12-25 江苏天创科技有限公司 Expandable information security service system
CN112235298A (en) * 2020-10-14 2021-01-15 国网电子商务有限公司 Data security classification dynamic access control method based on zero trust model
CN112235298B (en) * 2020-10-14 2022-03-01 国网电子商务有限公司 Data security classification dynamic access control method and device and electronic equipment
CN112272090A (en) * 2020-10-27 2021-01-26 深圳安捷丽新技术有限公司 Key generation method and device
CN112272090B (en) * 2020-10-27 2024-04-19 深圳安捷丽新技术有限公司 Key generation method and device
CN112307449A (en) * 2020-11-10 2021-02-02 上海市数字证书认证中心有限公司 Permission hierarchical management method and device, electronic equipment and readable storage medium
CN112307449B (en) * 2020-11-10 2022-12-27 上海市数字证书认证中心有限公司 Authority hierarchical management method, device, electronic equipment and readable storage medium
CN113079011A (en) * 2021-03-18 2021-07-06 长鑫存储技术有限公司 Key pushing method, file operating method, storage medium and computer equipment

Similar Documents

Publication Publication Date Title
CN110502918A (en) A kind of electronic document access control method and system based on classification safety encryption
CN107864139B (en) Cryptographic attribute base access control method and system based on dynamic rules
CN108881314B (en) Privacy protection method and system based on CP-ABE ciphertext under fog computing environment
Timothy et al. A hybrid cryptography algorithm for cloud computing security
CN104363215B (en) A kind of encryption method and system based on attribute
CN104486315B (en) A kind of revocable key outsourcing decryption method based on contents attribute
US7739501B2 (en) Cryptographic key construct
CN109246096A (en) Multi-functional fine-grained access control method suitable for cloud storage
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN107483585A (en) The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment
Zhang et al. DOPIV: Post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage
CN112989375B (en) Hierarchical optimization encryption lossless privacy protection method
CN109165526A (en) A kind of big data security and privacy guard method, device and storage medium
Sumathi et al. A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography
CN111563733A (en) Ring signature privacy protection system and method for digital wallet
Tong et al. Privacy-preserving Boolean range query with temporal access control in mobile computing
CN108737365A (en) A kind of network data information guard method and device
Kaleem et al. New Efficient Cryptographic Techniques For Cloud Computing Security
Agarkhed et al. Security and privacy for data storage service scheme in cloud computing
CN113190859A (en) Data hierarchical encryption method based on block chain
CN116805078A (en) Logistics information platform data intelligent management system and method based on big data
Hu Study of file encryption and decryption system using security key
CN110493259A (en) A kind of encrypting and deciphering system and method ensureing cloud electronic data security
CN115118416A (en) Distributed database system based on privacy protection and confidentiality method
Salim et al. Applying geo-encryption and attribute based encryption to implement secure access control in the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191126

WD01 Invention patent application deemed withdrawn after publication