WO2014114080A1 - 数据加密保护方法及系统 - Google Patents

数据加密保护方法及系统 Download PDF

Info

Publication number
WO2014114080A1
WO2014114080A1 PCT/CN2013/082486 CN2013082486W WO2014114080A1 WO 2014114080 A1 WO2014114080 A1 WO 2014114080A1 CN 2013082486 W CN2013082486 W CN 2013082486W WO 2014114080 A1 WO2014114080 A1 WO 2014114080A1
Authority
WO
WIPO (PCT)
Prior art keywords
ciphertext
data
access structure
private key
user
Prior art date
Application number
PCT/CN2013/082486
Other languages
English (en)
French (fr)
Inventor
彭志明
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014114080A1 publication Critical patent/WO2014114080A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Definitions

  • the present invention relates to the field of communications, and in particular to a data encryption protection method and system.
  • Cloud storage is a new concept extended and developed in the concept of cloud computing. It refers to a large number of different types of storage in the network through functions such as cluster application, grid technology or distributed file system.
  • the core of computing and processing of cloud computing systems is the storage and management of large amounts of data, a large number of storage devices need to be configured in the cloud computing system, and then the cloud computing system is transformed into a cloud storage system.
  • cloud storage is a cloud computing system with data storage and management as its core. Cloud storage can make data sharing more convenient. There is no geographical restriction. You only need to be able to connect to the Internet and access data anytime, anywhere. You can use the cloud storage system. Today's most representative cloud storage services are Google Drive Dropbox and Sky Drive. Several basic features that must be possessed in cloud storage: Confidentiality: Cloud storage providers cannot know the user's information; Integrity: Users can perceive that their information has been illegally tampered with; Feasibility: Users can be effective anytime, anywhere Access to your own data in a timely manner; Reliability: Effective backup of user data to prevent loss of information; Shareability: Users can share their own data with trusted users.
  • encryption algorithms are used to encrypt data. necessary.
  • user A encrypts the user data with his own private key, and stores the ciphertext on the cloud server. If user B needs to access the data, then A must pass the encrypted private key to B. B decrypts the ciphertext with A's private key to obtain plaintext, so B can view all the information encrypted by A, including those sensitive information that A does not want B to see, and cannot implement fine-grained access control. That is: the encryption data is used to encrypt and store the data in the cloud storage.
  • Another way to solve the cloud storage security is to control the user's access rights to the data in the cloud storage through an access control server. First, all users in the system are allocated access rights for various resources, and the user is controlled according to the access rights of the user. Access. The security of this method is completely guaranteed by the control access server. If there is a problem with the control access server, the data security is not guaranteed. An important goal of the cloud storage service is to realize user data sharing.
  • FIG. 1 is a schematic diagram of a process of encrypting data and implementing data sharing according to the related art. As shown in FIG.
  • a conventional encryption and implementation of information sharing is implemented by: selecting a session key K to encrypt a plaintext M to obtain a ciphertext C, Then, the session key K is separately encrypted by using the public key of each user, and the ciphertext C and the encrypted session key are sent to each user, and the user decrypts the session key with his own private key S. Then use the session key to decrypt C to get the plaintext.
  • this way of implementing information sharing among multiple users has two obvious drawbacks: First, the shared user must be deterministic, and the session key is encrypted with each user's public key.
  • the embodiments of the present invention provide a data encryption protection method and system, so as to at least solve the problem of low efficiency of sharing information between multiple users in a cloud storage system in the related art.
  • a data encryption protection method including: encrypting a plaintext and a specified access structure, and obtaining a ciphertext, wherein the access structure is used to indicate a user who has the authority to decrypt the ciphertext Decrypting the ciphertext to obtain the plaintext and the access structure.
  • the decrypting the ciphertext comprises: calculating a session key by using a private key of the current user, wherein the session key is used to decrypt the ciphertext; if the session key is calculated, using the session secret The key decrypts the ciphertext.
  • the method before decrypting the ciphertext, the method further includes: generating a private key of the current user according to the current user's attribute set and the system's primary private key.
  • the method before the generating the private key of the current user according to the attribute set of the current user and the primary private key of the system, the method further includes: verifying that the attribute set of the current user is authentic.
  • the method after decrypting the ciphertext to obtain the plaintext and the access structure, the method further includes: encrypting the access structure and the plaintext edited by the current user; sending the encrypted ciphertext Save to memory.
  • the data encryption protection method is applied to a cloud storage system.
  • a data encryption protection system including: an encryption module, configured to encrypt plaintext and a specified access structure, to obtain a ciphertext, wherein the access structure is used to indicate that the privilege is decrypted a user of the ciphertext; a decryption module configured to decrypt the ciphertext to obtain the plaintext and the access structure.
  • the decrypting module comprises: a calculating unit, configured to calculate a session key by using a private key of the current user, wherein the session key is used to decrypt the ciphertext; and the decrypting unit is configured to calculate the In the case of a session key, the ciphertext is decrypted using the session key.
  • the system further comprises: a private key generating module, configured to generate the private key of the current user according to the current user's attribute set and the system's primary private key.
  • the system further comprises: a verification module, configured to verify that the attribute set of the current user is authentic.
  • the encryption module is further configured to encrypt the access structure and the plaintext edited by the current user.
  • the system further includes: a sending module, configured to send the encrypted ciphertext to a memory for saving.
  • the data encryption protection system is applied to a cloud storage system. Improved ciphertext-based attribute encryption (Ciphertext-Policy) by using an embodiment of the present invention
  • the Attribute-Based Encryption (CP-ABE) algorithm encrypts the access structure as part of the message, which solves the problem of low efficiency of sharing information between multiple users in the cloud storage system, ensuring data security. It can realize information sharing among multiple users under lower computational overhead and communication overhead, and also realize fine-grained access control of stored files in the cloud storage system.
  • FIG. 2 is a flowchart of a data encryption protection method according to an embodiment of the present invention
  • FIG. 3 is a data encryption according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of a preferred structure of a data encryption protection system according to an embodiment of the present invention
  • FIG. 5 is a block diagram of a preferred structure of a data encryption protection system according to an embodiment of the present invention
  • FIG. 7 is a flowchart of private key generation in a data encryption protection method according to a preferred embodiment of the present invention
  • FIG. 8 is a data encryption according to a preferred embodiment of the present invention.
  • FIG. 9 is a flow chart of data encryption in accordance with a preferred embodiment of the present invention
  • FIG. 10 is a flow chart of data decryption and sharing in accordance with a preferred embodiment of the present invention
  • FIG. 2 is a flowchart of a data encryption protection method according to an embodiment of the present invention. As shown in FIG. 2, the following steps S202 to S204 are included. Step S202: Encrypt the plaintext and the specified access structure to obtain a ciphertext, where the access structure is used to indicate a user who has the authority to decrypt the ciphertext.
  • Step S204 decrypting the ciphertext to obtain a plaintext and an access structure.
  • the CP-ABE is improved, and the access structure is encrypted together as part of the message, which solves the problem of low efficiency of sharing information between multiple users in the cloud storage system, which can ensure data security and lower
  • the information sharing between multiple users is realized under the calculation overhead and communication overhead, and the fine-grained access control of the stored files in the cloud storage system is also realized.
  • decrypting the ciphertext in step S204 includes: calculating a session key by using a private key of the current user, wherein the session key is used to decrypt the ciphertext; if the session key is calculated, decrypting the secret by using the session key Text.
  • the method before decrypting the ciphertext, the method further includes: generating a current key of the current user according to the current user's attribute set and the system's primary private key.
  • each user has a set of attributes, and a corresponding private key is generated for each user according to the attributes of the user.
  • an access structure is specified to describe which users can decrypt the plaintext message, that is, if the attributes of the user are satisfied. The access structure specified during encryption can be decrypted to obtain the plaintext and access structure, otherwise it cannot be decrypted.
  • the current user's private key is generated according to the current user's attribute set and the system's primary private key. If it is true, the process of generating the user's private key is entered. If it is not true, the verification fails and a message is returned to the user.
  • the attribute set of the user is true, the private key is generated, and the accuracy of the generated private key can be guaranteed.
  • Users who have successfully decrypted the ciphertext can edit the obtained plaintext according to their needs. The edited plaintext needs to be encrypted and stored in the cloud storage system so that other users can share the edited data.
  • the following steps can be implemented: After decrypting the ciphertext, obtaining the plaintext and the access structure, encrypting the access structure and the plaintext edited by the current user; sending the encrypted ciphertext to the memory for storage.
  • the encryption here is similar to the process of encrypting the original plaintext before, and can be implemented by using the same encryption module.
  • the edited data is re-encrypted and stored on the cloud storage server for sharing by other users.
  • the above data encryption protection method can be applied to a cloud storage system. It should be noted that the method is an improvement of the CP-ABE algorithm, and the improvement point is that the access structure is encrypted together as part of the message.
  • FIG. 3 is a structural block diagram of a data encryption protection system according to an embodiment of the present invention. As shown in FIG. 3, the data encryption protection system includes: an encryption module 32 and a decryption module. 34. The structure is described in detail below.
  • the encryption module 32 is configured to encrypt the plaintext and the specified access structure to obtain a ciphertext, where the access structure is used to indicate a user who has the authority to decrypt the ciphertext; the decryption module 34 is coupled to the encryption module 32, and is configured to decrypt the ciphertext. , get the plaintext and access structure.
  • the decryption module 34 includes: a computing unit 342 configured to calculate a session key using a private key of the current user, wherein the session key is used to decrypt the ciphertext; the decryption unit 344 is coupled to the computing unit 342, In order to calculate the session key, the ciphertext is decrypted using the session key.
  • the system further includes: a private key generating module 36 coupled to the decrypting module 34, configured to generate a current user's private key according to the current user's attribute set and the system's primary private key.
  • the above system further comprises: a verification module 38 coupled to the private key generation module 36, configured to verify that the current user's attribute set is authentic.
  • the encryption module 32 is further configured to encrypt the access structure and the plaintext edited by the current user.
  • the system further includes: a sending module 39 (not shown) coupled to the encryption module 32, configured to encrypt the encrypted secret. The text is sent to the memory for saving.
  • the above data encryption protection system is applied to a cloud storage system.
  • a data encryption protection method and system are provided.
  • the system solves the problem that the encryption protection of data in the cloud storage enhances data security, and ensures the confidentiality of data in the cloud storage system. It also enables fine-grained access control, providing a viable way to achieve data sharing more securely.
  • the system mainly includes the following modules: a system initialization module 602, configured to generate a master private key of the system (Master) Key, referred to as MK) and Public Key (PK).
  • the attribute authentication module 604 (implementing the function of the above-mentioned verification module 38), also referred to as an Attribute Certificate Authority (ACA), is responsible for verifying whether the attribute of the user is authentic.
  • ACA Attribute Certificate Authority
  • the private key generation module (Key Produce Group, referred to as KPG, which implements the function of the private key generation module 36) 606 is configured to generate a private key SK corresponding to the attribute according to the input system main private key MK and the attribute set S.
  • the data encryption module 608 (implementing the function of the encryption module 32 described above) is configured to output the ciphertext according to the input public key PK, the message m, and the access structure T B that the identifier of the decryptor needs to satisfy.
  • the data decryption module 610 (implementing the function of the decryption module 34 described above) is configured to satisfy the access structure T B according to the input private key SK B (ie, the private key of the user B) and the ciphertext corresponding to the message m. In the case of the above, decrypt the above ciphertext and successfully output the message!
  • the above preferred embodiment adopts the CP-ABE algorithm to encrypt and store data, which not only ensures the encrypted storage of data, but also realizes fine-grained access control, especially in the case of data sharing among multiple users. safety.
  • the system initialization module 602 generates a public key PK and a system master private key MK of the system.
  • Step 2 The attribute authentication module 604 is responsible for verifying the attribute group S of the user, and confirming whether the attribute group provided by the user is true.
  • Step 3 After the attribute authentication module 604 authenticates the attribute group S of the user, the attribute group S of the user is sent to the private key generation module 606, and the private key generation module 606 generates the attribute group S by using the MK generated by the system initialization module 602. The corresponding private key SK is returned to the attribute authentication module 604.
  • Step 4 Input the data M to be encrypted and the access structure T that the attribute of the decrypter must satisfy to the encryption module 608, and then use the PK pair data M generated by the system initialization module 602 in the encryption module 608 and the access structure T described above.
  • Encryption is performed using the CP-ABE algorithm, and finally the encrypted ciphertext is output and stored on the cloud server.
  • Step 5 When the user needs to access the data in the cloud storage, the private key needs to be input to the decryption module 610. If the attribute when the user private key is generated satisfies the access structure specified when the data M is encrypted, the decryption module 610 decrypts the secret. After the text is obtained in plain text, it is returned to the user. In order to realize data sharing among multiple users, after decrypting and obtaining the plaintext, the edited data may be encrypted and stored in the cloud server again by using the access structure in the ciphertext.
  • Step S702 The user submits the attribute set (ie, the attribute group) S to the attribute authentication center (ie, the attribute authentication module, the attribute verification center) 604 for authentication, and if the authentication fails, directly returns.
  • step S704 when the attribute authentication center 604 successfully authenticates the attribute, the attribute set S is sent to the private key generation module 606.
  • the private key generation module 606 calculates the private key SK corresponding to the attribute set S, and returns the SK to the attribute authentication center 604.
  • step S708 the attribute authentication center 604 returns the private key SK to the user.
  • the encryption structure needs to specify the access structure that the decryptor attribute (attribute set, attribute group) must satisfy, the access structure here can be represented by a binary tree.
  • FIG. 8 is a schematic diagram of a binary tree representation of an access structure in a data encryption protection method according to a preferred embodiment of the present invention. As shown in FIG.
  • a leaf node of the binary tree represents an attribute
  • a non-leaf node is a logical relationship, generally "and”
  • the access structure shown in Figure 8 can be represented as a matrix as follows: If the user's attribute set satisfies this access structure, the row corresponding to the attribute set can represent the vector linearly, such as [1, 0, 0, 0].
  • 9 is a flow chart of data encryption according to a preferred embodiment of the present invention. As shown in FIG. 9, in the encryption process, the following steps are included: Step S902, the user needs to access the encrypted data M and the attributes of the decrypter. Structure 1 is sent to data encryption module 608.
  • step S904 the data encryption module 608 encrypts the data M using the CP-ABE algorithm, and also stores the access structure T in the ciphertext.
  • step S906 the data encryption module 608 sends the encrypted ciphertext data to the cloud server.
  • FIG. 10 is a flowchart of data decryption and sharing according to a preferred embodiment of the present invention. As shown in FIG. 10, in the process of decryption and sharing, the following steps are included: Step S1002: A user requests content from a cloud server. In step S1004, the cloud server returns the ciphertext C to the user.
  • step S1006 the user sends his own private key SK and ciphertext C to the data decryption module 610.
  • Step S1008 the data decryption module 610 decrypts the ciphertext C with the private key SK, and obtains the plaintext M and the access structure.
  • step S1010 the user reads the plaintext and can edit the plaintext.
  • step S1012 if the user needs to edit the plaintext and wants to save the edited data in the cloud server and share it with other users, the edited plaintext and access structure are sent to the data encryption module 608.
  • step S1014 the data encryption module 608 encrypts the plaintext M by using the CP-ABE algorithm.
  • step S1016 the data encryption module 608 saves the encrypted data C on the cloud server.
  • 11 is a general flowchart of a data encryption protection method according to a preferred embodiment of the present invention. As shown in FIG. 11, the processes shown in FIG. 7, FIG. 9, and FIG. 10 are combined to obtain the preferred embodiment.
  • the steps shown in the flowchart of the accompanying drawings may be performed in a computer system such as a set of computer executable instructions, and, although the logical order is shown in the flowchart, in some cases, The steps shown or described may be performed in an order different than that herein.
  • the above embodiments or preferred embodiments of the present invention relate to cloud computing, cloud storage, and other applications that need to store data on a third-party platform, and propose a cloud for the security of data stored in the third party.
  • the data protection system of the storage system and its corresponding encryption and decryption method, especially when the third party is not trusted, the system can satisfy data sharing, flexible access control and confidentiality and integrity of data, and prevent information leakage.
  • the data stored on the cloud server is encrypted and stored by using the CP-ABE algorithm, which can implement fine-grained access control, which not only ensures the confidentiality of the data, but also realizes data sharing more securely.
  • the CP-ABE algorithm which can implement fine-grained access control, which not only ensures the confidentiality of the data, but also realizes data sharing more securely.
  • only one access structure T (instead of the user's public key) needs to be specified during encryption.
  • the plaintext can be decrypted and decrypted, and then the access structure is used after decryption.
  • T encryption is stored in the cloud server, which realizes information sharing under multiple users, and the stored data is stored in ciphertext, which ensures the confidentiality of the information. And don't care which specific users can decrypt, regardless of the number of users, the ciphertext length is also independent of the number of users, especially suitable for information sharing under large users.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into respective integrated circuit modules. Blocks, or a plurality of modules or steps in them, are implemented as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Analysis (AREA)
  • Software Systems (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种数据加密保护方法及系统,该数据加密保护方法包括:加密明文和指定的访问结构,得到密文,其中,访问结构用于表示有权限解密该密文的用户(S202);解密上述密文,得到明文和访问结构(S204)。通过本发明,改进基于密文策略的属性加密CP—ABE算法,将访问结构作为消息的一部分一起加密,解决了云存储系统中的多用户间加密信息共享效率低的问题,既能保证数据的安全性,也能在较低的计算开销和通讯开销下实现多用户间的信息共享,还实现了对云存储系统中存储文件的细粒度访问控制。

Description

数据加密保护方法及系统
技术领域 本发明涉及通信领域, 具体而言, 涉及一种数据加密保护方法及系统。 背景技术 云计算作为新一代的技术变革,其发展受到各行各业的关注, 随着云计算的发展, 随之又出现了云存储。 云存储是在云计算(cloud computing) 的概念上延伸和发展出来的一个新的概念, 是指通过集群应用、 网格技术或分布式文件系统等功能, 将网络中大量各种不同类型 的存储设备通过应用软件集合起来协同工作, 共同对外提供数据存储和业务访问功能 的一个系统。 当云计算系统运算和处理的核心是大量数据的存储和管理时, 云计算系 统中就需要配置大量的存储设备, 那么, 云计算系统就转变成为一个云存储系统。 所 以, 云存储是一个以数据存储和管理为核心的云计算系统。 云存储能够更方便实现数据共享, 没有地域限制, 只需要能够连接互联网、 就能 够随时随地访问数据,就可以使用云存储系统。当今最具代表性的云存储服务有 Google Drive Dropbox禾口 Sky Drive。 云存储中必须具备的几个基本特性: 机密性: 云存储提供商不能知道用户的信息; 完整性: 用户能够察觉到自己的信息被非法篡改过; 可行性: 用户可以随时随地的, 在有效的时间内访问自己的数据; 可靠性: 有效的备份用户的数据, 防止信息的丢失; 可共享性: 用户可以跟可信的用户共享自己的数据。 在使用云存储服务时, 需要考虑到数据的安全性、 用户信息泄露, 或是不可信的 第三方有可能会出售用户数据来获取利益, 为了防止这些情况, 采用加密算法对数据 加密存储是有必要的。 采用传统的非对称密码算法加密时, 用户 A用自己的私钥加密 用户数据, 将密文存储在云服务器上, 如果用户 B需要访问这些数据, 那么 A必须将 加密的私钥交给 B, B用 A的私钥解密密文获取明文, 这样 B就可以查看 A加密后的 所有信息, 包括那些 A不希望 B看到的敏感信息, 不能实现细粒度访问控制。 也即: 使用加密算法对云存储中的数据加密存储, 如果有用户需要访问加密后的数据, 必须 使用解密密钥对加密的数据进行解密, 那么他可以访问解密后的所有数据, 在多个用 户间数据共享的情况下不能控制用户的访问权限。 另一种解决云存储安全的方法是通过一个访问控制服务器来控制用户对云存储中 数据的访问权限, 首先对系统中所有用户针对各种资源分配访问权限, 根据用户的访 问权限控制用户对数据的访问。 这种方法的安全性完全由控制访问服务器来保证, 如 果控制访问服务器出问题, 数据安全性也得不到任何保证。 云存储服务一个重要的目标就是实现用户数据共享, 如果在云存储中的数据采用 非对称加密算法加密, 要将数据共享给其他用户, 这时这些用户必须是确定的, 在密 文中必须为每个用户都增加信息, 用户通过这段信息解密得到加密密钥, 这段信息是 用解密者的公钥加密的会话密钥。 图 1是根据相关技术的加密数据及实现数据共享的 流程示意图, 如图 1所示, 传统的加密及实现信息共享的实现方式是: 选择一个会话 密钥 K对明文 M加密得到密文 C,然后再用每个用户的公钥分别加密会话密钥 K,将 密文 C和加密后的会话密钥 Κ给每个用户发送一份,用户用自己的私钥 S解密得到会 话密钥 Κ, 然后再用会话密钥 Κ解密 C得到明文 Μ。 但是, 这种实现多用户间信息共享的方式有两个明显的缺陷: 首先, 共享的用户 必须是确定的, 而且要用每个用户的公钥加密会话密钥。 其次, 如果共享的用户数量 比较大, 则额外需要共享的会话密钥的消息就很大, 并且和用户数呈线性增长, 导致 通讯效率很低。 针对相关技术中云存储系统中的多用户间加密信息共享效率低的问题, 目前尚未 提出有效的解决方案。 发明内容 本发明实施例提供了一种数据加密保护方法及系统, 以至少解决相关技术中云存 储系统中的多用户间加密信息共享效率低的问题。 根据本发明实施例的一个方面, 提供了一种数据加密保护方法, 包括: 加密明文 和指定的访问结构, 得到密文, 其中, 所述访问结构用于表示有权限解密所述密文的 用户; 解密所述密文, 得到所述明文和所述访问结构。 优选地, 解密所述密文包括: 利用当前用户的私钥计算会话密钥, 其中, 所述会 话密钥用于解密所述密文; 如果计算出所述会话密钥, 利用所述会话密钥解密所述密 文。 优选地, 在解密所述密文之前, 所述方法还包括: 根据所述当前用户的属性集和 系统的主私钥生成所述当前用户的私钥。 优选地, 在根据所述当前用户的所述属性集和系统的主私钥生成所述当前用户的 私钥之前, 所述方法还包括: 验证所述当前用户的属性集属实。 优选地, 在解密所述密文, 得到所述明文和所述访问结构之后, 所述方法还包括: 加密所述访问结构和所述当前用户编辑后的明文; 将加密后得到的密文发送至存储器 进行保存。 优选地, 所述数据加密保护方法应用于云存储系统。 根据本发明实施例的另一方面, 提供了一种数据加密保护系统, 包括: 加密模块, 设置为加密明文和指定的访问结构, 得到密文, 其中, 所述访问结构用于表示有权限 解密所述密文的用户; 解密模块, 设置为解密所述密文, 得到所述明文和所述访问结 构。 优选地, 所述解密模块包括: 计算单元, 设置为利用当前用户的私钥计算会话密 钥, 其中, 所述会话密钥用于解密所述密文; 解密单元, 设置为在计算出所述会话密 钥的情况下, 利用所述会话密钥解密所述密文。 优选地, 所述系统还包括: 私钥生成模块, 设置为根据所述当前用户的属性集和 系统的主私钥生成所述当前用户的私钥。 优选地, 所述系统还包括: 验证模块, 设置为验证所述当前用户的属性集属实。 优选地, 所述加密模块, 还设置为加密所述访问结构和所述当前用户编辑后的明 文; 所述系统还包括: 发送模块, 设置为将加密后得到的密文发送至存储器进行保存。 优选地, 所述数据加密保护系统应用于云存储系统。 通过本发明实施例, 改进基于密文策略的属性加密 ( Ciphertext-Policy
Attribute-Based Encryption, 简称为 CP-ABE) 算法, 将访问结构作为消息的一部分一 起加密, 解决了云存储系统中的多用户间加密信息共享效率低的问题, 既能保证数据 的安全性, 也能在较低的计算开销和通讯开销下实现多用户间的信息共享, 还实现了 对云存储系统中存储文件的细粒度访问控制。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中- 图 1是根据相关技术的加密数据及实现数据共享的流程示意图; 图 2是根据本发明实施例的数据加密保护方法的流程图; 图 3是根据本发明实施例的数据加密保护系统的结构框图; 图 4是根据本发明实施例的数据加密保护系统的优选结构框图一; 图 5是根据本发明实施例的数据加密保护系统的优选结构框图二; 图 6是根据本发明优选实施例的数据加密保护系统的结构及其工作流程示意图; 图 7是根据本发明优选实施例的数据加密保护方法中私钥生成的流程图; 图 8是根据本发明优选实施例的数据加密保护方法中访问结构的二叉树表示的示 意图; 图 9是根据本发明优选实施例的数据加密的流程图; 图 10是根据本发明优选实施例的数据解密和共享的流程图; 图 11是根据本发明优选实施例的数据加密保护方法的总流程图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特征可以相 互组合。 下面将参考附图并结合实施例来详细说明本发明。 本发明实施例提供了一种数据加密保护方法, 图 2是根据本发明实施例的数据加 密保护方法的流程图, 如图 2所示, 包括如下的步骤 S202至步骤 S204。 步骤 S202, 加密明文和指定的访问结构, 得到密文, 其中, 访问结构用于表示有 权限解密该密文的用户。 步骤 S204, 解密上述密文, 得到明文和访问结构。 通过上述步骤, 改进 CP-ABE, 将访问结构作为消息的一部分一起加密, 解决了 云存储系统中的多用户间加密信息共享效率低的问题, 既能保证数据的安全性, 也能 在较低的计算开销和通讯开销下实现多用户间的信息共享, 还实现了对云存储系统中 存储文件的细粒度访问控制。 在一个优选实施方式中,步骤 S204中解密密文包括:利用当前用户的私钥计算会 话密钥, 其中, 会话密钥用于解密密文; 如果计算出会话密钥, 利用会话密钥解密密 文。 优选地, 在解密所述密文之前, 上述方法还包括: 根据当前用户的属性集和系统 的主私钥生成当前用户的私钥。 需要说明的是, 每个用户都有一组属性, 根据用户的属性为每个用户生成对应的 私钥, 加密的时候指定一个访问结构来描述哪些用户可以解密得到明文消息, 即用户 的属性如果满足加密时指定的访问结构, 则可以解密得到明文和访问结构, 否则不能 解密。 在一个优选实施方式中, 在根据当前用户的属性集和系统的主私钥生成当前用户 的私钥之前, 还需要验证当前用户的属性集是否属实。 如果属实, 则进入用户私钥生 成的流程, 如果不属实, 则验证失败, 返回消息给用户。 本优选实施方式在用户的属 性集属实的情况下, 才生成私钥, 可以保证生成的私钥的准确性。 解密密文成功的用户可以根据其需求对得到的明文进行编辑, 需要对编辑后的明 文进行加密, 并存储至云存储系统, 以便于其他用户共享编辑后的数据, 可以通过以 下步骤实现: 在解密密文, 得到明文和访问结构之后, 加密访问结构和当前用户编辑 后的明文; 将加密后得到的密文发送至存储器进行保存。 实际上, 此处的加密与之前 加密原始明文的过程是类似的, 利用同一加密模块即可实现。 对于云存储系统而言, 将编辑后的数据重新加密保存在云存储服务器上供其它用户共享。 优选地, 上述数据加密保护方法可以应用于云存储系统。 需要说明的是, 本方法是对 CP-ABE算法的改进, 改进点在于将访问结构作为消 息的一部分一起加密, 在上述方法中, 具体如何实现加密、 解密以及用户私钥的生成 都是按照 CP-ABE算法实现的, 并不是本发明所述数据加密保护方法关注的重点。 本发明实施例还提供了一种数据加密保护系统, 图 3是根据本发明实施例的数据 加密保护系统的结构框图, 如图 3所示, 该数据加密保护系统包括: 加密模块 32和解 密模块 34。 下面对其结构进行详细描述。 加密模块 32, 设置为加密明文和指定的访问结构, 得到密文, 其中, 访问结构用 于表示有权限解密该密文的用户; 解密模块 34, 耦合至加密模块 32, 设置为解密上述 密文, 得到明文和访问结构。
通过上述数据加密保护系统, 改进 CP-ABE, 加密模块 32将访问结构作为消息的 一部分一起加密, 解决了云存储系统中的多用户间加密信息共享效率低的问题, 既能 保证数据的安全性, 也能在较低的计算开销和通讯开销下实现多用户间的信息共享, 还实现了对云存储系统中存储文件的细粒度访问控制。 如图 4所示, 解密模块 34包括: 计算单元 342, 设置为利用当前用户的私钥计算 会话密钥, 其中, 会话密钥用于解密密文; 解密单元 344, 耦合至计算单元 342, 设置 为在计算出会话密钥的情况下, 利用会话密钥解密密文。 如图 5所示, 上述系统还包括: 私钥生成模块 36, 耦合至解密模块 34, 设置为根 据当前用户的属性集和系统的主私钥生成当前用户的私钥。 优选地, 上述系统还包括: 验证模块 38, 耦合至私钥生成模块 36, 设置为验证当 前用户的属性集属实。 优选地,加密模块 32还设置为加密访问结构和当前用户编辑后的明文; 上述系统 还包括: 发送模块 39 (图中未示出), 耦合至加密模块 32, 设置为将加密后得到的密 文发送至存储器进行保存。 优选地, 上述数据加密保护系统应用于云存储系统。 需要说明的是,装置实施例中描述的数据加密保护系统对应于上述的方法实施例, 其具体的实现过程在方法实施例中已经进行过详细说明, 在此不再赘述。 为了使本发明实施例的技术方案和实现方法更加清楚, 下面将结合优选的实施例 对其实现过程进行详细描述。 根据本发明优选实施例, 提供了一种数据加密保护方法及系统, 该系统解决了云 存储中数据的加密保护增强数据安全性的问题, 保证了云存储系统中数据的机密性, 又能实现细粒度访问控制, 为更安全地实现数据共享提供了一种可行的方法。 图 6是 根据本发明优选实施例的数据加密保护系统的结构及其工作流程示意图,如图 6所示, 该系统主要包括如下模块: 系统初始化模块 602, 用于生成系统的主私钥 (Master Key, 简称为 MK)和公钥 (Public Key, 简称为 PK)。 属性认证模块 604 (实现了上述验证模块 38 的功能), 又称为属性验证中心 (Attribute Certificate Authority, 简称为 ACA), 用于负责验证用户的属性是否属实。 私钥生成模块 (Key Produce Group, 简称为 KPG, 实现了上述私钥生成模块 36 的功能) 606, 用于根据输入的系统主私钥 MK和属性集 S, 生成该属性对应的私钥 SK。 数据加密模块 608 (实现了上述加密模块 32的功能), 用于根据输入的公钥 PK、 消息 m、 解密者的属性需要满足的访问结构 TB, 输出密文。 数据解密模块 610 (实现了上述解密模块 34的功能), 用于根据输入的私钥 SKB (即用户 B的私钥) 和消息 m对应的密文, 在用户 B的属性满足访问结构 TB的情况 下, 解密上述密文, 并成功输出消息!^ 上述优选实施例采用了 CP-ABE算法对数据进行加密存储, 既保证了数据的加密 存储, 又能够实现细粒度访问控制, 尤其是在多用户间数据共享的情况下能更好的保 护数据安全性。 具体地, 云服务器 (即云存储系统的数据存储服务器) 中的所有数据 采用 CP-ABE加密存储,加密时指定了访问该数据的用户的属性必须满足的访问结构, 只要用户的属性满足加密时所指定的访问结构就可以解密密文得到明文, 解决多用户 下数据安全共享的问题。特别是在大用户群中的数据共享比传统的有更低的通信开销。 较优地, 上述优选实施例中的各个模块的工作流程如下: 步骤 1, 系统初始化模块 602生成系统的公钥 PK和系统主私钥 MK。 步骤 2, 属性认证模块 604负责对用户的属性组 S进行验证, 确认用户提供的属 性组是否属实。 步骤 3, 在属性认证模块 604认证用户的属性组 S属实后, 向私钥生成模块 606 发送该用户的属性组 S, 私钥生成模块 606使用系统初始化模块 602生成的 MK, 生 成该属性组 S对应的私钥 SK返回给属性认证模块 604。 步骤 4, 将需要加密保护的数据 M和解密者的属性必须满足的访问结构 T输入到 加密模块 608, 然后在加密模块 608中使用系统初始化模块 602生成的 PK对数据 M 以及上述的访问结构 T使用 CP-ABE算法加密, 最终输出加密后得到的密文, 存储在 云服务器上。 步骤 5, 在用户需要访问云存储中的数据时, 需要向解密模块 610输入自己的私 钥, 如果生成该用户私钥时的属性满足数据 M 加密时指定的访问结构, 则解密模块 610 解密密文得到明文后, 返回给用户。 为了实现多用户间的数据共享, 在解密获取 明文之后还可以,利用密文中的访问结构再次对编辑后的数据加密存储在云服务器中。 通过上述方式可以方便实现多用户之间的数据共享, 并且比传统方式更安全, 进一步 提高了通信开销的利用率。 图 7是根据本发明优选实施例的数据加密保护方法中私钥生成的流程图, 如图 7 所示,在系统初始化时会产生系统公钥 PK和系统主私钥 MK, 并将 MK同步给 KPG, PK同步给数据加密模块 608。 在私钥生成流程中, 包括以下步骤: 步骤 S702, 用户将属性集(即属性组) S提交给属性认证中心(即属性认证模块、 属性验证中心) 604进行认证, 如果认证失败, 直接返回。 步骤 S704, 在属性认证中心 604对属性认证成功的情况下, 将属性集 S发给私钥 生成模块 606。 步骤 S706, 私钥生成模块 606计算属性集 S对应的私钥 SK, 并将 SK返回给属 性认证中心 604。 步骤 S708, 属性认证中心 604将私钥 SK返回给用户。 因为加密时需要指定解密者属性 (属性集、 属性组) 必须满足的访问结构, 这里 访问结构可以由一棵二叉树表示。 图 8是根据本发明优选实施例的数据加密保护方法 中访问结构的二叉树表示的示意图, 如图 8所示, 这个二叉树的叶子节点表示属性, 非叶子节点是逻辑关系, 一般是 "与"和"或"的逻辑关系。 图 8所示的访问结构可以表 示为一个矩阵, 如下所示:
Figure imgf000011_0001
如果用户的属性集满足这个访问结构, 则该属性集对应的行可以线性表示向量, 例如 [1,0,0,0]。 图 9是根据本发明优选实施例的数据加密的流程图, 如图 9所示,在加密流程中, 包括以下步骤: 步骤 S902,用户将需要加密的数据 M和解密者的属性必须满足的访问结构1 发 送给数据加密模块 608。 步骤 S904, 数据加密模块 608使用 CP-ABE算法对数据 M进行加密, 并将访问 结构 T也保存在密文中。 步骤 S906, 数据加密模块 608将加密后得到的密文数据发送至云服务器。 步骤 S908, 云服务器保存加密后的密文数据。 图 10是根据本发明优选实施例的数据解密和共享的流程图, 如图 10所示, 在解 密和共享的流程中, 包括以下步骤: 步骤 S 1002, 用户向云服务器请求内容。 步骤 S1004, 云服务器返回密文 C给用户。 步骤 S1006, 用户将自己的私钥 SK和密文 C发给数据解密模块 610。 步骤 S1008, 数据解密模块 610用私钥 SK解密密文 C, 得到明文 M和访问结构
T, 并将明文 Μ和访问结构 Τ返回给用户。 步骤 S1010, 用户阅读明文 Μ, 并可以对明文 Μ进行编辑。 步骤 S1012, 在用户需要编辑明文 Μ, 并希望将编辑后的数据保存在云服务器中 和其他用户共享的情况下,则将编辑后的明文 Μ和访问结构 Τ发给数据加密模块 608。 步骤 S1014, 数据加密模块 608采用 CP-ABE算法对明文 M加密。 步骤 S1016, 数据加密模块 608将加密后的数据 C保存在云服务器上。 图 11是根据本发明优选实施例的数据加密保护方法的总流程图, 如图 11所示, 将上述图 7、 图 9、 图 10所示的流程结合在一起就得到了本优选实施例的完整技术方 案, 此处不再赘述。 需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的 计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是在某些情况下, 可 以以不同于此处的顺序执行所示出或描述的步骤。 综上所述, 本发明的上述实施例或优选实施方式涉及云计算、 云存储以及其他需 要将数据存储在第三方平台的应用领域, 对这样存储在第三方的数据的安全性提出一 种云存储系统的数据保护系统及其相应的加密解密方法, 特别是第三方不可信的情况 下, 这套系统能满足数据的共享、 灵活的访问控制和数据的机密性、 完整性, 防止信 息泄露带来的损失和危害。 并且能够在较低的通信开销下实现多用户的信息共享, 用 户在获取云存储中的数据后进行编辑, 然后重新采用 CP-ABE算法加密保存在云服务 器中共享给其他用户。 本发明实施例将存储在云服务器上的数据采用 CP-ABE算法加密存储, 能实现细 粒度访问控制, 既保证了数据的机密性, 又能更安全地实现数据共享。 本发明的上述 实施例中, 在加密时只需要指定一个访问结构 T (而不是用户的公钥), 只要用户的属 性能够满足这个访问结构, 就可以解密获取到明文, 解密后再使用访问结构 T加密保 存在云服务器中, 这就实现了多用户下的信息共享, 并且保存的数据时密文存储, 保 证了信息的机密性。 并且不关心具体哪些用户可以解密, 跟用户数量无关, 密文长度 也和用户数无关, 特别适合大用户下的信息安全共享。 工业实用性 本发明的上述实施例不需要对存储系统的结构进行任何改变, 从而能够兼容多种 存储结构的系统, 具有广泛的应用前景。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 或者将它们分别制作成各个集成电路模 块, 或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明 不限制于任何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种数据加密保护方法, 包括:
加密明文和指定的访问结构, 得到密文, 其中, 所述访问结构用于表示有 权限解密所述密文的用户;
解密所述密文, 得到所述明文和所述访问结构。
2. 根据权利要求 1所述的方法, 其中, 解密所述密文包括:
利用当前用户的私钥计算会话密钥, 其中, 所述会话密钥用于解密所述密 文;
如果计算出所述会话密钥, 利用所述会话密钥解密所述密文。
3. 根据权利要求 2所述的方法, 其中, 在解密所述密文之前, 所述方法还包括: 根据所述当前用户的属性集和系统的主私钥生成所述当前用户的私钥。
4. 根据权利要求 3所述的方法, 其中, 在根据所述当前用户的所述属性集和系统 的主私钥生成所述当前用户的私钥之前, 所述方法还包括:
验证所述当前用户的属性集属实。
5. 根据权利要求 1至 4中任一项所述的方法, 其中, 在解密所述密文, 得到所述 明文和所述访问结构之后, 所述方法还包括:
加密所述访问结构和所述当前用户编辑后的明文;
将加密后得到的密文发送至存储器进行保存。
6. 根据权利要求 1至 4中任一项所述的方法, 其中, 所述数据加密保护方法应用 于云存储系统。
7. 一种数据加密保护系统, 包括:
加密模块, 设置为加密明文和指定的访问结构, 得到密文, 其中, 所述访 问结构用于表示有权限解密所述密文的用户;
解密模块, 设置为解密所述密文, 得到所述明文和所述访问结构。
8. 根据权利要求 7所述的系统, 其中, 所述解密模块包括: 计算单元, 设置为利用当前用户的私钥计算会话密钥, 其中, 所述会话密 钥用于解密所述密文;
解密单元, 设置为在计算出所述会话密钥的情况下, 利用所述会话密钥解 密所述密文。
9. 根据权利要求 8所述的系统, 其中, 所述系统还包括:
私钥生成模块, 设置为根据所述当前用户的属性集和系统的主私钥生成所 述当前用户的私钥。
10. 根据权利要求 9所述的系统, 其中, 所述系统还包括:
验证模块, 设置为验证所述当前用户的属性集属实。
11. 根据权利要求 7至 10中任一项所述的系统, 其中,
所述加密模块,还设置为加密所述访问结构和所述当前用户编辑后的明文; 所述系统还包括: 发送模块, 设置为将加密后得到的密文发送至存储器进 行保存。
12. 根据权利要求 7至 10中任一项所述的系统,其中,所述数据加密保护系统应用 于云存储系统。
PCT/CN2013/082486 2013-01-28 2013-08-28 数据加密保护方法及系统 WO2014114080A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2013100328859A CN103152322A (zh) 2013-01-28 2013-01-28 数据加密保护方法及系统
CN201310032885.9 2013-01-28

Publications (1)

Publication Number Publication Date
WO2014114080A1 true WO2014114080A1 (zh) 2014-07-31

Family

ID=48550185

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/082486 WO2014114080A1 (zh) 2013-01-28 2013-08-28 数据加密保护方法及系统

Country Status (2)

Country Link
CN (1) CN103152322A (zh)
WO (1) WO2014114080A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737785A (zh) * 2021-01-06 2021-04-30 江西清能高科技术有限公司 一种用于复杂访问策略的属性基加密方法、系统及设备

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152322A (zh) * 2013-01-28 2013-06-12 中兴通讯股份有限公司 数据加密保护方法及系统
CN104639322B (zh) * 2013-11-13 2018-08-24 航天信息股份有限公司 带有证书的含有属性的基于身份加密的方法
US10140460B2 (en) 2013-12-11 2018-11-27 Mitsubishi Electric Corporation File storage system and user terminal
CN103746962B (zh) * 2013-12-12 2017-01-25 华南理工大学 一种goose电力实时报文加解密方法
CN104144056B (zh) * 2014-07-10 2017-05-17 北京大学 一种自主授权的cp‑abe系统和方法
CN104935576A (zh) * 2015-04-28 2015-09-23 广州大学 数据安全分存和指定用户分享系统
CN106487763B (zh) * 2015-08-31 2020-01-10 腾讯科技(深圳)有限公司 一种基于云计算平台的数据访问方法及用户终端
CN106131013A (zh) * 2016-07-06 2016-11-16 杨炳 一种数据加密保护系统
CN106790273B (zh) * 2017-02-17 2020-08-21 北京同有飞骥科技股份有限公司 分布式文件系统中流媒体数据的加密存储方法和装置
CN108200181B (zh) * 2018-01-11 2021-03-19 中国人民解放军战略支援部队信息工程大学 一种面向云存储的可撤销属性基加密系统及方法
CN109951498A (zh) * 2019-04-18 2019-06-28 中央财经大学 一种基于密文策略属性加密的区块链访问控制方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546764A (zh) * 2011-12-20 2012-07-04 华中科技大学 一种云存储系统的安全访问方法
CN102624522A (zh) * 2012-03-30 2012-08-01 华中科技大学 一种基于文件属性的密钥加密方法
WO2012161417A1 (ko) * 2011-05-26 2012-11-29 동국대학교 경주캠퍼스 산학협력단 클라우드 컴퓨팅 환경에서의 접근 권한 분산 관리 장치 및 그 방법
CN103152322A (zh) * 2013-01-28 2013-06-12 中兴通讯股份有限公司 数据加密保护方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799853A (zh) * 2010-03-05 2010-08-11 中国人民解放军国防科学技术大学 一种层次化信息加密共享方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012161417A1 (ko) * 2011-05-26 2012-11-29 동국대학교 경주캠퍼스 산학협력단 클라우드 컴퓨팅 환경에서의 접근 권한 분산 관리 장치 및 그 방법
CN102546764A (zh) * 2011-12-20 2012-07-04 华中科技大学 一种云存储系统的安全访问方法
CN102624522A (zh) * 2012-03-30 2012-08-01 华中科技大学 一种基于文件属性的密钥加密方法
CN103152322A (zh) * 2013-01-28 2013-06-12 中兴通讯股份有限公司 数据加密保护方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737785A (zh) * 2021-01-06 2021-04-30 江西清能高科技术有限公司 一种用于复杂访问策略的属性基加密方法、系统及设备

Also Published As

Publication number Publication date
CN103152322A (zh) 2013-06-12

Similar Documents

Publication Publication Date Title
Zhang et al. Data security and privacy-preserving in edge computing paradigm: Survey and open issues
CN109144961B (zh) 授权文件共享方法及装置
CN109040045B (zh) 一种基于密文策略属性基加密的云存储访问控制方法
CN110474893B (zh) 一种异构跨信任域密态数据安全分享方法及系统
CN109829326B (zh) 基于区块链的跨域认证与公平审计去重云存储系统
WO2014114080A1 (zh) 数据加密保护方法及系统
JP3864249B2 (ja) 暗号通信システム、その端末装置及びサーバ
WO2020042822A1 (zh) 密码运算、创建工作密钥的方法、密码服务平台及设备
WO2023044963A1 (zh) 一种基于属性条件门限代理重加密方法和系统
Premkamal et al. Enhanced attribute based access control with secure deduplication for big data storage in cloud
CN111614680B (zh) 一种基于cp-abe的可追溯云存储访问控制方法和系统
Wang et al. A pre-authentication approach to proxy re-encryption in big data context
CN113360925A (zh) 电力信息物理系统中可信数据的存储和访问方法及系统
CN113411323B (zh) 基于属性加密的医疗病历数据访问控制系统及方法
Murugesan et al. Analysis on homomorphic technique for data security in fog computing
Tiwari et al. SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation
Zhang et al. Cerberus: Privacy-preserving computation in edge computing
Chougule et al. Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain
Wu et al. A trusted and efficient cloud computing service with personal health record
CN113630448A (zh) 分布式加密存储方法和系统、计算机设备和可读存储介质
CN114091058A (zh) 在第一区域和第二区域间数据安全共享的方法和系统
Fu et al. Secure storage of data in cloud computing
CN113312647A (zh) 一种基于区块链存储的多代理数据共享方法
Zhou et al. A Trustworthy Ciphertext-Policy Attribute-Based Encryption Access Control Method Based on FAME and Blockchain
Tian et al. Fine‐grained assured insertion and deletion scheme based on onion encryption in cloud storage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13872720

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13872720

Country of ref document: EP

Kind code of ref document: A1