Computer Science ›› 2018, Vol. 45 ›› Issue (11): 176-179.doi: 10.11896/j.issn.1002-137X.2018.11.027

• Information Security • Previous Articles     Next Articles

Removable Attribute Encryption Access Control Algorithm Based on CP-ABE

TU Yuan-fei1,2,3, GAO Zhen-yu3, LI Rong-yu3   

  1. (College of Communications & Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)1
    (Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003,China)2
    (College of Computer Science & Technology,Nanjing Tech University,Nanjing 211800,China)3
  • Received:2017-07-21 Published:2019-02-25

Abstract: In order to enhance the security of the computer network and ensure that the information resources in the network will not be used illegally,access control is needed.Based on the access control algorithm of grid virtual organization,the existing algorithms established a different trust domain in the grid,achieved the identity and behavior based access control strategy between the hosts,realized the cross-domain access control of grid virtual organization and the establishment of mutual trust in the core algorithm and logical reasoning,so as to achieve access control algorithm.But these algorithms may make the illegal network as a secure network,so the accuracy of access control is not high.In order to achieve the access control,a removable attribute encryption access control algorithm based on CP-ABE was proposed.First,the access tree based on CP-ABE which can be used to encrypt the access control is constructed.Initial building and key generation of access control are completed through CP-ABE.On the basis of this,writing new file creation,new user authorization,revocation of users,file access and other aspects of the processare designed in the encryption algorithm and decryption algorithm,so as to improve the access control effect of revocable attribute encryption access control algorithm.The experimental results show that the proposed algorithm is easy to control,the consuming time of access control is reduced and the control effect is better.In addition,the implementation process of proposed method is simplified,and this study plays a positive role in the development of research in this field.

第11期屠袁飞,等:基于CP-ABE的可撤销属性加密访问控制算法

Key words: Access control, CP-ABE, Revocable attribute encryption

CLC Number: 

  • TP393
[1]MA J.Design and implementation access control system based on the AWS[J].Electronic Design Engineering,2016,24(6):182-184.(in Chinese)
马洁.基于AWS的访问控制系统设计与实现[J].电子设计工程,2016,24(6):182-184.
[2]HU X Y.Cloud Storage Data Dynamic Access Control Method Research and Simulation[J].Computer Simulation,2017,34(3):365-368.(in Chinese)
胡晓燕.云计算存储数据动态访问控制方法研究与仿真[J].计算机仿真,2017,34(3):365-368.
[3]ZHOU M K.Design for Strategy of Safety Access Control Cloud Computing Based on CP-ABE and Improved Attribute Encryption[J].Computer Measurement & Control,2015,23(1):297-299.(in Chinese)
周明快.基于CP-ABE的云计算改进属性加密安全访问控制策略设计[J].计算机测量与控制,2015,23(1):297-299.
[4]HUANG Z P.Efficient Concurrent Access Control Algorithm Based on Distributed B Tree Encoding[J].Bulletin of Science and Technology,2015,31(8):81-83.(in Chinese)
黄正鹏.基于分布式B树编译的高效并发访问控制算法[J].科技通报,2015,31(8):81-83.
[5]WANG T,YU J P,HUANG M Q.A Fast ABE Scheme in Access Control of Cloud Storage[J].Science Technology and Engineering,2017,17(1):54-60.(in Chinese)
王廷,喻建平,黄敏强.云存储访问控制中的快速属性基加密方案[J].科学技术与工程,2017,17(1):54-60.
[6]LIU Y,CHEN C K,CUI Z R.Optimization Research on Adaptive Back off Tuning Medium Access Control Algorithm[J].Computer Engineering,2017,43(1):162-167.(in Chinese)
刘云,陈昌凯,崔自如.自适应退避调整介质访问控制算法的优化研究[J].计算机工程,2017,43(1):162-167.
[7]TU Y F,XIA F,YANG G.Privacy-preserving Ciphertext-Policy Attribute-Based Encryption in Hybrid Cloud[J].Microelectronics & Computer,2016,33(10):53-58.(in Chinese)
屠袁飞,夏峰,杨庚.混合云下面向隐私保护的访问控制方法[J].微电子学与计算机,2016,33(10):53-58.
[8]ZHANG X Y.Research on access control algorithm of heterogeneous services polymerizatio[J].Journal of Sichuan University(Natural Science Edition),2015,52(6):1277-1284.(in Chinese)
张秀玉.异构服务聚合的协同访问控制算法研究[J].四川大学学报(自然科学版),2015,52(6):1277-1284.
[9]PAN Y,YUAN C A,LI W J,et al.Access Control Method for Supporting Update Operations in Dataspace[J].Journal of Electronics & Information Technology,2016,38(8):1935-1941.(in Chinese)
潘颖,元昌安,李文敬,等.一种支持更新操作的数据空间访问控制方法[J].电子与信息学报,2016,38(8):1935-1941.
[10]WANG J Y,FENG L X,ZHENG X F.Attribute-based access control model for cloud computing[J].Journal of Central South University (Science and Technology),2015,46(6):2090-2097.(in Chinese)
王静宇,冯黎晓,郑雪峰.一种面向云计算环境的属性访问控制模型[J].中南大学学报(自然科学版),2015,46(6):2090-2097.
[11]HUANG Z P.Efficient Concurrent Access Control Algorithm Based on Distributed B Tree Encoding[J].Bulletin of Science and Technology,2015,31(8):81-83.(in Chinese)
黄正鹏.基于分布式B树编译的高效并发访问控制算法[J].科技通报,2015,31(8):81-83. LIU C Y,YU W S.Access Control Model of Learning Flow Based on Task and Role.Journal of Chongqing University of Technology(Natural Science),2013,27(12):72-76.(in Chinese)
刘长勇,余文森.基于任务和角色的学习流访问控制模型.重庆理工大学学报(自然科学),2013,27(12):72-76.
[1] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[2] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[3] GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316.
[4] CHENG Xue-lin, YANG Xiao-hu, ZHUO Chong-kui. Research and Implementation of Data Authority Control Model Based on Organization [J]. Computer Science, 2021, 48(6A): 558-562.
[5] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[6] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[7] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[8] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[9] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[10] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[11] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[12] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[13] TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299.
[14] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[15] WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun. Client Puzzle Based Access Control Model in Public Blockchain [J]. Computer Science, 2019, 46(4): 129-136.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!