Font Size: a A A

The Implement Of Outsourcing The Decryption Of ABE In Cloud Storage

Posted on:2019-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:M HeFull Text:PDF
GTID:2428330551960307Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Today,data from all walks of life is growing rapidly.Whether commercial enterprises have large amounts of customer data,or medical personal medical information or scientific research data,they all require huge storage space and computing services.In this situation,the emergence of cloud computing has advanced the progress of the entire social industry.Once this kind of virtual resources appeared,it was favored because of its ease of use and low prices.It was even called the third information technology revolution.However,these factors have a great impact on user experience and even affect the development of information technology because cloud servers are not trusted or related practitioners buy and sell private information for economic purposes,and there may be an attacker stealing information and causing information to be illegally accessed.For the above reasons,people think that they can encrypt information and then upload it to the cloud server.Considering the problem of secure channels,a simple symmetric encryption system is inconvenient in practical use.Because of the uncertainty of the information visitor in the cloud storage application,we do not know the identity of the recipient of the information.Therefore we cannot use the traditional public key cryptosystem and the identity-based cryptosystem.In the case of using cloud storage,although the user is not sure of the specific identity of each information recipient,there is a fixed group.Each user in the target group has common attributes,and the attributebased encryption system is the most suitable cryptographic mechanism for considering information security issues in cloud computing.However,attribute-based encryption relies on the access structure.With the increase of the complexity of the access structure,the size of the ciphertext and the time of decryption on the client will also increase.In this case,outsourcing decryption of ciphertext is a very valuable topic in practical applications.In this thesis,we will discuss the application of outsourced and decrypted attribute-based encryption in cloud storage with practical applications.To improve security and the efficiency of using cloud services,we will study from the following aspects: First,in-depth research outsourced decrypted attribute-based cryptosystems,including access structures and related mathematical knowledge used,and a safe and efficient achievable outsourced attribute-based encryption scheme;secondly,the tools to be used to implement this solution in cloud computing Development of running software and hardware and selected system platform;Finally,the final system will be developed,while ensuring its security and operability.
Keywords/Search Tags:Outsource decryption, Attribute-based encryption, Cloud storage, Bilinear pairing
PDF Full Text Request
Related items