Font Size: a A A

Design And Analysis Of The Algorithm Used To Revocate The Attributes In The Cloud Computing

Posted on:2017-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y M HanFull Text:PDF
GTID:2308330491951715Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, modern society has entered the era of information, more and more people began to use the Internet to make online purchases and electronic transactions. However, the uncontrolled access to network resources and the spread of them will cause a lot of leakage of sensitive information of users, which makes it obvious that privacy protection plays a significant role in our daily life. Attribute-Based Encryption(ABE) is one of the effective strategies to protect users’ privacy, in which data providers do not need to know who receivers are and the only thing providers should know is a series of descriptive attributes that are useful when encrypting message with their defined access structure. Decryption only happens when user’s key meet certain conditions that are defined by data providers.The actual attribute-based encryption applications often have demands such as change of user priority, cancelation of user account and change or removal of the certain attribute, which means that it is indispensable for management system to govern the users, their attributes and system attributes. Attributes revocation mechanism is very important, so it has become one of the focuses in last few years.The thesis firstly describes the background and research status of attributes revocation in the attribute-based encryption mechanism, analyzes the attributes revocation in depth and compares and summarizes classical schemes in area of attributes revocation. Then a CP-ABE scheme supports indirect attributes revocation is proposed on the basis of existing schemes. In the scheme, a tagging mechanism is adopted to revoke attributes based on CP-ABE. Finally, the thesis not only analyzes adaptation of the scheme in theory, but also implements it to verify the efficiency of the proposed scheme.
Keywords/Search Tags:Cloud computing, Property group encryption, Property revocation, Indirect revocation
PDF Full Text Request
Related items