Font Size: a A A

The Research On Attribute-based Encryption Based On Outsourcing Calculations

Posted on:2018-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:W Y LiuFull Text:PDF
GTID:2348330536479631Subject:Information security
Abstract/Summary:PDF Full Text Request
Internet of Things as the future direction of the development of intelligent technology,has become increasingly popular.But the characteristics of limited computing resources has become a major constraint on its development,and the development of cloud storage technology for the application of things to provide a new solution,the combination of the two applications are becoming more and more widely.But with the development of technology,the traditional access control model is difficult to adapt to the Internet of things and cloud storage environment,and the cloud agent's non-complete identity characteristics make privacy information exposed to extremely vulnerable to malicious theft and disclosure of the environment.The emergence of attribute-based encryption system can provide a reliable and effective new mode of access control for Internet of Things applications.Outsourcing decryption and policy hiding can solve the problem of privacy disclosure in cloud storage agent.Based on the study of the encryption structure of the outsourced decryption,this paper proposes two sets of cryptographic strategies based on the CP-ABE scheme of Waters and Ibraimi,which are based on the access structure,And the program is used in the smart grid and car networking applications for analysis.Compared with the original scheme and the same type of scheme,the superiority of the new scheme proposed in this paper is shown.Finally,by writing the algorithm program,the simulation experiment is carried out,and the result is statistically analyzed and verified,which proves the safety and efficiency of the scheme.
Keywords/Search Tags:outsourcing decryption, attribute base encryption, Internet of things, strategy hiding, cloud storage
PDF Full Text Request
Related items