Font Size: a A A

Research On The Access Control Policy Of Outsourcing Database Based On Attribute Encryption

Posted on:2018-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:F W JiaFull Text:PDF
GTID:2348330542483649Subject:Information Security and Electronic Commerce
Abstract/Summary:PDF Full Text Request
With the increasing popularity of cloud computing and cloud storage technology,database outsourcing is a database service model.More and more users and companies transfer the local database to the database services provided by the third party.Users no longer care about the installation,deployment,version update,fault handling,hardware maintenance and security backup of the database.They just need to focus on the use of the business database,thereby reducing user costs.First,there are some risks such as database data security and user privacy disclosure when the users use the database service.The security access control has become a problem that can not be neglected when the database is running under the database outsourcing.Second,the complexity of the third-party database service provider's environment,can not avoid the database stored on the server will not be attacked by malicious attacks and abnormal access,so different users access control more difficult.Finally,the usual local database take the identity of the user control,different users will be assigned to different identities to differentiate the permission level,while in the database outsourcing process,once the attacker access to the database administrator permissions,then the entire database data will be exposed.There are three main innovations in this paper:(1)Define the attribute weights and propose an access control scheme based on attribute weights.The definition of the concept of ordinary attribute weight,detailed description of the relational database under the weight of the calculation.The weight quantifies the extent to which each encryption attribute affects database access control and consolidates the database owner's ability to control the database.Three kinds of database access control schemes based on attribute weighting are proposed.Users can use different access control methods according to the diversity of requirements and implementation environment,so that the access control of database can be diversified.(2)A Weighted Ciphertext Policy Attribute Encryption(WCPABE)algorithm is designed for the database storage security characteristics of the outsourced database.Compared with the original Ciphertext Policy Attribute Encryption(CPABE)algorithm,it has the advantage of distinguishing attribute status and improving the efficiency of decryption failure and strengthening control.The security model of the algorithm is established by the theory of cryptography,and the security of WCPABE algorithm is demonstrated.(3)WCPABE provides an efficient and secure access to the database when it is outsourced to a third party,which enhances the security of the database and effectively solves the problem of multi-user private key distribution and management.In the end,this paper proves the feasibility and validity of the WCPABE scheme by the simulation experiment,which makes the database owner have more access control means and enhanced the security of the database when using the third party database.
Keywords/Search Tags:Database secutity, Attribute based encryption, Access control, Database outsourcing
PDF Full Text Request
Related items