Font Size: a A A

Design And Implementation Of A Linux Security Module Based On Attribute Encryption

Posted on:2018-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:P F SunFull Text:PDF
GTID:2428330569985445Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the interaction and sharing of data more and more frequently,in order to improve and protect users access to shared resources,access control technology has become an indispensable technology,but the traditional access control technology has been authorized to particles too large,Not enough fine and other issues.Therefore,based on Attribute Based Encryption(ABE),an access control scheme of Linux Security Module(LSM)based on attribute encryption is proposed,which assigns corresponding to each user Attribute tag,according to whether the user attribute to meet the access strategy to determine whether the user can access the corresponding resources,innovative attribute encryption algorithm integrated into the Linux security module,when the user access to computer resources,the security module based on user attributes to make this decision Access can be carried out to solve the general access control authorization particles too large authorization is not fine and so on.At the same time,the decision model and system module design of the access control scheme are given.From the practical point of view,the function of the main work module such as user attribute management,attribute revocation scheme,LSM module design and daemon process is designed,The traditional attribute encryption scheme is optimized from the perspective of strategy comparison and selection of optimal access tree,and the core data structure and main algorithm flow of the main module are given.Then,in the simulation environment,the functional integrity,algorithm efficiency and security of the access control scheme are tested and analyzed.The scheme can realize the user's attribute-based access to the resource in the Linux environment.The improved algorithm can achieve Good optimization effect.Finally,according to the experimental results,the shortcomings of the access control scheme and the areas that can be improved are analyzed.
Keywords/Search Tags:Linux security modules, ABE, Role-based access, Access control
PDF Full Text Request
Related items