Font Size: a A A

Research On CP-ABE Encryption Technology In Cloud Computing

Posted on:2020-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:X YiFull Text:PDF
GTID:2428330575991169Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a business computing model that virtualizes a pool of computer resources and provides services on demand.In today's era of data explosion,it plays a very important role.The cloud computing platform continues to provide services for technologies in the technology,education,and medical industries.At the same time,it is also changing the development model and direction of future technology services.However,with the rapid development of cloud computing,its own security issues have become increasingly prominent.One of the most critical cloud security issues is access control.At present,the most effective technical method to solve the security problem in the cloud environment is to combine the traditional access control technology with the current improved and extended cryptography technology,in order to further solve the new requirements of cloud security.Some scholars have proposed an attribute-based encryption mechanism(CP-ABE)based on ciphertext strategy.Although the algorithm is flexible,efficient,dynamic and private,the flexibility and security of the CP-ABE algorithm need to be further developed in the process of applying it to the cloud platform.1.A ciphertext policy attribute-based encryption scheme with a policy that can be changed in combination with the Hadoop platform is proposed.The authorization authority is combined with the Hadoop platform to improve the authorization efficiency;the fixed ciphertext length is adopted,and the encryption and decryption process is independent of the number of attributes to reduce the corresponding calculation overhead;and the intermediate key and the user private key including the user attribute identifier ID are combined to decrypt the file,Resist the user's collusion attack and private key leakage;when the policy is updated,the cloud service provider performs proxy re-encryption on the ciphertext to prevent the encrypted information from being leaked.2.This paper proposes a responsible multi-keyword ciphertext search scheme based on CP-ABE technology,and introduces a tracking algorithm.When a user leaks or sells his private key,he can run the tracking algorithm to input his private key.Tracking the illegal user and chasing the user.If the user is determined to be a leaker,it can be revoked from the system to ensure the security of the system.The scheme has proven to be responsible and based on q'-SDH assumptions that are safe.At the same time,the scheme divides the encryption phase into offline encryption and online encryption,which effectively reduces the calculation amount of online encryption and improves the overall operating efficiency of the system.In addition,the program also supports multi-keyword query,narrowing the scope of the query for users,and improving search efficiency.3.The proposed two attribute-based encryption schemes are applied in the transportation system under the actual cloud environment.The scheme is analyzed and has a good practical effect in practical applications.
Keywords/Search Tags:cloud computing, attribute base encryption, hadoop, searchable enctyption
PDF Full Text Request
Related items