Font Size: a A A

Application Research Of Access Control Technology Based On Attribute And Role

Posted on:2020-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:H BiFull Text:PDF
GTID:2428330578465263Subject:Engineering
Abstract/Summary:PDF Full Text Request
The rise of cloud computing big data has brought a good solution for distributed computing,and it is also a test of network security.Cloud storage clusters have become the primary target of illegal access and cyber attacks.The role-based access control technology has been difficult to meet the needs.In order to ensure that only users who meet the rights to access the data in the cloud storage and ensure the security of data transmission and storage,this paper optimizes the cloud storage scheme based on attribute encryption.Utilizing the unique advantages of attribute encryption,flexible and fine-grained access control for user requests based on user attribute information and access control policies.This paper first analyzes the problems faced by current access control technologies from the research background and significance of role-based and attribute-based encryption,especially the current role-based access control technology,which cannot meet the requirements in a large-scale open network environment.Granular access control requirements clarify the need to address cloud storage security issues using ABE technology in attribute-based access control.Then,the architecture and algorithm of multiple attribute encryption are compared and analyzed,and the idea of third-party proxy decryption is used to optimize the CP-ABE algorithm in attribute encryption to overcome the problem of updating the key and ciphertext of the original algorithm when the attribute is revoked.Secondly,multiple encryption is applied to the attribute encryption scheme,and the advantages of high efficiency of symmetric encryption operation and flexibility of attribute encryption control are exerted,and performance comparison experiments of multiple encryption and individual attribute encryption are completed.Finally,the cloud storage scheme based on attribute encryption is designed,and the software and hardware experiment platform is built.By experimenting and testing the influence of the number of attributes on the operation efficiency of the solution,the security protection and fine-grained access control of the file resources in the cloud storage are realized.The feasibility and practicability of this paper can solve the access control problem in cloud storage to a certain extent.
Keywords/Search Tags:Attribute Encryption, Role, Access Control, Cloud Storage, Proxy Decryption
PDF Full Text Request
Related items