Font Size: a A A

Research On Revocable Attribute Based Encryption In Cloud Computing

Posted on:2021-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q WangFull Text:PDF
GTID:2428330611467608Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the information age,cloud computing and other new technologies have been widely used in various fields of society.Cloud storage,as the most basic function in cloud computing,can solve all kinds of massive data storage problems.However,due to some limitations of the cloud storage system,the security of data stored in the cloud environment is increasingly valued by individuals and enterprises.In this case,attribute-based encryption technology came into being.Attribute-Based Encryption(ABE)is an access control method for data.One of the key points to improve the efficiency of attribute-based encryption is to improve the efficiency of attribute revocation.However,due to the many-to-many relationship between users and attributes,attribute revocation becomes more complicated.Therefore,research on attribute-based encryption schemes that support attribute revocation has attracted the attention of many researchers.This paper conducts related research on the existing attribute-based encryption technology that supports attribute revocation.The specific work includes the following:(1)Summarizes the research status of attribute-based encryption technologies that supports revocation at home and abroad,and give a brief introduction to the attribute-based encryption mechanism.(2)Through the research and analysis of the existing attribute-based encryption schemes,it is considered that the current attribute-based encryption schemes that support attribute revocation have the problems of high attribute revocation cost and low efficiency,and an outsourcing encryption and decryption CP-supporting attribute revocation is proposed.ABE program,and comprehensive analysis of the program from performance analysis,security analysis and experimental proof.(3)In the traditional attribute revocation scheme,there are problems such as users leaking or selling their own private keys,and user attributes cannot be revoked immediately,and a traceable and reversible ordered binary decision diagram(Ordered Binary Decision Diagram,OBDD)CP-ABE scheme of access structure,and through theoretical analysis and experiments prove that this scheme can track malicious users and is safe based on the DBDH assumption.The innovation of the research work in this article is mainly reflected in the following aspects:(1)Aiming at the problem of high cost and low efficiency of attribute revocation in current attribute-based encryption schemes that support attribute revocation,an outsourcing encryption-decryption CP-ABE scheme that supports attribute revocation is proposed.Outsourcing technology is introduced to ensure the premise of security Next,outsource complex calculations to proxy servers to reduce users' computational costs.An effective attribute revocation method is proposed.The scheme only needs to update the ciphertext and user key components associated with the revocation attribute to achieve safe and efficient attribute revocation.At the same time,the two-factor identity authentication mechanism is used to solve user collusion attacks.problem.(2)In the existing attribute revocation scheme,there is the problem of untraceability for malicious users and the user attribute cannot be revoked immediately.A traceable and revocable,efficient,expressive,and Compared with the traditional attribute revocation scheme,the revoked and anti-collusion CP-ABE scheme realizes the instant revocation of user attributes and can also track malicious users.At the same time,the proposed scheme uses an OBDD-based access structure.This type of access structure can not only represent any Boolean expressions about attributes,but also support the positive and negative values of attributes in the access strategy.The key length does not vary with the number of attributes.With a proportional change,the length of the ciphertext is only related to the number of effective paths in the access strategy.
Keywords/Search Tags:Cloud Storage, Attribute-based Encryption, Attribute Revocation, Ordered Binary Decision Diagram, Traceablility
PDF Full Text Request
Related items