Font Size: a A A

Research On Location Hierarchical Access Control Scheme Based On Attribute Encryption

Posted on:2020-09-15Degree:MasterType:Thesis
Country:ChinaCandidate:H Y CuiFull Text:PDF
GTID:2428330623965265Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing,services relying on location information are gradually increasing.People enjoy the convenience of services and pay more attention to the security of location information.Commonly used location encryption methods generally achieve information protection by blurring the real location or sending false locations to attackers.In practical applications,hierarchical division of location information is more suitable for people's growing security needs.The attribute-based location hierarchical access control scheme divides the location information into different levels according to the importance of the attributes,allowing users to define access policies according to their own needs,and achieves fine-grained and efficient access control.However,during the running of the system,there is a possibility that the key will be leaked,and the user will have the need to change the attribute information of the user.Therefore,support for revocation is very necessary for system security.In addition,the attribute-based cryptosystem of the ciphertext strategy used by the scheme also has the disadvantages of large computational burden and slow operation speed when encrypting information with hierarchical structure.Attribute revocation mechanism: When the attribute authority initializes,it sets the corresponding attribute number and public attribute key for each attribute in the system,and calculates with the trusted agent,for the ciphertext and key of the unrevoked attribute user.Update,implement attribute revocation;set a revocation list,and reach a corresponding agreement with the agent,the person deleted from the list no longer has access rights,and achieve the purpose of user revocation.In view of the above problems,the paper makes an in-depth study on attribute-based location layered encryption scheme.In order to improve security,a fine-grained revocation mechanism has been added.First,the authoritative organization and the agent collaborate to calculate,and the user's key and ciphertext are updated by the attribute number and attribute key set by the authority to realize the revocation of the attribute,and then the refusal is deleted by setting the revocation list.The user decrypts and implements user revocation.At the same time,a two-factor authentication mechanism is introduced,which uses user login and user registration algorithms to further improve security.In order to improve the decryption efficiency,some complicated calculations are outsourced to agents,which reduces the user's computing burden.The security of the scheme is analyzed under the standard model of the plaintext attack.Finally,through the performance analysis and experimental simulation of the scheme,it is concluded that the research results can reduce the computational cost of the user while maintaining the advantages of the original scheme algorithm.Fine-grained access control enhances the security of the algorithm.The paper has 16 pictures,4 tables and 68 references.
Keywords/Search Tags:attribute encryption, revocation, location hierarchical, access control, decryption outsourcing, two-factor authentication
PDF Full Text Request
Related items