Font Size: a A A

Research On Attribute-based Encryption Technology For Verifiable Outsourcing

Posted on:2021-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:D GaoFull Text:PDF
GTID:2518306470464054Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the increase in the amount of network information data and the advent of the big data era,people often store and share network data through cloud servers.At the same time,the data security problems of untrusted or semi-trusted cloud servers are mainly solved by various encryption technologies.Among them,ciphertext policy attribute encryption(Ciphertext-Policy Attribute-Based Encryption,CP-ABE),which can achieve fine-grained user access control by matching access control and user attribute keys,is widely used in cloud servers.At present,the application scheme of CP-ABE still has many problems and needs to be improved.In terms of user-side computational overhead,the computational overhead of attribute matching in the traditional CP-ABE scheme increases exponentially with the complexity of the access policy and the length of the ciphertext,and cannot be applied to devices with limited computing resources.Regarding the accuracy and integrity of outsourcing decryption,traditional attribute encryption schemes often use cloud outsourcing to reduce user-side computing overhead,but based on the untrusted nature of cloud computing,the results returned by outsourcing cannot be effectively guaranteed.In the application environment,different cloud computing application scenarios have different requirements for the CP-ABE solution.These shortcomings limit the wide application of CP-ABE.Therefore,for different operating environments,how to reduce the computing overhead on the user side and ensure the accuracy and integrity of cloud outsourcing has become a hot issue.The main research work of this article includes the following:(1)Summarized the research status of CP-ABE scheme at home and abroad,in view of the application characteristics of the CP-ABE solution in the QR code environment and the mobile social network friend discovery environment,the shortcomings of the existing CP-ABE solution in different environments were analyzed.(2)Aimed at the problem that the user's fine-grained access control cannot be realized in the traditional two-dimensional code scheme,the two-dimensional code scheme that canachieve fine-grained access control through attribute encryption technology was studied,and the security analysis and efficiency analysis of the scheme were carried out.A confirmatory experiment was designed,and the proposed scheme was compared with the traditional scheme and analyzed.(3)Aimed at the problem of user privacy protection in the mobile social network friend discovery environment,studied the solution that can realize the fine-grained friend discovery privacy protection through the data owner's setting of friend access control,the security analysis of the scheme was carried out,and the efficiency of the proposed scheme and the traditional scheme were compared and analyzed in theory.The innovations in this article include:(1)A two-dimensional code encryption scheme based on revocable outsourcing attribute encryption was proposed.Theoretical analysis proves that the scheme has forward security,backward security and selective plaintext attack security(IND-CPA)under the assumption of bilinear q-BDHE.Experimental results show that the scheme can effectively reduce the computational overhead of the user through re-encryption technology.(2)A mobile social network privacy protection scheme based on outsourced attribute encryption was proposed.Theoretical analysis proves that the scheme chooses IND-CPA under the assumption of q-BDHI.It can protect the privacy of the data owner through the settings of the data owner on the dating access organization.The use of outsourcing technology,conversion ciphertext technology and verifiable technology reduces the computational overhead of data matchers,solves the problem of single point of failure in the system,and ensures the correctness of the outsourced return ciphertext..
Keywords/Search Tags:CP-ABE, Two-Dimensional Code, Mobile Social Network, Outsourcing, Privacy Protection
PDF Full Text Request
Related items