Font Size: a A A

Design And Implementation Of Attribute-based Accountable Access Control System

Posted on:2022-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:W T GaoFull Text:PDF
GTID:2518306530980759Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing provides efficient and convenient data storage,sharing and computing services.It has become a major trend for companies to store local resource-constrained businesses in the cloud.However,after the system data is uploaded to the cloud,which will lead to the separation of ownership and control of the data,and users are faced with data leakage,illegal access,and how to determine responsibility after the leakage.Therefore,it is very necessary to design an accountable attribute access control system for the scenario that enterprises use cloud computing to deploy business.Based on the attribute encryption algorithm,combining with attribute access control technology and related accountability mechanisms,this paper designs a general access control system to solve the security problem of data sharing in the cloud computing environment.The specific research work is as follows:(1)Design an access control scheme based on attribute-based encryption.In view of the security issues of data sharing on the cloud,an attribute-based encryption scheme based on SM9 is improved to make the algorithm more efficient on the basis of supporting encryption under a large attribute set.Further combining with attribute access control technology,which will achieve fine-grained access control of data on the cloud.Analysis shows that the proposed attribute access control scheme can effectively protect the security of data on the cloud.(2)Design an attribute access control scheme with accountability function.On the basis of the proposed attribute access control scheme,in response to cloud platform data leakage incidents,and combined with the related methods of the cloud platform accountability,which will design the accountability scheme in the cloud computing environment,and solve the accountability problem after the data leakage.(3)Implementation accountable attribute access control system.On the basis of the above research scheme,combined with mainstream development technology,according to the software development process,which will design and implement the accountable attribute access control system.The test results show that the system can meet the needs of data security sharing on the cloud,and it can be held accountable after the data is leaked,and the system is feasible in actual environments.
Keywords/Search Tags:Cloud computing, Date sharing, Attribute-based encryption, National cipher algorithm, Access control
PDF Full Text Request
Related items