Research and implementation of access control subsystem based on attribute encryption in cloud storage

Source: Internet
Author: User
Keywords Cloud storage cloud storage access control attribute encryption
Tags access access control based cloud cloud environment cloud storage control control technology

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Sun Youpeng of the

Because of the complexity of the cloud environment, the various entities are not trusted, so the password access control technology is the most direct means to prevent user data leakage. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. The existing attribute encryption algorithms can not completely solve these problems, including the lack of the expression of access policy, the lack of validity and fineness of the revocation of authority, the dependence of the key generation on a single authority, etc. This paper improves the existing methods and mechanisms, and puts forward a more perfect encryption algorithm based on attribute cryptosystem.
  
For the scheme proposed in this paper, the article mainly from the security and performance cost two aspects of its detailed theoretical analysis. In the aspect of security, it is proved that the algorithm has the characteristics of anti collusion, data confidentiality, post security and forward security, and in the aspect of performance cost, the time complexity and space complexity of the algorithm are mainly analyzed.
  
Finally, this paper designs and implements a simple file sharing system based on the proposed algorithm. The system simplifies the real cloud storage environment and realizes the basic function, including file encryption, file storage and file download and decryption. The system realizes the initial encryption of files and the decryption of files on the client, and realizes the encryption of files, the storage of files, the distribution of files and the generation of key components on the server side.

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.