Research on attribute-based user rights management in cloud environment
Source: Internet
Author: User
KeywordsCiphertext policy attribute encryption not forgery
Research on attribute-based user rights management in cloud environment
Li Yubao Fannai Kihuimin Liu Yan
User Rights Assignment is one of the most important problems in cloud computing service, and a user Rights management scheme based on attribute is proposed. This scheme takes the new user key distribution in cloud service as the research object, in this paper, the user signature authentication and decryption management mechanism is discussed, and the data owner and the authorized person choose the attribute set, and the data owner defines the ciphertext access structure based on the attribute set, so that the user can obtain the decryption key only through the authorized person authentication. Achieve the goal of user privilege escalation and degraded synchronization management. In addition, the scheme takes group attribute set update as the center to design the Cp-abe group signature Verification mechanism, which makes the data owner, user and the authorized person compose group, and the user can sign the message and public authentication based on the group and its own attribute to protect the fine-grained access control of the ciphertext data. Finally, the proof result of validity and forgery of the signature is given.
Research on attribute-based user rights management in cloud environment
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.