Font Size: a A A

Research On Data Access Control Technology Based On Attribute Encryption

Posted on:2024-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:X L ShiFull Text:PDF
GTID:2568307172481764Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
The attribute-based encryption data access control technology is a novel approach to data access control,enabling fine-grained control over the attributes of visitors and facilitating secure management and sharing of data.This technology finds extensive applications in fields such as cloud computing,the Internet of Things,and smart cities.However,it still faces challenges regarding key management,policy management,and attribute revocation.This thesis addresses multi-attribute and key revocation issues and proposes a data access control scheme that ensures real-time updates of user access privileges.By embedding attribute parameters into user keys,the user keys are updated dynamically to reflect changes in user attributes,thereby achieving real-time updates of user access permissions to data.Additionally,the paper employs blockchain technology to record user actions on data,enabling supervision of user behavior and using the cryptographic hash value stored in the blockchain to verify the integrity of encrypted data.Taking the medical scene as an example,this thesis designs a medical cloud system model,proposes a personal medical data access control scheme based on attribute encryption,and specifically completes the following work: The scheme combines searchable encryption technology to achieve fine-grained access control,signature verification,data retrieval,patient privacy protection and other functions for medical data users.The patient has the ownership of his/her medical record data and can customize the ciphertext access control policy.The security and efficiency of the scheme are analyzed and verified.The scheme has lower computational overhead compared with other similar schemes on the premise of achieving safe sharing of medical data.
Keywords/Search Tags:Attribute encryption, Access control, Privacy protection, Attribute update
PDF Full Text Request
Related items