CN112087422A - Outsourcing access control method based on attribute encryption in edge calculation - Google Patents
Outsourcing access control method based on attribute encryption in edge calculation Download PDFInfo
- Publication number
- CN112087422A CN112087422A CN202010738981.5A CN202010738981A CN112087422A CN 112087422 A CN112087422 A CN 112087422A CN 202010738981 A CN202010738981 A CN 202010738981A CN 112087422 A CN112087422 A CN 112087422A
- Authority
- CN
- China
- Prior art keywords
- key
- decryption
- encryption
- ciphertext
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明属于网络通信领域,具体地说是提出了一种边缘计算中基于属性加密的外包访问控制方法。The invention belongs to the field of network communication, and specifically proposes an outsourcing access control method based on attribute encryption in edge computing.
背景技术Background technique
边缘计算广泛用于现代社会生活,然而不可信的边缘设备可能会导致数据安全和隐私保护问题。因此需要一些加密方法保护数据的安全性,但是一般的传统加密手段并不适用于边缘计算,因为在边缘计算中接收组往往是动态的,很多数据是由一组用户访问的,只能用某些属性来描述,并不需要根据每个连接来控制数据访问。另外一方面,现有的加密方法的加密和解密的计算成本很大,而移动设备通常计算资源有限,无法支持高度复杂的加密算法。Edge computing is widely used in modern social life, but untrusted edge devices may lead to data security and privacy protection issues. Therefore, some encryption methods are needed to protect the security of data, but general traditional encryption methods are not suitable for edge computing, because in edge computing, the receiving group is often dynamic, and many data are accessed by a group of users, which can only be accessed by a certain group of users. These properties are described, and data access does not need to be controlled on a per-connection basis. On the other hand, the encryption and decryption of the existing encryption methods are computationally expensive, and mobile devices usually have limited computing resources and cannot support highly complex encryption algorithms.
属性加密是当今隐私保护领域的研究热点,属性加密较已有的加密算法,能更简单有效地保护组用户的隐私信息,对数据实现细粒度的访问控制,具有实际可行性。把高度复杂的计算数据加密、解密的任务外包给计算能力更强大的雾服务器,可以使得移动设备只需要简单的计算就能够实现加密和解密。同时为了防止一些外部观察者或攻击者通过属性加密中的访问控制策略学习到用户的敏感信息,对访问控制策略进行隐藏是很有必要的。所以,在边缘计算中基于属性加密的访问控制方法有利于共享数据的安全性与用户信息的隐私性,并且减少了用户的计算负担。Attribute encryption is a research hotspot in the field of privacy protection today. Compared with existing encryption algorithms, attribute encryption can protect the privacy information of group users more simply and effectively, and implement fine-grained access control to data, which is practically feasible. Outsourcing the task of encrypting and decrypting highly complex computing data to a fog server with more powerful computing power enables mobile devices to perform encryption and decryption with only simple calculations. At the same time, in order to prevent some external observers or attackers from learning the user's sensitive information through the access control policy in attribute encryption, it is necessary to hide the access control policy. Therefore, the access control method based on attribute encryption in edge computing is beneficial to the security of shared data and the privacy of user information, and reduces the computational burden of users.
发明内容SUMMARY OF THE INVENTION
本发明针对现有的边缘计算中边缘设备的数据安全和隐私保护问题,提出了一种边缘计算中基于属性加密的外包访问控制方法。Aiming at the problems of data security and privacy protection of edge devices in existing edge computing, the invention proposes an outsourcing access control method based on attribute encryption in edge computing.
本发明的技术方案是:The technical scheme of the present invention is:
一种边缘计算中基于属性加密的外包访问控制方法,该方法包括以下步骤:An outsourced access control method based on attribute encryption in edge computing, the method includes the following steps:
步骤1:可信权威机构对整个系统初始化,包括给各个用户分配对应的角色,生成相关的公钥、密钥和转换密钥等参数,并给系统中的各个角色发送自己该得的参数;Step 1: The trusted authority initializes the entire system, including assigning corresponding roles to each user, generating relevant parameters such as public keys, keys, and conversion keys, and sending the parameters to each role in the system;
步骤2:数据拥有者向距离最近的雾服务器申请加密请求,并对雾服务器返回的结果进行正确性验证和整合,然后将整合后的密文上传到云服务器;Step 2: The data owner applies for an encryption request to the nearest fog server, verifies and integrates the results returned by the fog server, and then uploads the integrated ciphertext to the cloud server;
步骤3:数据消费者向云服务器申请密文,并将得到的密文发送给距离最近的雾服务器申请部分外包解密,待得到部分解密密文后进行正确性验证,最后进行简单解密得到明文。Step 3: The data consumer applies for the ciphertext to the cloud server, and sends the obtained ciphertext to the nearest fog server to apply for partial outsourcing decryption. After the partial decrypted ciphertext is obtained, the correctness verification is performed, and finally the plaintext is obtained by simple decryption.
进一步地,一种边缘计算中基于属性加密的外包访问控制方法,所述的步骤1具体为:Further, an outsourced access control method based on attribute encryption in edge computing, the
步骤1-1:可信权威机构首先选定系统中属性的个数,并选择一个双线性映射D=(p,G,GT,e),其中P是G和GT的阶;然后选择随机三个生成元g,h,u和指数α(α∈Zp);公开公钥参数:Step 1-1: The trusted authority first selects the number of attributes in the system, and selects a bilinear map D=(p, G, GT, e), where P is the order of G and GT; then select a random Three generators g, h, u and exponent α (α∈Zp); public public key parameters:
PK={D,e(g,g)α,g,h,u,H,L,KDF1};PK={D,e(g,g)α,g,h,u,H,L,KDF1};
其中H为抗碰撞哈希函数,KDF1为密钥导出函数,并设置主密钥:MSK=(PK,α);Among them, H is the anti-collision hash function, KDF1 is the key derivation function, and set the master key: MSK=(PK,α);
步骤1-2:可信权威机构选取随机的K+1个数(r,r1,···,rk)∈Zp,根据主密钥MSK和一组属性集S={A1,···,An},计算K0=gαur,K1=gr,Ki,2=gri,Ki,3=(uhAi)ri,生成私钥:Step 1-2: The trusted authority selects random K+1 numbers (r,r 1 ,...,r k )∈Zp, according to the master key MSK and a set of attributes S={A 1 ,· ··,A n }, calculate K 0 =g α u r , K 1 =g r , K i,2 =g ri , K i,3 =(uh Ai ) ri , and generate the private key:
SK=(S,PK,K0,K1,{Ki,2,Ki,3}i∈[1,k]);SK=(S,PK,K 0 ,K 1 ,{K i,2 ,K i,3 } i∈[1,k] );
步骤1-3:可信权威机构随机选择根据私钥SK计算转换密钥TK如下:Steps 1-3: Random selection of trusted authorities The conversion key TK is calculated according to the private key SK as follows:
K'0=gα/τur/τ,K'1=gr/τ,K'i,2=gri/τ,K'i,3=(uhAi)ri/τ K' 0 =g α/τ u r/τ , K' 1 =g r/τ , K' i,2 =g ri/τ , K' i,3 =(uh Ai ) ri/τ
当系统进行到外包解密时,将此转换密钥TK发送给需要进行部分解密任务的雾服务器;并且设置恢复密钥如下:When the system goes to outsourced decryption, the conversion key TK is sent to the fog server that needs to perform part of the decryption task; and the recovery key is set as follows:
RK=(TK,τ)RK=(TK,τ)
发送给数据消费者进行最终的解密。Sent to the data consumer for final decryption.
进一步地,一种边缘计算中基于属性加密的外包访问控制方法,所述的步骤2具体为:Further, an outsourced access control method based on attribute encryption in edge computing, the
步骤2-1:在数据拥有者发送外包加密请求后,距离用户最近的两个之一雾服务器F1选择四个随机数xi',yi',λi',s'∈Zp,根据已经公开的公钥参数PK,计算C0'=gs',Step 2-1: After the data owner sends the outsourced encryption request, the fog server F1, one of the two closest to the user, selects four random numbers x i ', y i ', λ i ', s'∈Z p , according to The public key parameter PK, which has been published, calculates C 0 '=gs ' ,
生成中间密文IT1如下: The intermediate ciphertext IT1 is generated as follows:
IT1=(s',C'0,{x′i,y′i,λ'i,C′i,1,C′i,2}i∈[1,K]);IT1=(s',C' 0 ,{x' i ,y' i ,λ' i ,C' i,1 ,C' i,2 } i∈[1,K] );
并将IT1发送给数据拥有者;and send IT1 to the data owner;
步骤2-2:在数据拥有者发送外包加密请求后,距离用户最近的两个之一雾服务器F2选择四个随机数xi”,yi”,λi”,s”∈Zp,根据已经公开的公钥参数PK,计算C0”=gs”,生成中间密文IT2如下:Step 2-2: After the data owner sends the outsourced encryption request, the fog server F2, one of the two closest to the user, selects four random numbers x i '', y i '', λ i '', s''∈Z p , according to The public key parameter PK, which has been published, calculates C 0 ”= g s” , The intermediate ciphertext IT2 is generated as follows:
IT2=(s”,C″0,{x″i,y″i,λ″i,C″i,1,C″i,2}i∈[1,K]);IT2=(s”,C″ 0 ,{x″ i ,y″ i ,λ″ i ,C″ i,1 ,C″ i,2 } i∈[1,K] );
并将IT2发送给数据拥有者;and send IT2 to the data owner;
步骤2-3:数据拥有者接收IT1和IT2之后,将IT1和IT2整合成中间密文IT如下:Step 2-3: After receiving IT1 and IT2, the data owner integrates IT1 and IT2 into an intermediate ciphertext IT as follows:
IT=(s,C0,{xi,yi,λi,Ci,1,Ci,2}i∈[1,K])IT=(s,C 0 ,{x i ,y i ,λ i ,C i,1 ,C i,2 } i∈[1,K] )
然后随机选择v2,...,vn∈Zp,设置向量根据访问结构为(A,ρ,τ),计算Ci,3=bi-λi,Ci,4=τρ(i)yi-xiyi,Ci,5=-yi,其中A是一个λ×n矩阵,ρ是A每一行Ai映射的属性名称,τ={τρ(1),...,τρ(λ)},即属性值ρ(i)的集合;再利用密钥导出函数KDF1计算出SSk,设置d为SSk的长度;最后得出完整密文如下:Then randomly select v2,...,vn∈Zp, set the vector According to the access structure as (A,ρ,τ), calculate C i,3 =b i -λ i , C i,4 =τ ρ(i) y i -x i y i , C i,5 = -y i , where A is a λ×n matrix and ρ is A The attribute name of each row of A i mapping, τ={τ ρ(1) ,...,τ ρ(λ) }, that is, the set of attribute values ρ(i); then use the key derivation function KDF1 to calculate SSk, set up d is the length of SSk; finally the complete ciphertext is obtained as follows:
并将其发送给云服务器。and send it to the cloud server.
进一步地,一种边缘计算中基于属性加密的外包访问控制方法,所述的步骤3具体为:Further, an outsourced access control method based on attribute encryption in edge computing, the
步骤3-1:数据消费者从云服务器拿到密文CT,并发送给距离最近的雾服务器F3申请部分解密;雾服务器F3利用从可信权威机构得到的转换密钥TK进行部分解密恢复封装的密钥:Step 3-1: The data consumer obtains the ciphertext CT from the cloud server and sends it to the nearest fog server F3 to apply for partial decryption; the fog server F3 uses the conversion key TK obtained from the trusted authority to perform partial decryption, recovery and encapsulation the key:
设置部分解密过的密文,并返回给数据消费者;Set the partially decrypted ciphertext and return it to the data consumer;
步骤3-2:数据消费者拿到部分解密的密文之后,先进行解密外包的正确性验证,检验是否满足,如果满足,则用恢复密钥进行最后的解密:Step 3-2: After the data consumer gets the partially decrypted ciphertext, the correctness verification of the decryption outsourcing is performed first, and the verification Whether it is satisfied, if it is satisfied, use the recovery key for final decryption:
与现有技术相比,本发明的技术优势在于:Compared with the prior art, the technical advantages of the present invention are:
1.在用户没有花费高额计算量和通信开销的情况下保护了用户共享数据的安全;1. Protects the security of user-shared data without the user spending a high amount of computation and communication overhead;
2.采用部分隐藏访问控制策略的方法,在不泄露数据拥有者的敏感信息前提下,实现与数据消费者的数据共享;2. Using the method of partially concealing the access control policy to realize data sharing with data consumers without revealing the sensitive information of the data owner;
3.与现有的属性加密外包方法进行对比,在外包结果的正确性和参与者隐私保护方面实现更好的性能。3. Compared with the existing attribute encryption outsourcing methods, it achieves better performance in the correctness of outsourcing results and participant privacy protection.
附图说明Description of drawings
图1为本发明的机制框图。FIG. 1 is a mechanism block diagram of the present invention.
图2生成外包密钥花费时间与属性数量变化图。Figure 2. The time spent in generating the outsourced key and the change in the number of attributes.
图3加密外包计算花费的时间图。Figure 3. Time graph of encrypted outsourcing computation.
图4解密外包计算花费的时间图。Figure 4. Time graph of outsourced computation for decryption.
图5用户端加密计算花费时间图。Figure 5. The time diagram of encryption calculation on the client side.
图6用户端解密计算花费时间图。Figure 6 is a diagram of the time spent in the decryption calculation at the user end.
具体实施方式Detailed ways
下面结合附图和具体实施方式对本发明做进一步地说明。The present invention will be further described below with reference to the accompanying drawings and specific embodiments.
本发明是根据边缘计算和属性加密的技术特点,设计的一种边缘计算中基于属性加密的外包访问控制方法,重点解决以下两个问题:According to the technical characteristics of edge computing and attribute encryption, the present invention designs an outsourcing access control method based on attribute encryption in edge computing, and focuses on solving the following two problems:
(1)数据拥有者在向云服务器发送密文时,会将访问控制策略和密文一起发送,而其他参与者可能会根据访问控制策略推断出数据消费者属性的敏感信息,这使得它受到关键信息泄漏的问题。(1) When the data owner sends the ciphertext to the cloud server, the access control policy and the ciphertext will be sent together, and other participants may infer the sensitive information of the attributes of the data consumer according to the access control policy, which makes it subject to The problem of key information leakage.
(2)现有的属性加密外包方法缺乏对加密和解密外包的可验证的考虑。(2) Existing attribute encryption outsourcing methods lack the verifiable consideration of encryption and decryption outsourcing.
本发明的主要思想是:将属性加密和边缘计算相结合,以实现共享数据的数据安全和参与者的隐私保护。The main idea of the present invention is to combine attribute encryption and edge computing to realize data security of shared data and privacy protection of participants.
具体来说,一种边缘计算中基于属性加密的外包访问控制方法,该方法包括以下步骤:Specifically, an outsourced access control method based on attribute encryption in edge computing, the method includes the following steps:
步骤1:可信权威机构对整个系统初始化,包括给各个用户分配对应的角色,生成相关的公钥、密钥和转换密钥等参数,并给系统中的各个角色发送自己该得的参数;Step 1: The trusted authority initializes the entire system, including assigning corresponding roles to each user, generating relevant parameters such as public keys, keys, and conversion keys, and sending the parameters to each role in the system;
步骤1-1:可信权威机构首先选定系统中属性的个数,并选择一个双线性映射D=(p,G,GT,e),其中P是G和GT的阶;然后选择随机三个生成元g,h,u和指数α(α∈Zp);公开公钥参数:Step 1-1: The trusted authority first selects the number of attributes in the system, and selects a bilinear map D=(p, G, GT, e), where P is the order of G and GT; then select a random Three generators g, h, u and exponent α (α∈Zp); public public key parameters:
PK={D,e(g,g)α,g,h,u,H,L,KDF1};PK={D,e(g,g)α,g,h,u,H,L,KDF1};
其中H为抗碰撞哈希函数,KDF1为密钥导出函数,并设置主密钥:MSK=(PK,α);Among them, H is the anti-collision hash function, KDF1 is the key derivation function, and set the master key: MSK=(PK,α);
步骤1-2:可信权威机构选取随机的K+1个数(r,r1,···,rk)∈Zp,根据主密钥MSK和一组属性集S={A1,···,An},计算K0=gαur,K1=gr,Ki,2=gri,Ki,3=(uhAi)ri,生成私钥:Step 1-2: The trusted authority selects random K+1 numbers (r,r 1 ,...,r k )∈Zp, according to the master key MSK and a set of attributes S={A 1 ,· ··,A n }, calculate K 0 =g α u r , K 1 =g r , K i,2 =g ri , K i,3 =(uh Ai ) ri , and generate the private key:
SK=(S,PK,K0,K1,{Ki,2,Ki,3}i∈[1,k]);SK=(S,PK,K 0 ,K 1 ,{K i,2 ,K i,3 } i∈[1,k] );
步骤1-3:可信权威机构随机选择根据私钥SK计算转换密钥TK如下:Steps 1-3: Random selection of trusted authorities The conversion key TK is calculated according to the private key SK as follows:
K'0=gα/τur/τ,K'1=gr/τ,K'i,2=gri/τ,K'i,3=(uhAi)ri/τ K' 0 =g α/τ u r/τ , K' 1 =g r/τ , K' i,2 =g ri/τ , K' i,3 =(uh Ai ) ri/τ
当系统进行到外包解密时,将此转换密钥TK发送给需要进行部分解密任务的雾服务器;并且设置恢复密钥如下:When the system goes to outsourced decryption, the conversion key TK is sent to the fog server that needs to perform part of the decryption task; and the recovery key is set as follows:
RK=(TK,τ)RK=(TK,τ)
发送给数据消费者进行最终的解密。Sent to the data consumer for final decryption.
步骤2:数据拥有者向距离最近的雾服务器申请加密请求,并对雾服务器返回的结果进行正确性验证和整合,然后将整合后的密文上传到云服务器;Step 2: The data owner applies for an encryption request to the nearest fog server, verifies and integrates the results returned by the fog server, and then uploads the integrated ciphertext to the cloud server;
步骤2-1:在数据拥有者发送外包加密请求后,距离用户最近的两个之一雾服务器F1选择四个随机数xi',yi',λi',s'∈Zp,根据已经公开的公钥参数PK,计算C0'=gs',生成中间密文IT1如下:Step 2-1: After the data owner sends the outsourced encryption request, the fog server F1, one of the two closest to the user, selects four random numbers x i ', y i ', λ i ', s'∈Z p , according to The public key parameter PK, which has been published, calculates C 0 '=gs ' , The intermediate ciphertext IT1 is generated as follows:
IT1=(s',C'0,{x′i,y′i,λ'i,C′i,1,C′i,2}i∈[1,K]);IT1=(s',C' 0 ,{x' i ,y' i ,λ' i ,C' i,1 ,C' i,2 } i∈[1,K] );
并将IT1发送给数据拥有者;and send IT1 to the data owner;
步骤2-2:在数据拥有者发送外包加密请求后,距离用户最近的两个之一雾服务器F2选择四个随机数xi”,yi”,λi”,s”∈Zp,根据已经公开的公钥参数PK,计算C0”=gs”,生成中间密文IT2如下:Step 2-2: After the data owner sends the outsourced encryption request, the fog server F2, one of the two closest to the user, selects four random numbers x i '', y i '', λ i '', s''∈Z p , according to The public key parameter PK, which has been published, calculates C 0 ”= g s” , The intermediate ciphertext IT2 is generated as follows:
IT2=(s”,C″0,{x″i,y″i,λ″i,C″i,1,C″i,2}i∈[1,K]);IT2=(s”,C″ 0 ,{x″ i ,y″ i ,λ″ i ,C″ i,1 ,C″ i,2 } i∈[1,K] );
并将IT2发送给数据拥有者;and send IT2 to the data owner;
步骤2-3:数据拥有者接收IT1和IT2之后,将IT1和IT2整合成中间密文IT如下:Step 2-3: After receiving IT1 and IT2, the data owner integrates IT1 and IT2 into an intermediate ciphertext IT as follows:
IT=(s,C0,{xi,yi,λi,Ci,1,Ci,2}i∈[1,K])IT=(s,C 0 ,{x i ,y i ,λ i ,C i,1 ,C i,2 } i∈[1,K] )
然后随机选择v2,...,vn∈Zp,设置向量根据访问结构为(A,ρ,τ),计算Ci,3=bi-λi,Ci,4=τρ(i)yi-xiyi,Ci,5=-yi,其中A是一个λ×n矩阵,ρ是A每一行Ai映射的属性名称,τ={τρ(1),...,τρ(λ)},即属性值ρ(i)的集合;再利用密钥导出函数KDF1计算出SSk,设置d为SSk的长度;最后得出完整密文如下:Then randomly select v2,...,vn∈Zp, set the vector According to the access structure as (A,ρ,τ), calculate C i,3 =b i -λ i , C i,4 =τ ρ(i) y i -x i y i , C i,5 = -y i , where A is a λ×n matrix and ρ is A The attribute name of each row of A i mapping, τ={τ ρ(1) ,...,τ ρ(λ) }, that is, the set of attribute values ρ(i); then use the key derivation function KDF1 to calculate SSk, set up d is the length of SSk; finally the complete ciphertext is obtained as follows:
并将其发送给云服务器。and send it to the cloud server.
步骤3:数据消费者向云服务器申请密文,并将得到的密文发送给距离最近的雾服务器申请部分外包解密,待得到部分解密密文后进行正确性验证,最后进行简单解密得到明文。Step 3: The data consumer applies for the ciphertext to the cloud server, and sends the obtained ciphertext to the nearest fog server to apply for partial outsourcing decryption. After the partial decrypted ciphertext is obtained, the correctness verification is performed, and finally the plaintext is obtained by simple decryption.
步骤3-1:数据消费者从云服务器拿到密文CT,并发送给距离最近的雾服务器F3申请部分解密;雾服务器F3利用从可信权威机构得到的转换密钥TK进行部分解密恢复封装的密钥:Step 3-1: The data consumer obtains the ciphertext CT from the cloud server and sends it to the nearest fog server F3 to apply for partial decryption; the fog server F3 uses the conversion key TK obtained from the trusted authority to perform partial decryption, recovery and encapsulation the key:
设置部分解密过的密文,并返回给数据消费者;Set the partially decrypted ciphertext and return it to the data consumer;
步骤3-2:数据消费者拿到部分解密的密文之后,先进行解密外包的正确性验证,检验是否满足,如果满足,则用恢复密钥进行最后的解密:Step 3-2: After the data consumer gets the partially decrypted ciphertext, the correctness verification of the decryption outsourcing is performed first, and the verification Whether it is satisfied, if it is satisfied, use the recovery key for final decryption:
本发明在Ubuntu中用charm框架和PBC库进行了如图1所示的过程的仿真,并对所提出的方法的进行了性能测试。我们设置了10个不同的访问策略,属性值数量N从10增加到100,每个实例重复10次并取平均值。实验过程中保持所有的实例彼此完全独立,时间以秒和毫秒为单位。The present invention uses charm framework and PBC library to simulate the process shown in Figure 1 in Ubuntu, and tests the performance of the proposed method. We set 10 different access policies, the number of attribute values N was increased from 10 to 100, and each instance was repeated 10 times and averaged. All instances are kept completely independent of each other during the experiment, and the time is measured in seconds and milliseconds.
为了体现本发明提出的PPAC(隐私访问控制)方法的优势,对比了现有的传统的属性加密外包方法OABE(外包ABE加密)。OABE中只进行了外包解密,并且没有对外包结果进行正确性验证。In order to reflect the advantages of the PPAC (Privacy Access Control) method proposed by the present invention, the existing traditional attribute encryption outsourcing method OABE (Outsourcing ABE Encryption) is compared. Only outsourced decryption is performed in OABE, and the outsourced result is not verified for correctness.
图2显示了运行生成外包密钥所花费的时间结果。从图中可以看出,随着系统属性值数量的增加,外包密钥所花费的时间也在增加,并且呈线性增加的趋势。加密和解密的计算量都与系统设置的属性数量有关系,如图3、图4所示,属性数量不断的增加,计算花费的时间也不断增加。我们通过用户端加密与解密计算花费时间的多少来评估PPAC中算法的性能,就用户的体验感来说,必然是花费时间越少越好。图5表明用户端加密计算花费时间随着属性数量的增加几乎线性增加,我们的方案在用户端的计算时间上是可行的,略高于原来的方OABE案所花费时间,出现这种情况的原因是对加密返回的结果进行正确性验证的验证函数会带来一些额外的计算成本。Figure 2 shows the results of the time spent running to generate the outsourced key. As can be seen from the figure, as the number of system attribute values increases, the time spent on outsourcing the key also increases, and it increases linearly. The calculation amount of encryption and decryption is related to the number of attributes set by the system. As shown in Figure 3 and Figure 4, the number of attributes continues to increase, and the calculation time also increases. We evaluate the performance of the algorithm in PPAC by calculating the time spent on encryption and decryption at the user end. In terms of user experience, the less time spent, the better. Figure 5 shows that the time spent in the encryption calculation on the client side increases almost linearly with the increase of the number of attributes. Our scheme is feasible in terms of the calculation time on the client side, which is slightly higher than the time spent in the original OABE scheme. The reason for this It is the verification function that verifies the correctness of the result returned by encryption, which will bring some additional computational cost.
图6给出了用户端加密计算花费时间,由图可以发现我们的方案在用户端的计算时间上是可行的,同样略高于原来的方OABE案所花费时间,出现这种情况的原因是对解密返回的结果进行正确性验证的验证函数会带来一些额外的计算成本。Figure 6 shows the time spent on the encryption calculation on the user side. From the figure, it can be found that our solution is feasible in terms of the computing time on the user side, which is also slightly higher than the time spent by the original OABE case. The reason for this is that The verification function that decrypts the returned result for correctness verification will bring some additional computational cost.
综上可知:本发明所提出的方法PPAC,不仅可以保护边缘计算中共享数据的安全和用户隐私,而且可以很大程度上减少用户的计算负担。To sum up, it can be seen that the method PPAC proposed in the present invention can not only protect the security of shared data and user privacy in edge computing, but also greatly reduce the computing burden of users.
以上详细描述了本发明的优选实施方式,但本发明并不限于上述实施方式中的具体细节,在本发明的技术构思范围内,可以对本发明的技术方案进行多种等同交换(如数量、形状、位置等),这些等同变换均属于本发明的保护。The preferred embodiments of the present invention have been described in detail above, but the present invention is not limited to the specific details of the above-mentioned embodiments. Within the scope of the technical concept of the present invention, various equivalent exchanges (such as quantity, shape, etc.) can be performed on the technical solutions of the present invention. , position, etc.), these equivalent transformations all belong to the protection of the present invention.
Claims (4)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010738981.5A CN112087422A (en) | 2020-07-28 | 2020-07-28 | Outsourcing access control method based on attribute encryption in edge calculation |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010738981.5A CN112087422A (en) | 2020-07-28 | 2020-07-28 | Outsourcing access control method based on attribute encryption in edge calculation |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN112087422A true CN112087422A (en) | 2020-12-15 |
Family
ID=73735227
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010738981.5A Pending CN112087422A (en) | 2020-07-28 | 2020-07-28 | Outsourcing access control method based on attribute encryption in edge calculation |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112087422A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114710370A (en) * | 2022-06-08 | 2022-07-05 | 山东省计算中心(国家超级计算济南中心) | Fine-grained access control method and system based on mist block chain and attribute encryption |
| WO2022266999A1 (en) * | 2021-06-25 | 2022-12-29 | Intel Corporation | Digital edge services orchestration of awareness, on-demand, and event-triggered services |
| CN115879139A (en) * | 2023-03-08 | 2023-03-31 | 四川边缘算力科技有限公司 | User data management method based on edge calculation |
| CN116132105A (en) * | 2022-12-08 | 2023-05-16 | 重庆邮电大学 | Internet of vehicles large attribute data sharing system and method based on attribute encryption |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109995505A (en) * | 2019-03-07 | 2019-07-09 | 西安电子科技大学 | A data security deduplication system and method in a fog computing environment, and a cloud storage platform |
| CN110099043A (en) * | 2019-03-24 | 2019-08-06 | 西安电子科技大学 | The hiding more authorization center access control methods of support policy, cloud storage system |
| US20190297063A1 (en) * | 2018-03-22 | 2019-09-26 | Cisco Technology, Inc. | Iaas-aided access control for information centric networking with internet-of-things |
| CN110933052A (en) * | 2019-11-18 | 2020-03-27 | 杭州电子科技大学 | A time domain-based encryption and its policy update method in edge environment |
| CN111212084A (en) * | 2020-01-15 | 2020-05-29 | 广西师范大学 | Attribute encryption access control method facing edge calculation |
-
2020
- 2020-07-28 CN CN202010738981.5A patent/CN112087422A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190297063A1 (en) * | 2018-03-22 | 2019-09-26 | Cisco Technology, Inc. | Iaas-aided access control for information centric networking with internet-of-things |
| CN109995505A (en) * | 2019-03-07 | 2019-07-09 | 西安电子科技大学 | A data security deduplication system and method in a fog computing environment, and a cloud storage platform |
| CN110099043A (en) * | 2019-03-24 | 2019-08-06 | 西安电子科技大学 | The hiding more authorization center access control methods of support policy, cloud storage system |
| CN110933052A (en) * | 2019-11-18 | 2020-03-27 | 杭州电子科技大学 | A time domain-based encryption and its policy update method in edge environment |
| CN111212084A (en) * | 2020-01-15 | 2020-05-29 | 广西师范大学 | Attribute encryption access control method facing edge calculation |
Non-Patent Citations (4)
| Title |
|---|
| ARWA ALRAWAIS,ABDULRAHMAN ALHOTHAILY,CHUNQIANG HU,XIAOSHUANG: "An Attribute-Based Encryption Scheme to Secure Fog Communications", 《IEEE ACCESS》 * |
| QIHUA WANG,GAOYAN LV,XIULING SUN: "Distributed Access Control with Outsourced Computation in Fog Computing", 《2019 CHINESE CONTROL AND DECISION CONFERENCE (CCDC)》 * |
| QINLONG HUANG,YIXIAN YANG,LICHENG WANG: "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things", 《IEEE ACCESS》 * |
| 张佳乐,赵彦超,陈兵,胡峰,朱琨: "边缘计算数据安全与隐私保护研究综述", 《通信学报》 * |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2022266999A1 (en) * | 2021-06-25 | 2022-12-29 | Intel Corporation | Digital edge services orchestration of awareness, on-demand, and event-triggered services |
| CN114710370A (en) * | 2022-06-08 | 2022-07-05 | 山东省计算中心(国家超级计算济南中心) | Fine-grained access control method and system based on mist block chain and attribute encryption |
| CN116132105A (en) * | 2022-12-08 | 2023-05-16 | 重庆邮电大学 | Internet of vehicles large attribute data sharing system and method based on attribute encryption |
| CN116132105B (en) * | 2022-12-08 | 2024-05-17 | 重庆邮电大学 | A system and method for sharing large attribute data in Internet of Vehicles based on attribute encryption |
| CN115879139A (en) * | 2023-03-08 | 2023-03-31 | 四川边缘算力科技有限公司 | User data management method based on edge calculation |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108881314B (en) | Privacy protection method and system based on CP-ABE ciphertext under fog computing environment | |
| CN111275202B (en) | Machine learning prediction method and system for data privacy protection | |
| WO2020015478A1 (en) | Model-based prediction method and device | |
| CN112380578A (en) | Edge computing framework based on block chain and trusted execution environment | |
| WO2022199290A1 (en) | Secure multi-party computation | |
| CN111447192B (en) | A Lightweight Attribute-Based Signcryption Method for Cloud-Assisted IoT | |
| CN110933033B (en) | Cross-domain access control method for multiple IoT domains in smart city environment | |
| US11374910B2 (en) | Method and apparatus for effecting a data-based activity | |
| CN110458554A (en) | Identity-based data fast transaction method on blockchain | |
| CN106487506B (en) | Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption | |
| CN112087422A (en) | Outsourcing access control method based on attribute encryption in edge calculation | |
| CN106656997B (en) | A privacy protection method for cross-domain dating based on mobile social network proxy re-encryption | |
| CN108989339B (en) | Ciphertext encryption method, system and storage medium with strategy hiding function | |
| CN116502732B (en) | Federal learning method and system based on trusted execution environment | |
| US11637817B2 (en) | Method and apparatus for effecting a data-based activity | |
| CN114240347A (en) | Business service secure docking method and device, computer equipment and storage medium | |
| CN111639345A (en) | Secure multi-party cloud computing method and system based on homomorphic encryption | |
| CN116805078A (en) | A data intelligent management system and method for logistics information platform based on big data | |
| CN114500069A (en) | Method and system for storing and sharing electronic contract | |
| Zhang et al. | Cerberus: Privacy-preserving computation in edge computing | |
| Shen et al. | Multicopy and multiserver provable data possession for cloud-based IoT | |
| CN113626831A (en) | CP-ABE method supporting privacy protection and decryption in cloud | |
| Banaeian Far et al. | Distributed auditing protocol for blockchain‐based transactions using a distributed signature | |
| CN116346318B (en) | Data sharing method, sharing device, processor and system thereof | |
| Huang et al. | Privacy-preserving public auditing for non-manager group |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20201215 |