A Multi-level Access Control Scheme Based on Attribute Encryption for Big Data

被引:0
|
作者
Li, Ruixia [1 ]
Peng, Wei [1 ]
机构
[1] West Anhui Univ, Sch Elect & Informat Engn, Luan 237012, Anhui, Peoples R China
关键词
Big Data; Access Control Public Key; Private Key; Attribute Revocation;
D O I
10.1109/ICMCCE48743.2019.00161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to meet the needs of flexibility and security in big data access, this paper first processes the access objects from folders, files and metadata respectively. Then, aiming at the security and efficiency problems in attribute encryption, this paper uses the processing strategy of public key encryption and private key decryption, and gives the attribute revocation. Finally, the experimental results show that the proposed scheme is feasible and effective.
引用
收藏
页码:694 / 698
页数:5
相关论文
共 50 条
  • [1] Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 220 - 230
  • [2] MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
    Aghili, Seyed Farhad
    Sedaghat, Mahdi
    Singelee, Dave
    Gupta, Maanak
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 75 - 90
  • [3] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [4] Location Hierarchical Access Control Scheme based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 9010 - 9014
  • [5] Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Li, Shudong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] An Efficient Ciphertext Policy-Attribute Based Encryption for Big Data Access Control in Cloud Computing
    Kumar, P. Praveen
    Kumar, P. Syam
    Alphonse, P. J. A.
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 114 - 120
  • [7] Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing
    Ma, Chao
    Jin, Xiaojun
    Luo, Song
    Wei, Yifei
    Wang, Xiaojun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (07): : 1935 - 1950
  • [8] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [9] Multi-Layer Encryption for multi-level access control in Wireless Sensor Networks
    Teng, Po-Yuan
    Huang, Shih-I
    Perrig, Adrian
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 705 - 709
  • [10] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    [J]. SENSORS, 2023, 23 (19)