About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Multimedia Technology and Enhanced Learning. 5th EAI International Conference, ICMTEL 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part III

Research Article

Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-50577-5_25,
        author={Chuangji Zhang and Weixuan Lin and Yanli Zhang},
        title={Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm},
        proceedings={Multimedia Technology and Enhanced Learning. 5th EAI International Conference, ICMTEL 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part III},
        proceedings_a={ICMTEL PART 3},
        year={2024},
        month={2},
        keywords={Ciphertext Strategy Attribute-Based Encryption Algorithm Trusted Computing Technology Data Privacy Access Control},
        doi={10.1007/978-3-031-50577-5_25}
    }
    
  • Chuangji Zhang
    Weixuan Lin
    Yanli Zhang
    Year: 2024
    Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm
    ICMTEL PART 3
    Springer
    DOI: 10.1007/978-3-031-50577-5_25
Chuangji Zhang1,*, Weixuan Lin2, Yanli Zhang3
  • 1: Guangzhou Huali Science and Technology Vocational College
  • 2: Guangzhou Huashang Vocational College
  • 3: Metering Center of Jibei Power Grid Co. Ltd.
*Contact email: zhangcj21000@163.com

Abstract

The data stored in the cloud contains a lot of privacy and confidentiality. The scalability of data privacy access control is weak, the attack resistance rate is low, and the risk rate of privacy disclosure is high. Therefore, a data privacy access control method based on ciphertext policy attribute-based encryption algorithm is proposed. The encryption scheme is designed based on the ciphertext policy attribute-based encryption algorithm as the formulated privacy policy. Aiming at the implementation and guarantee of privacy policy in cloud environment, a trusted execution method of privacy policy in cloud environment is proposed. Design a data access control model based on blockchain. The entities included in the model are data owner, data requester, data storage center, attribute authority and blockchain network. The test results show that the method has strong scalability, high fault tolerance rate, no third party, can achieve authorization, and the attack resistance rate is higher than 94%, and the risk rate of privacy leakage is low.

Keywords
Ciphertext Strategy Attribute-Based Encryption Algorithm Trusted Computing Technology Data Privacy Access Control
Published
2024-02-21
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-50577-5_25
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL