×

Method, apparatus, and system for access control of shared data

  • US 10,050,968 B2
  • Filed: 12/31/2014
  • Issued: 08/14/2018
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for access control of shared data in an apparatus for access control of shared data comprising a computer readable storage medium and a processor configured to execute software programs stored in the storage medium in the form of software units, the method comprising:

  • pre-establishing, by a data storage dealer, an update parameter list for recording those various versions of attributes under control and corresponding update parameters of cipher text attribute components;

    generating, by attribute authorizers, a new attribute master DEA key and a new attribute version number according to the received attribute component updating parameter according to the new attribute master DEA key and a stored original attribute master DEA key;

    transmitting, by the attribute authorizers, the new attribute version number and the update parameter of the cipher text attribute component to a data storage dealer;

    storing, by the storage dealer, the received new attribute version number and the update parameter of the cipher text attribute component in the pre-established update parameter list;

    transmitting, from a data access requester, an access request to a data storage dealer for accessing a shared data;

    obtaining, from the data storage dealer, a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component corresponding to the shared data from the data storage dealer, the cipher text attribute component is a first number value, which characterizes an attribute of the data access requester, the encryption key is configured for encrypting the shared data;

    inquiring, by the data access requester, whether a corresponding user attribute component is stored in a preset user attribute component database or not according to the cipher text of the shared data, the cipher text of the encryption key, the access strategy, and the cipher text attribute component returned by the data storage dealer;

    when the data access requester does not store the corresponding user attribute component, transmitting from the data access requester a request for obtaining user attribute component thereof respectively to K attribute authorizers relevant to the access strategy, the user attribute component is a second number value, which means that the data access requester owns an attribute corresponding to the second number value;

    generating, via the K attribute authorizers, the user attribute components of the data access requester respectively when the K attribute authorizers receive the request for obtaining the user attribute component, and transmitting the user attribute component to the data access requester;

    restoring, via the data access requester, the encryption key according to the access strategy, the cipher text of the encryption key, the cipher text attribute component, and the user attribute component received by the data access requester;

    decrypting, via the data access requester, the cipher text of the shared data by using the encryption key, thereby obtaining the shared data requested for accessing.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×