Skip to main content

Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm

  • Conference paper
  • First Online:
Multimedia Technology and Enhanced Learning (ICMTEL 2023)

Abstract

The data stored in the cloud contains a lot of privacy and confidentiality. The scalability of data privacy access control is weak, the attack resistance rate is low, and the risk rate of privacy disclosure is high. Therefore, a data privacy access control method based on ciphertext policy attribute-based encryption algorithm is proposed. The encryption scheme is designed based on the ciphertext policy attribute-based encryption algorithm as the formulated privacy policy. Aiming at the implementation and guarantee of privacy policy in cloud environment, a trusted execution method of privacy policy in cloud environment is proposed. Design a data access control model based on blockchain. The entities included in the model are data owner, data requester, data storage center, attribute authority and blockchain network. The test results show that the method has strong scalability, high fault tolerance rate, no third party, can achieve authorization, and the attack resistance rate is higher than 94%, and the risk rate of privacy leakage is low.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Feng, T., Pei, H., Ma, R., et al.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua 66(1), 871–890 (2020)

    Article  Google Scholar 

  2. Yang, C., Tan, L., Shi, N., et al.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604–70615 (2020)

    Article  Google Scholar 

  3. Gao, P., Li, J., Liu, S.: An introduction to key technology in artificial intelligence and big data driven e-learning and e-education. Mob. Netw. Appl. 26(5), 2123–2126 (2021)

    Article  Google Scholar 

  4. Liu, S., Hu, R., Wu, J., et al.: Research on data classification and feature fusion method of cancer nuclei image based on deep learning. Int. J. Imaging Syst. Technol. 32(3), 969–981 (2022)

    Article  Google Scholar 

  5. Edemacu, K., Jang, B., Kim, J.W.: Efficient and expressive access control with revocation for privacy of PHR based on OBDD access structure. IEEE Access 8, 18546–18557 (2020)

    Article  Google Scholar 

  6. Mi, B., Long, P., Liu, Y., et al.: Balancing access control and privacy for data deduplication via functional encryption. Math. Probl. Eng.Probl. Eng. 2020(4), 1–11 (2020)

    Google Scholar 

  7. Mehta, V., Gooch, D., Bandara, A., et al.: Privacy care: a tangible interaction framework for privacy management. ACM Trans. Internet Technol. 21(1), 1–32 (2021)

    Article  Google Scholar 

  8. Alemany, J., Val, E.D., García-Fornes, A.: A review of privacy decision-making mechanisms in online social networks. ACM Comput. Surv. (CSUR) 55(2), 1–32 (2022)

    Article  Google Scholar 

  9. Iwaya, L.H., Ahmad, A., Babar, M.A.: Security and privacy for mHealth and uHealth systems: a systematic mapping study. IEEE Access 8, 150081–150112 (2020)

    Article  Google Scholar 

  10. Ma, X.: User information privacy query access control based on BP neural network. Comput. Simul. 37(7), 341–345 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuangji Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, C., Lin, W., Zhang, Y. (2024). Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-031-50577-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-50577-5_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-50576-8

  • Online ISBN: 978-3-031-50577-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics