Abstract
The data stored in the cloud contains a lot of privacy and confidentiality. The scalability of data privacy access control is weak, the attack resistance rate is low, and the risk rate of privacy disclosure is high. Therefore, a data privacy access control method based on ciphertext policy attribute-based encryption algorithm is proposed. The encryption scheme is designed based on the ciphertext policy attribute-based encryption algorithm as the formulated privacy policy. Aiming at the implementation and guarantee of privacy policy in cloud environment, a trusted execution method of privacy policy in cloud environment is proposed. Design a data access control model based on blockchain. The entities included in the model are data owner, data requester, data storage center, attribute authority and blockchain network. The test results show that the method has strong scalability, high fault tolerance rate, no third party, can achieve authorization, and the attack resistance rate is higher than 94%, and the risk rate of privacy leakage is low.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Feng, T., Pei, H., Ma, R., et al.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua 66(1), 871–890 (2020)
Yang, C., Tan, L., Shi, N., et al.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604–70615 (2020)
Gao, P., Li, J., Liu, S.: An introduction to key technology in artificial intelligence and big data driven e-learning and e-education. Mob. Netw. Appl. 26(5), 2123–2126 (2021)
Liu, S., Hu, R., Wu, J., et al.: Research on data classification and feature fusion method of cancer nuclei image based on deep learning. Int. J. Imaging Syst. Technol. 32(3), 969–981 (2022)
Edemacu, K., Jang, B., Kim, J.W.: Efficient and expressive access control with revocation for privacy of PHR based on OBDD access structure. IEEE Access 8, 18546–18557 (2020)
Mi, B., Long, P., Liu, Y., et al.: Balancing access control and privacy for data deduplication via functional encryption. Math. Probl. Eng.Probl. Eng. 2020(4), 1–11 (2020)
Mehta, V., Gooch, D., Bandara, A., et al.: Privacy care: a tangible interaction framework for privacy management. ACM Trans. Internet Technol. 21(1), 1–32 (2021)
Alemany, J., Val, E.D., GarcÃa-Fornes, A.: A review of privacy decision-making mechanisms in online social networks. ACM Comput. Surv. (CSUR) 55(2), 1–32 (2022)
Iwaya, L.H., Ahmad, A., Babar, M.A.: Security and privacy for mHealth and uHealth systems: a systematic mapping study. IEEE Access 8, 150081–150112 (2020)
Ma, X.: User information privacy query access control based on BP neural network. Comput. Simul. 37(7), 341–345 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, C., Lin, W., Zhang, Y. (2024). Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-031-50577-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-50577-5_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50576-8
Online ISBN: 978-3-031-50577-5
eBook Packages: Computer ScienceComputer Science (R0)