| Literature DB >> 34910722 |
Lei Liu1, Mingwei Cao2,3, Yeguo Sun4.
Abstract
E-documents are carriers of sensitive data, and their security in the open network environment has always been a common problem with the field of data security. Based on the use of encryption schemes to construct secure access control, this paper proposes a fusion data security protection scheme. This scheme realizes the safe storage of data and keys by designing a hybrid symmetric encryption algorithm, a data security deletion algorithm, and a key separation storage method. The scheme also uses file filter driver technology to design a user operation state monitoring method to realize real-time monitoring of user access behavior. In addition, this paper designs and implements a prototype system. Through the verification and analysis of its usability and security, it is proved that the solution can meet the data security protection requirements of sensitive E-documents in the open network environment.Entities:
Mesh:
Year: 2021 PMID: 34910722 PMCID: PMC8673604 DOI: 10.1371/journal.pone.0258464
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Scheme framework.
Fig 2System framework.
Entity definition.
| Notations | Description |
|---|---|
| Sm | Primary server |
| Sr | Authorization server |
| Client | End node |
| User | End node user |
| File | E-Document |
Parameter definition.
| Notations | Description |
|---|---|
| PKc | Public key |
| SKc | Private key |
| Kc1 | Fixed part of private key |
| Kc2 | Random part of private key |
| Au | User attribute certificate |
| Ac | Document attribute set |
| IDu | User information |
| IDc | Client information |
| IDf | File information |
| List_f_(a/s) | Access control information list (global list and sub list) |
| List_c | Client information list |
| Cf | Ciphertext of file |
| EX(y) | Encrypt y with key x |
| DX(y) | Decrypt y with key x |
| Ru | User operation control policy |
Fig 3UOSSM framework.
User information.
| User_Id | User Account Information | Attribute Set (Au) | Remarks |
|---|---|---|---|
| User_A | Id_u_a,Pass_u_a | {Class 1, Middle, Two years} | Legal user |
| User_B | Id_u_b,Pass_u_b | {Class 1, Middle, Six years} | Legal user |
| User_C | Id_u_c,Pass_u_c | {Class 2, High, Five years} | Legal user |
| User_D | Id_u_d,Pass_u_d | {Class 3, Primary, Three years} | Legal user |
| User_E | Id_u_e,Pass_u_e | {Class 1, Middle, Two years} | Malicious user |
| User_F | Id_u_f,Pass_u_f | {Class 1, Middle, Two years} | Malicious user |
File information.
| File_Id | File Information | Access Control Policy (Ac) | Level |
|---|---|---|---|
| File_A | Id_f_a | {Class 3, Middle, Three years}, d = 2 | Level_2 |
| File_B | Id_f_b | {Class 1, High, Five years}, d = 2 | Level_3 |
User access file information.
| User_Id | File_Id | Operational Details (use_op, use_t, use_c) |
|---|---|---|
| User_A | File_A | {Update, 8:50, 10.19.185.140} |
| File_A | {Read, 8:50, 10.19.185.140} | |
| File_B | {Update, 8:50, 10.19.185.140} | |
| File_B | {Read, 8:50, 10.19.185.140} | |
| User_B | File_A | {Update, 14:30, 10.19.185.70} |
| File_A | {Read, 14:30, 10.19.185.70} | |
| File_B | {Update, 14:30, 10.19.185.70} | |
| File_B | {Read, 14:30, 10.19.185.70} | |
| User_C | File_A | {Update, 10:00, 10.19.185.100} |
| File_A | {Read, 10:00, 10.19.185.100} | |
| File_B | {Update, 10:00, 10.19.185.100} | |
| File_B | {Read, 10:00, 10.19.185.100} | |
| User_D | File_A | {Update, 13:00, 10.19.185.25} |
| File_A | {Read, 13:00, 10.19.185.25} | |
| File_B | {Update, 13:00, 10.19.185.25} | |
| File_B | {Read, 13:00, 10.19.185.25} | |
| User_E | File_A | {Update, 11:50, 10.19.185.110} |
| File_A | {Read, 11:50, 10.19.185.110} | |
| File_B | {Update, 11:50, 10.19.185.110} | |
| File_B | {Read, 11:50, 10.19.185.110} | |
| User_F | File_A | {Update, 15:00, 214.18.15.120} |
| File_A | {Read, 15:00, 214.18.15.120} | |
| File_B | {Update, 15:00, 214.18.15.120} | |
| File_B | {Read, 15:00, 214.18.15.120} |
User access result information.
| User_Id | File_Id | User Authentication | Document Access Control (Ac∩Au≥d) | User Operation Control | Result | |
|---|---|---|---|---|---|---|
| Identity Verification | Au Validation | |||||
| User_A | File_A | True | True | False | / | / |
| File_A | True | True | False | / | / | |
| File_B | True | True | False | / | / | |
| File_B | True | True | False | / | / | |
| User_B | File_A | True | True | True | F∩T∩T = False | / |
| File_A | True | True | True | T∩T∩T = True | OK | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| User_C | File_A | True | True | True | F∩T∩T = False | / |
| File_A | True | True | True | T∩T∩T = True | OK | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| User_D | File_A | True | True | False | / | / |
| File_A | True | True | False | / | / | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| File_B | True | True | True | T∩T∩T = True | OK | |
| User_E | File_A | True | False | / | / | / |
| File_A | True | False | / | / | / | |
| File_B | False | / | / | / | / | |
| File_B | False | / | / | / | / | |
| User_F | File_A | True | True | True | F∩T∩F = False | / |
| File_A | True | True | True | T∩T∩F = False | / | |
| File_B | False | / | / | / | / | |
| File_B | False | / | / | / | / | |
Fig 4Algorithm rate comparison.
Data recovery performance.
| Recoverable files | Zero time rewriting | One time rewriting | Two times rewriting | Three times rewriting | Four times rewriting |
|---|---|---|---|---|---|
| Readable files | |||||
| [ | 97 | 11 | 1 | 0 | 0 |
| 92 | 2 | 0 | 0 | 0 | |
| [ | 90 | 2 | 0 | 0 | 0 |
| 85 | 0 | 0 | 0 | 0 | |
| [ | 91 | 5 | 0 | 0 | 0 |
| 89 | 0 | 0 | 0 | 0 |
Fig 5Comparison among [33, 34], and HSEA.
Fig 6Comparison of network costs.
Fig 7Computational costs of primary server.
System function comparison.
| DE | DD | KM | DT | Total | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| PS | AS | C | PS | AS | C | PS | AS | C | PS | AS | C | PS | AS | C | |
| [ | Y | N | N | N | N | Y | N | Y | N | Y | N | Y | 2Y | 1Y | 2Y |
| [ | Y | N | N | N | N | Y | N | Y | N | N | N | Y | 1Y | 1Y | 2Y |
| [ | Y | N | Y | N | N | Y | N | Y | N | Y | N | Y | 2Y | 1Y | 3Y |
|
| N | N | Y | N | N | Y | N | Y | Y | N | N | N | 0Y | 1Y | 3Y |
DE: Data encryption DD: Data decryption KM: Key management DT: Data transmission.
PS: Primary server AS: Authorization server C: Client.
Fig 8Prototype system.