Netinfo Security ›› 2016, Vol. 16 ›› Issue (5): 30-36.doi: 10.3969/j.issn.1671-1122.2016.05.005

• Orginal Article • Previous Articles     Next Articles

Research on Hierarchical Identity-based Encryption Management System in Cloud Computing

Haiping JI, Lei XU, Xiaoling YU, Chungen XU   

  1. Department of Applied Mathematics, Nanjing University of Science and Technology, Nanjing Jiangsu 210094, China
  • Received:2016-04-18 Online:2016-05-20 Published:2020-05-13

Abstract:

This paper described a hierarchical encryption management system in cloud computing which was structured by the hierarchical identity-based encryption algorithm. This system mainly included four functional modules: the user login module, the database management module, the key distribution module, the file encryption and decryption module. The key distribution module divided users into different layers. Each user of different layers had a corresponding private key generator, and only provided its next user with private key. The problem that private key generator overload is solved by hierarchical key server. The system was designed by using java programming language in the form of specific graphical user interface and combing with the concrete hierarchical identity-based encryption algorithm. This paper realizes hierarchical encryption management system which documents are transmited secretly between internal staff of group for the first time in the cloud commputing.

Key words: hierarchical identity-based encryption, key management, database, Java, cloud computing

CLC Number: