CN105721146A - Big data sharing method for cloud storage based on SMC - Google Patents
Big data sharing method for cloud storage based on SMC Download PDFInfo
- Publication number
- CN105721146A CN105721146A CN201610121114.0A CN201610121114A CN105721146A CN 105721146 A CN105721146 A CN 105721146A CN 201610121114 A CN201610121114 A CN 201610121114A CN 105721146 A CN105721146 A CN 105721146A
- Authority
- CN
- China
- Prior art keywords
- user
- csp
- key
- data
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a big data sharing method for cloud storage based on SMC. The big data sharing method comprises the following stages: (1), initializing, wherein the stage comprises three processes: finishing data encryption and uploading by DO, AA initialization and user registration; (2), secrete splitting, wherein the stage allows the DO to split a key Ki into the following formulas, which are respectively kept by the AA (temporarily), the DO and a CSP; (3), inquiring, a system allows a User to transmit a query request to the CSP, and after the AA verifies a user attribute, the AA transmits the user attribute to the User, and after that, the CSP transmits ciphertext data and the following formula to the User, and finally, the User recovers the key Ki and decrypts a ciphertext. The big data sharing method for the cloud storage based on the SMC provided by the invention can allow the User to directly acquire shared data from the CSP and alleviate the workload of the DO in a data sharing process to the utmost extent; besides, the method can also verify the attribute of the User, so as to guarantee that only legitimate User can acquire data.
Description
Technical field
The present invention relates to cloud storage technology, be specifically related to a kind of facing cloud storage big data sharing method based on SMC.
Background technology
Along with bringing of big data age, data are presenting explosive growth.For individual or enterprise, storage, the limited PC of calculated performance, the privately owned server of mobile phone or enterprise can not meet demand.People start to select big data are stored cloud.
But under cloud environment, data are uploaded to cloud service provider by data owner, in order to ensure the confidentiality of sensitive data, data owner will be uploaded to cloud service provider again after data encryption.Although encryption can ensure that the confidentiality of data, but reduces the quality of cloud service to a certain extent.
Data sharing is a very important function in cloud storage.In order to alleviate the workload of data owner, data owner allows authorized user directly to download ciphertext data from cloud service provider end, and formulates different deciphering schemes for specific user.But data owner is necessary for different users and formulates different deciphering schemes, and is likely to the privacy of leak data owner in this process.
In order to protect the confidentiality of data, it is prevented that incredible CSP peeps and analytical data, data encryption is first uploaded to CSP by DO again.In order to give specific user by data sharing, DO is necessary for each user and formulates special encipherment scheme, then decruption key is distributed to user, but under this scheme, the encryption overhead of DO is very big.
A kind of desirably scheme is the unified encryptions of all of data, but distributes different keys for different user, and each user can only decipher the data of his Internet access.Based on encryption attribute (Attribute-BasedEncryption, ABE) also known as fuzzy Identity based encryption (FuzzyIdentity-BasedEncryption), it it is a kind of encipherment scheme based on user property.ABE has two important branches: key strategy based on encryption attribute (Key-PolicyAttribute-BasedEncryption, KP-ABE) and Ciphertext policy based on encryption attribute (Ciphertext-PolicyAttribute-BasedEncryption, CP-ABE).No matter it is KP-ABE or CP-ABE, all includes four main process initialization, encryption, key generation and deciphering.In key generation process, ABE requires that DO is for the different attribute of user, generates different keys for each user, and therefore, DO must be always maintained at online in whole data sharing process, and the expense of DO is relatively larger.
The another kind of scheme that can be effectively realized under cloud environment big data sharing is to act on behalf of re-encryption (ProxyRe-Encryption, PRE).We by one simply example introduce her PKI PK of PRE:AliceAEncrypt her photo, and be uploaded to the CSP of an incomplete trust by safe lane.When she go on business not time, she wants the PKI that his photo shares to her good friend Bob, Bob to be PKB, but Alice is not desired to her private key SK againAIt is leaked to Bob.PRE allows Alice to provide a re-encrypted private key RKA→BRK can be used to CSP, CSPA→BRe-encrypted PKACiphertext after encryption, and ciphertext is transformed into the private key SK that can use BobBThe ciphertext of deciphering, and confidential data and any relevant private key SK will not be exposed in this processAAnd SKBAny information.But in PRE, DO needs to generate the communication of different re-encrypted private key RK, DO for different users and computing cost is bigger.
The data of encryption are uploaded to CSP by DO, and legal user can obtain secret key decryption data and obtain plaintext value.But general data sharing is all data entirety encrypted, and then shares to User, and this way is easy to expose the privacy of DO.In order to solve this problem, Cheng-KangChu et al. provides extendible data-sharing scheme (being called for short Key-Aggregate below) in a kind of cloud storage, and scheme allows DO that data are carried out block encryption storage.In order to avoid exposing the privacy of DO and extra information; the encryption key of multiple piecemeals is aggregated into the aggregation key of a fixed size by Key-Aggregate scheme; it is sent to user, so both protects the privacy of DO, decrease again the communication overhead between DO and User to a certain extent.In Key-Aggregate scheme, DO needs the different pieces of information sharing request for different User to generate different aggregation key, and therefore the communication overhead of DO and calculation cost are all relatively larger.
Summary of the invention
Goal of the invention: it is an object of the invention to solve the deficiencies in the prior art, there is provided the storage of a kind of facing cloud based on the big data sharing method of SMC, method provided by the invention is built upon on encipherment scheme, the key of encryption is performed the big data-sharing scheme based on SMC, both can realize privacy share, DO can be allowed again to depart from from the extensive work of data sharing.
Technical scheme: a kind of facing cloud of the present invention storage, based on the big data sharing method of SMC, comprises the following steps successively:
(1) initialize: the encryption of the complete paired data of DO and upload, AA initializes and user's registration;
(2) secret segmentation: secret is divided into three parts by (2,3) threshold secret sharing scheme by DO:WithWhereinBe sent to AA temporarily for preserve,It is sent to CSP, DO storageWherein, i.e. κi∈ K, 1≤i≤n;
(3) inquiry: User shares data.
Further, the detailed process of described step (1) is:
(1-1) first DO adds ciphertext data with existing AES (such as SDB and protection encryption etc.) and ciphertext is uploaded to CSP, and DO is each key κi∈ K generates a KeyID, corresponding Sub-KeyIDs and access rights tree T;
(1-2) AA initializes, and user access control table is sent to believable attribute certification authority AA by DO, comprises KeyID and access rights tree T in user access control table;
(1-3) user's registration, it is allowed to user UiSending application for registration to CA, CA is each user UiDistribute a unique identity Uidi, CA sends attribute logging request to AA, and AA carrys out distributive property collection S according to role or the identity of useriTo user Ui, and property set is returned to the Uid that CA, CA generation comprises user identityiWith property set SiCertificateCertificate is sent to user U by escape way by CAi。
Further, in described step (2), for κi, participant gathers the secret of P={User, CSP, DO} and is divided into three below step:
(2-1) DO is by all key κi∈ K is encoded into ACSII code, and the purpose of do so is in order to meet the data of all data types;
(2-2) t=2, n=3 are set, it is determined that a three-dimensional vector X={x1,x2,x3, DO is by xiDistribute to pi∈ P, and xiValue be disclosed in;
(2-3) DO is randomly chosen a coefficient a1, then three order polynomial PiX () is respectively defined as P1(x)=a1x1+a0, P2(x)=a1x2+a0, P3(x)=a1x3+a0, polynomial value is the secret Sub-Key of the son after segmentation;DO is one Sub-KeyID of each Sub-Key stochastic generation, and indexes table, is randomly assigned two of which Sub-Key and Sub-KeyID to CSP and User, and the SubKey of User is kept in by AA, and concordance list is sent to CSP by DO.
Further, in described step (3), the detailed process of the shared data of User is:
(3-1) user User sends inquiry request Query to CSP;
(3-2) after CSP receives request, relate to the cipher key sets QK of data for Query, after search index table, κ will be comprisediKeyID and Sub-KeyIDs attribute checking request be sent to AA;
(3-3) AA inquires about UACL table checking user property, if user property is legal, then AA willIt is sent to user User, and transmits verification result to CSP;
If what (3-4) CSP received is that attribute is verified, then CSP is by corresponding with Sub-KeyIDs for ciphertext dataIt is sent to User;If what receive is do not pass through, then it is illegal that CSP returns user property;
(3-5) User receivesWithAfter utilize Lagrange interpolating function to calculate κi, User is by κiASCII character translate into plaintext value.
Further, in described step (3-3), when AA inquires about user access control table checking user property, it is judged that whether its attribute meets corresponding authority access tree T, in user access control table, each key associates with authority access tree T, and the root node of T isConcrete verification step is as follows:
If (3-3-1) x is the leaf node of T, then judge SiWhether belong to property set S, ifThenIf Si∈ S, then
If (3-3-2) x is not the leaf node of T, then, first calculateWherein x ' is the child node of x,Return 1 and if only if at least kxIndividual child node returns 1;
If (3-3-3)So user User is legal;IfSo user User is illegal.
Further, in described step (3-5), User receivesWithAfter, if meeting threshold value 2, recover key κi;
Assume vector X={x1,x2,x3, x1、x2And x3All it is randomly generated, for instance x1=20, x2=10, x3=30, User holds x1, CSP holds x2, DO holds x3, User holds two polynomial values So can obtain κ according to following formulaiSolution be:
Beneficial effect: the present invention can either allow User directly to obtain shared data from CSP end, and alleviates the DO workload at data sharing process dramatically;The attribute of User can also be verified by method, to guarantee that legal User could obtain data.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of access rights tree T in embodiment;
Fig. 2 is embodiment system architecture diagram;
Fig. 3 is the initialization of embodiment and secret segmentation phase flow figure, and wherein, step 1-6 is initial phase, step 7-9 is the secret segmentation stage;
Fig. 4 is inquiry phase Organization Chart in embodiment;
Fig. 5 is the flow chart of inquiry phase in embodiment.
Detailed description of the invention
Below technical solution of the present invention is described in detail, but protection scope of the present invention is not limited to described embodiment.
The facing cloud storage of the present invention includes the three below stage based on the big data sharing method of SMC:
(1) initialize: the encryption of the complete paired data of DO and upload, AA initializes and user's registration.
As it is shown on figure 3, first (1-1) DO adds ciphertext data with existing AES and ciphertext is uploaded to CSP.DO is each key κi∈ K generates a KeyID, corresponding Sub-KeyIDs and access rights tree T.
(1-2) AA initializes.User access control table (UACL) is sent to believable attribute certification authority AA, UACL and is shown in Table 1 by DO, and UACL contains KeyID and access rights tree T;Wherein, access rights tree T defines the access structure of key.Assume key κiAccess rights tree TiAs shown in Figure 1, then user UiAttribute SiIt must is fulfilled for Si={ A} or Si={ B, C, D} or Si={ E, F} could recover κiValue.
(1-3) user's registration.System allows user UiSending application for registration to CA, CA is each user UiDistribute a unique identity Uidi, CA sends attribute logging request, the AA role according to user to AA
Or identity carrys out distributive property collection SiTo user Ui, and property set is returned to the Uid that CA, CA generation comprises user identityiWith property set SiCertificateCertificate is sent to user U by escape way by CAi。
(2) secret segmentation: DO passes through (2,3) threshold secret sharing scheme by secret (i.e. κi∈ K) it is divided into three parts:WithWhereinBe sent to AA temporarily for preserve,It is sent to CSP, oneself storageFor κi, participant gathers the secret of P={User, CSP, DO} and is divided into three below step:
(2-1) DO is by all key κi∈ K is encoded into ACSII code (the translater coding in Fig. 2).The purpose of do so is in order to meet the data of all data types.
(2-2) set us and set t=2, n=3.Determine a three-dimensional vector X={x1,x2,x3}.DO is by xiDistribute to pi∈ P, and xiValue be disclosed in.
(2-3) DO is randomly chosen a coefficient a1.So three order polynomial PiX () can be defined as P1(x)=a1x1+a0, P2(x)=a1x2+a0, P3(x)=a1x3+a0, polynomial value is the secret Sub-Key of the son after segmentation.DO is one Sub-KeyID of each Sub-Key stochastic generation, and indexes table (IndexTable, in Table 2), is randomly assigned by two of which Sub-Key and Sub-KeyID to CSP and User (SubKey of User is kept in by AA).Concordance list is sent to CSP by DO.
(3) inquiry: User shares the process (see Fig. 4) of data.Inquiry phase is divided into following five steps:
(3-1) user User sends inquiry request Query to CSP.
(3-2), after CSP receives request, first analyze Query and relate to the cipher key sets QK of data, after search index table (IndexTable), κ will be comprisediKeyID and Sub-KeyIDs attribute checking request be sent to AA.
(3-3) AA inquires about UACL table checking user property, if user property is legal, then AA willIt is sent to user User, and when transmitting verification result to CSP, AA inquiry UACL table checking user property, it is judged that whether its attribute meets corresponding authority access tree T.In UACL, each key associates with authority access tree T, and the root node of T isConcrete proof procedure is as follows:
If (3-3-1) x is the leaf node of T, then judge SiWhether belong to property set S.IfThenIf Si∈ S, then
If (3-3-2) x is not the leaf node of T, then, first calculateWherein x ' is the child node of x,Return 1 and if only if at least kxIndividual child node returns 1.
If (3-3-3)So user User is legal;IfSo user User is illegal.
If what (3-4) CSP received is that attribute is verified, then CSP is by corresponding with Sub-KeyIDs for ciphertext dataIt is sent to User;If what receive is do not pass through, then it is illegal that CSP returns user property.
(3-5) User receivesWithAfter utilize Lagrange interpolating function to calculate κi, User is by κiASCII character translate into plaintext value (translater decoding) in Fig. 2.The flow chart of inquiry phase is as shown in Figure 5.The process of User deciphering is as follows:
User receivesWithAfter, meet threshold value 2, it is possible to recover key κi.Assume vector X={x1=20, x2=10, x3=30}, User hold x1, CSP holds x2, DO holds x3.User holds two polynomial values So can obtain κ according to following formulaiSolution be:
The present invention is directed to the attribute evaluation of the secret segmentation of method and inquiry phase, additionally provide secret segmentation (SSDA) and two algorithms of attribute evaluation (AEA).
(1) secret partitioning algorithm (SecretShareDistributionAlgorithm is called for short SSDA): as shown in algorithm 1, this algorithm is to gather K as input.Algorithm is by each key κ in set KiIt is divided into 3 Sub-Key:
First algorithm 1 sets the entity number of privacy share as 3, and the threshold value of secret reconstruction is 2 (line1-2), then defines a series of variable (line3-6).Algorithm 1 is each key κi∈ K generates KeyID and Sub-KeyIDs (line7-11).Then it is that participant User, CSP and DO distribute an xi(line12-14), a three-dimensional vector X ← { x is constituted1,x2,x3(line15).For each xjEach key κ of ∈ Xi∈ K, algorithm 1 generates a multinomial, and multinomial coefficient is (line16-21) that randomly choose.Finally by addition set corresponding for sub-key (line22-26), and send result to AA and CSP (line27-28).Set hypothesis and there is a cipher key sets K={ κ1,κ2,κ3,κ4,κ5(table 3), after the secret segmentation stage, obtain son secret (table 4a, 4b, 4c), held by User, CSP and DO respectively.
Table 3
Table 4a
Table 4b
Table 4c
(2) attribute evaluation algorithm (AttributeEvaluationAlgorithm is called for short AEA): as shown in algorithm 2, this algorithm is used to assessment User attribute SUserWhether meet access rights tree T corresponding in UACL table.AEA is with UACL, User property set SUserAs input, export result simultaneously, if result=1, represent that user property is legal;Otherwise illegal.
First algorithm 2 defines a series of variable (line1-5), and wherein attr (x) represents when the node x leaf node being T, the value of the attribute corresponding with node x;TxRepresent a stalk tree of T, and with node x for root node;KxRepresent the threshold value of node x.For user property collection SUserEach x node (line6), first determine whether that whether x is the leaf node of T.If node x is the leaf node of T, if attr (x) is ∈ S, thenOtherwise(line7-10).If node x is not the leaf node (line11) of T, then the child node x's ' of computing node xValue (line12).The number of the accumulative x ' returning 1, is stored in num (line13-15).If kxIndividual x ' returns 1, thenOtherwiseFinally return to result (line23).If result is 1, then user property is legal;Otherwise user property is illegal.
Above-mentioned secret partitioning algorithm (SSDA) is:
Above-mentioned attribute evaluation algorithm (AEA) is:
By above-described embodiment it can be seen that the present invention has following 2 advantages: the amount of storage of (1) DO: the length of the son secret of participant is not less than the length of its shared secret.Method provided by the invention is by attribute and cipher key associated, and only key is carried out privacy share.Therefore, relatively initial data being carried out privacy share, the amount of storage of the DO of this scheme is less.DO has only to store each encryption keyDO can to CSP request encryption after data andRecycling Lagrange interpolating function recovers clear data.(2) workload of DO: DO only completes the encryption of initial data and the segmentation of key at the initial phase of system and sends UACL table to the work of AA.DO is not involved in inquiry phase.This means that DO need not complete the substantial amounts of work uploading download, re-encrypted, it is not required that keep always on.
Claims (6)
1. a facing cloud stores the big data sharing method based on SMC, it is characterised in that: comprise the following steps successively:
(1) initialize: the encryption of the complete paired data of DO and upload, AA initializes and user's registration;
(2) secret segmentation: secret is divided into three parts by (2,3) threshold secret sharing scheme by DO:WithWhereinBe sent to AA temporarily for preserve,It is sent to CSP, DO storageWherein, i.e. κi∈ K;1≤i≤n, the key κ of encryption have n, κiRepresent one of them;
(3) inquiry: User shares data.
2. facing cloud according to claim 1 storage is based on the big data sharing method of SMC, it is characterised in that: the detailed process of described step (1) is:
(1-1) first DO adds ciphertext data with AES and ciphertext is uploaded to CSP, DO is each key κi∈ K generates a KeyID, corresponding Sub-KeyIDs and access rights tree T;
(1-2) AA initializes, and user access control table is sent to believable attribute certification authority AA by DO, comprises KeyID and access rights tree T in user access control table;
(1-3) user's registration, it is allowed to user UiSending application for registration to CA, CA is each user UiDistribute a unique identity Uidi, CA sends attribute logging request to AA, and AA carrys out distributive property collection S according to role or the identity of useriTo user Ui, and property set is returned to the Uid that CA, CA generation comprises user identityiWith property set SiCertificateCertificate is sent to user U by escape way by CAi。
3. facing cloud according to claim 1 storage is based on the big data sharing method of SMC, it is characterised in that: in described step (2), for κi, participant gathers the secret of P={User, CSP, DO} and is divided into three below step:
(2-1) DO is by all key κi∈ K is encoded into ACSII code;
(2-2) t=2, n=3 are set, it is determined that a three-dimensional vector X={x1,x2,x3, DO is by xiDistribute to pi∈ P, and xiValue be disclosed in;
(2-3) DO is randomly chosen a coefficient a1, then three order polynomial PiX () is respectively defined as P1(x)=a1x1+a0, P2(x)=a1x2+a0, P3(x)=a1x3+a0, polynomial value is the secret Sub-Key of the son after segmentation;DO is one Sub-KeyID of each Sub-Key stochastic generation, and indexes table, is randomly assigned two of which Sub-Key and Sub-KeyID to CSP and User, and the SubKey of User is kept in by AA, and concordance list is sent to CSP by DO.
4. facing cloud according to claim 1 storage is based on the big data sharing method of SMC, it is characterised in that: in described step (3), the detailed process of the shared data of User is:
(3-1) user User sends inquiry request Query to CSP;
(3-2) after CSP receives request, relate to the cipher key sets QK of data for Query, after search index table, κ will be comprisediKeyID and Sub-KeyIDs attribute checking request be sent to AA;
(3-3) AA inquires about UACL table checking user property, if user property is legal, then AA willIt is sent to user User, and transmits verification result to CSP;
If what (3-4) CSP received is that attribute is verified, then CSP is by corresponding with Sub-KeyIDs for ciphertext dataIt is sent to User;If what receive is do not pass through, then it is illegal that CSP returns user property;
(3-5) User receivesWithAfter utilize Lagrange interpolating function to calculate κi, User is by κiASCII character translate into plaintext value.
5. facing cloud according to claim 4 storage is based on the big data sharing method of SMC, it is characterized in that: in described step (3-3), when AA inquires about user access control table checking user property, judge whether its attribute meets corresponding authority access tree T, in user access control table, each key associates with authority access tree T, and the root node of T is γ;Concrete verification step is as follows:
If (3-3-1) x is the leaf node of T, then judge SiWhether belong to property set S, ifThen Tx(γ)=0;If Si∈ S, then Tx(γ)=1;
If (3-3-2) x is not the leaf node of T, then, first calculate Tx′(γ), wherein x ' is the child node of x, Tx(γ) 1 is returned and if only if at least kxIndividual child node returns 1;
If (3-3-3) Tx(γ)=1, then user User is legal;If Tx(γ)=0, then user User is illegal.
6. facing cloud according to claim 4 storage is based on the big data sharing method of SMC, it is characterised in that: in described step (3-5), User receivesWithAfter, if meeting threshold value 2, recover key κi;
Assume vector X={x1,x2,x3, User holds x1, CSP holds x2, DO holds x3, User holds two polynomial values So can obtain κ according to following formulaiSolution be:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610121114.0A CN105721146B (en) | 2016-03-03 | 2016-03-03 | A kind of big data sharing method towards cloud storage based on SMC |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610121114.0A CN105721146B (en) | 2016-03-03 | 2016-03-03 | A kind of big data sharing method towards cloud storage based on SMC |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105721146A true CN105721146A (en) | 2016-06-29 |
CN105721146B CN105721146B (en) | 2018-12-21 |
Family
ID=56157278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610121114.0A Active CN105721146B (en) | 2016-03-03 | 2016-03-03 | A kind of big data sharing method towards cloud storage based on SMC |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105721146B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106656997A (en) * | 2016-11-09 | 2017-05-10 | 湖南科技学院 | Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method |
CN107086902A (en) * | 2017-03-22 | 2017-08-22 | 北京理工大学 | It is a kind of that tripartite's examination & verification and the cloud storage system of file duplicate removal are supported based on dynamic threshold password |
CN108418677A (en) * | 2017-02-09 | 2018-08-17 | 杭州海康威视数字技术股份有限公司 | Cipher key backup, restoration methods and device |
CN112329037A (en) * | 2020-11-10 | 2021-02-05 | 交控科技股份有限公司 | Data acquisition method and device |
CN112364376A (en) * | 2020-11-11 | 2021-02-12 | 贵州大学 | Attribute agent re-encryption medical data sharing method |
CN112860790A (en) * | 2021-01-14 | 2021-05-28 | 华控清交信息科技(北京)有限公司 | Data management method, system and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101569132A (en) * | 2006-11-07 | 2009-10-28 | 安全第一公司 | Systems and methods for distributing and securing data |
WO2013131244A1 (en) * | 2012-03-06 | 2013-09-12 | Nokia Corporation | Methods, apparatuses, and computer-readable storage media for securely accessing social networking data |
CN104038349A (en) * | 2014-07-03 | 2014-09-10 | 西安电子科技大学 | Effective and verifiable public key searching encryption method based on KP-ABE |
CN105282171A (en) * | 2015-11-06 | 2016-01-27 | 北京大学深圳研究生院 | Safe and reliable distributed cloud storage method |
-
2016
- 2016-03-03 CN CN201610121114.0A patent/CN105721146B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101569132A (en) * | 2006-11-07 | 2009-10-28 | 安全第一公司 | Systems and methods for distributing and securing data |
WO2013131244A1 (en) * | 2012-03-06 | 2013-09-12 | Nokia Corporation | Methods, apparatuses, and computer-readable storage media for securely accessing social networking data |
CN104038349A (en) * | 2014-07-03 | 2014-09-10 | 西安电子科技大学 | Effective and verifiable public key searching encryption method based on KP-ABE |
CN105282171A (en) * | 2015-11-06 | 2016-01-27 | 北京大学深圳研究生院 | Safe and reliable distributed cloud storage method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106656997A (en) * | 2016-11-09 | 2017-05-10 | 湖南科技学院 | Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method |
CN106656997B (en) * | 2016-11-09 | 2019-06-18 | 湖南科技学院 | One kind being based on the cross-domain friend-making method for secret protection of mobile social networking proxy re-encryption |
CN108418677A (en) * | 2017-02-09 | 2018-08-17 | 杭州海康威视数字技术股份有限公司 | Cipher key backup, restoration methods and device |
CN108418677B (en) * | 2017-02-09 | 2021-01-15 | 杭州海康威视数字技术股份有限公司 | Key backup and recovery method and device |
CN107086902A (en) * | 2017-03-22 | 2017-08-22 | 北京理工大学 | It is a kind of that tripartite's examination & verification and the cloud storage system of file duplicate removal are supported based on dynamic threshold password |
CN112329037A (en) * | 2020-11-10 | 2021-02-05 | 交控科技股份有限公司 | Data acquisition method and device |
CN112364376A (en) * | 2020-11-11 | 2021-02-12 | 贵州大学 | Attribute agent re-encryption medical data sharing method |
CN112860790A (en) * | 2021-01-14 | 2021-05-28 | 华控清交信息科技(北京)有限公司 | Data management method, system and device |
CN112860790B (en) * | 2021-01-14 | 2023-05-30 | 华控清交信息科技(北京)有限公司 | Data management method, system and device |
Also Published As
Publication number | Publication date |
---|---|
CN105721146B (en) | 2018-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108632032B (en) | Safe multi-keyword sequencing retrieval system without key escrow | |
CN112019591B (en) | Cloud data sharing method based on block chain | |
CN110033258B (en) | Service data encryption method and device based on block chain | |
US9419797B2 (en) | System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords | |
CN103281377B (en) | A kind of encrypt data storage and querying method of facing cloud | |
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
CN103731432B (en) | Multi-user supported searchable encryption method | |
CN105721146A (en) | Big data sharing method for cloud storage based on SMC | |
CN102314580A (en) | Vector and matrix operation-based calculation-supported encryption method | |
CN104158880B (en) | User-end cloud data sharing solution | |
CN105743645A (en) | PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method | |
CN110730064B (en) | Data fusion method based on privacy protection in crowd sensing network | |
CN108632385B (en) | Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure | |
CN104993931A (en) | Multi-user encrypted search method in cloud storage | |
Sun et al. | Research on logistics information blockchain data query algorithm based on searchable encryption | |
CN106452748A (en) | Multiple users-based outsourcing database audit method | |
CN117240452A (en) | Plateau data safe sharing method based on block chain | |
Jones et al. | Information security: A coordinated strategy to guarantee data security in cloud computing | |
Cai et al. | Vizard: A metadata-hiding data analytic system with end-to-end policy controls | |
Cui et al. | Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database | |
CN108920968B (en) | File searchable encryption method based on connection keywords | |
CN116383874A (en) | Traceable privacy information retrieval method based on blockchain | |
CN114430321B (en) | DFA self-adaptive security-based black box traceable key attribute encryption method and device | |
Chakraborti et al. | On the optimality of non-linear computations for symmetric key primitives | |
Srimathi et al. | Improved Cloud Storage Encryption Using Block Cipher-Based DNA Anti-Codify Model. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210318 Address after: 298 Xingye Road, Xinjie street, Yixing City, Wuxi City, Jiangsu Province Patentee after: JIANGSU ZHUOYI INFORMATION TECHNOLOGY Co.,Ltd. Address before: No. 302, Xuefu Road, Zhenjiang City, Jiangsu Province, 212000 Patentee before: JIANGSU University |
|
TR01 | Transfer of patent right |