CN108768642B - Data aggregation method and device, computer equipment and storage medium - Google Patents
Data aggregation method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108768642B CN108768642B CN201810648085.2A CN201810648085A CN108768642B CN 108768642 B CN108768642 B CN 108768642B CN 201810648085 A CN201810648085 A CN 201810648085A CN 108768642 B CN108768642 B CN 108768642B
- Authority
- CN
- China
- Prior art keywords
- user
- aggregation
- data
- original data
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000002776 aggregation Effects 0.000 title claims abstract description 98
- 238000004220 aggregation Methods 0.000 title claims abstract description 57
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 claims description 9
- 125000004122 cyclic group Chemical group 0.000 claims description 2
- 230000004048 modification Effects 0.000 abstract description 3
- 238000012986 modification Methods 0.000 abstract description 3
- 230000003993 interaction Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the application discloses a data aggregation method, a data aggregation device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring a system public parameter; the user freely joins a plurality of user groups set by the system to generate an encryption key corresponding to each user; a user encrypts original data of the user and uploads the encrypted original data to an aggregation center; and the aggregation center decrypts the encrypted original data and completes data aggregation. Therefore, a trusted key center is not needed to distribute keys to users, a secure channel is also not needed, the bottom layer of the system is simple to realize, the cost is low, the users can be freely grouped, the system is not needed to carry out global coordination and parameter modification after the user grouping is changed, the system has good locality and flexibility, the aggregation process only needs one-time interaction between the aggregation center and the users, the obtained data is original data, and the aggregation center is allowed to carry out richer data utilization.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data aggregation method and apparatus, a computer device, and a storage medium.
Background
The purpose of data aggregation is to aggregate data of different users to an aggregation center for use by the aggregation center. Under the current big data environment, data aggregation facing large-scale users, such as a crowd sensing system and the like, attracts much attention. These data aggregation applications all require aggregating data of a large number of users to an aggregation center for data analysis or statistics by the aggregation center. However, since the privacy of the personal data of the user may be leaked, ensuring the privacy of the user in the data aggregation process is an important issue in the field, and directly influences whether the data aggregation can be applied on a large scale.
Most privacy-preserving data aggregation methods exist today, the main idea of which is to aggregate the sum of data by homomorphic encryption. Since the aggregation center only obtains the sum of the data, it is not beneficial for the aggregation center to perform more extensive data statistical feature mining and utilization on the raw data.
Recently, Zhang et al (Zhang, Y., Chen, Q., & Zhang, S. privacy-prediction data aggregation in mobile phone sensing. IEEE Transactions on Information strategies and Security,11(5),980 + 992,2016.) have proposed a new aggregation method for protecting privacy data. According to the method, the appropriate secret key is distributed to the user through the credible secret key generation center, so that the aggregation center can obtain the original data of all the users at one time, but the aggregation center cannot correspond the data with the identity of the user, and the privacy of the user is protected. Because the aggregation center obtains the original data of all users instead of the sum of all the data, the aggregation center can carry out richer data mining and utilization, and can meet the requirements of more application scenes. However, the method has the disadvantages that the private key of the user needs to be distributed by the key generation center through a secret channel according to the grouping condition of the user, and once the grouping condition of the user changes, the key generation center needs to distribute the private key for the user again, otherwise, the aggregation fails. Obviously, this greatly reduces the implementation efficiency and flexibility of the system.
Disclosure of Invention
The application provides a data aggregation method, a data aggregation device, computer equipment and a storage medium, and aims to achieve higher implementation efficiency and flexibility while meeting privacy protection during data aggregation.
In a first aspect, the present application provides a data aggregation method, including:
acquiring a system public parameter;
a user freely joins a plurality of user groups set by the system and generates an encryption key corresponding to each user;
the user encrypts original data according to the encryption key and uploads the encrypted original data to the aggregation center;
and the aggregation center decrypts the encrypted original data according to a preset rule and completes data aggregation.
In a second aspect, the present application provides a data aggregation apparatus, comprising:
an acquisition unit for acquiring system public parameters;
the first execution unit is used for enabling users to freely join a plurality of user groups set by the system and generating encryption keys corresponding to the users according to the public parameters;
the second execution unit is used for encrypting the original data of the user according to the encryption key and uploading the encrypted original data to the aggregation center;
and the decryption unit is used for decrypting the encrypted original data by the aggregation center according to a preset rule and finishing data aggregation.
In a third aspect, the present application further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the program, the processor implements the steps of the data aggregation method provided in any one of the embodiments.
In a fourth aspect, the present application further provides a storage medium, wherein the storage medium stores a computer program, the computer program comprises program instructions, which, when executed by a processor, cause the processor to perform the steps of the data aggregation method according to any of the embodiments provided herein.
The embodiment of the application provides a data aggregation method, a data aggregation device, computer equipment and a storage medium, wherein a user freely joins a plurality of user groups set by a system by acquiring system public parameters, an encryption key corresponding to each user is generated according to the public parameters, the user encrypts original data of the user through the encryption key and uploads the encrypted original data to an aggregation center, and the aggregation center decrypts the encrypted original data according to a preset rule and completes data aggregation. Therefore, a trusted key center is not needed to distribute keys to users, a secure channel is also not needed, the bottom layer of the system is simple to realize, the cost is low, the users can be freely grouped, the system is not needed to carry out global coordination and parameter modification after the user grouping is changed, the system has good locality and flexibility, the aggregation process only needs one-time interaction between the aggregation center and the users, the obtained data is original data, and the aggregation center is allowed to carry out richer data utilization.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data aggregation method according to an embodiment of the present application;
fig. 2 is a schematic block diagram of a data aggregation apparatus according to an embodiment of the present application;
fig. 3 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides a data aggregation method, a data aggregation device, computer equipment and a storage medium.
The application scenario to which the data aggregation method of the embodiment of the application is applied comprises a user terminal and a server.
The user terminal can be an electronic device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and a wearable device; the server may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 1, fig. 1 is a schematic flow chart of a data aggregation method according to an embodiment of the present application. As shown in fig. 1, the data aggregation method includes steps S101 to S104.
S101, obtaining system public parameters.
Specifically, the acquiring of the system public parameters comprises acquiring security parameters, the maximum number of users of the system, a secure hash function, a multiplication cyclic group and a public and private key pair corresponding to the users, wherein the public and private key pair comprises a public key and a private key, the private key is randomly acquired through a private key acquisition formula (1-1), and the public key is generated through a public key formula (1-2);
the private key formula is:
the public key formula is as follows:
y=gx (1-2)
wherein p is the order of the multiplication loop group, x is the operation algebra of the hash function, and g is the generator of the multiplication loop group. Setting a safety parameter lambda and the maximum number n of users of the system, and selecting an integer l > lambda and a prime number p > 2λA secure hash function H: {0,1}*→{0,1}lAnd a multiplication loop group G of order p and its generator G. And (4) enabling the user complete set to be U, wherein the total number of the users is not more than n, namely | U | ≦ n. In addition, the identity of each user is an integer, and by default any set of users is ordered according to user identity from small to large. The public parameters of the system are the public keys of all users and (l, p, H, G, U).
S102, the users freely join a plurality of user groups set by the system, and generate encryption keys corresponding to each user according to the public parameters.
Specifically, the public parameters of the system are input, each user freely joins one group, and in a specific implementation, the number of users included in each group can be set to be not less than 3, for example, and all the groups are one division of the whole user set U. Each group is given a unique group identifier, which may be, for example, a set of all user identities in the group, etc. We will later denote a packet by a packet identifier. For any group S, let the position of each user be the order in which the user joins the group, e.g. user u joins group S at 2 nd, then u has a position S (u) in S of 2. Obviously, the position of all users within a group is a random permutation of the set 1, 2. Thus, each user in the system can be uniquely represented by a group identifier and its location. For an arbitrary packet S, it is assumed that it contains k users S ═ { u ═ u }1,u2,...,ukWhere k is 3 or more. Each user uiThe encryption key is generated through an encryption key formula (1-3);
the encryption key formula is as follows:
[k]represents a set of user locations {1, 2.., k } within a single said group of users,is corresponding to user ujE.g. the public key of S, xiIs corresponding to user uiE.g., the private key of S.
S103, the user encrypts the original data according to the encryption key and uploads the encrypted original data to the aggregation center.
Specifically, the encryption result of the user encrypting the original data by combining the encryption key is generated by an encryption formula (1-4);
the encryption formula is as follows:
wherein t is the time period for all users in each of the user groups to complete the encryption of the original data, w ∈ [ k ]]H is the hash function, for each packet S, assuming that it contains k users S ═ { u ═1,u2,...,ukWhere k is 3 or more. All users therein will encrypt their original data according to the above formula during the time period t. Let user uiThe position in the group of e.s is S (u)i)=r∈[k],uiThe original data of the user is mrThe encryption key is
In one embodiment, after the encryption is completed, the user uiE.g. S arranges the ciphertext according to the position sequence number to form a ciphertext vector (c)i1,...,cik) And the group identifier is added and then uploaded to the aggregation center.
And (4) after all users of the system finish uploading the encrypted data according to the process, ending the encryption stage.
S104, the aggregation center decrypts the encrypted original data according to a preset rule and completes data aggregation.
Specifically, the aggregation center acquires original data of a user through a decryption formula (1-5);
the decryption formula is:
wherein mw is any position w ∈ [ k ]]The user of (2) decrypted original data. And after receiving the uploaded data from all the groups, the aggregation center decrypts the original data of all the users group by group according to the grouping condition of the uploaded data. Specifically, assume that the aggregation center receives a packet S ═ { u ═ from packet S1,u2,...,ukAll users of { (c) within time period t { (k ≧ 3) } (where k ≧ 3)i1,...,cik),i∈[k]}. ThatFor all positions w ∈ [ k ]]Decrypted original data
And (3) analyzing a scheme:
accuracy (correctness)
From the algorithm above, it can be seen that for any packet S, user u is assumediE.g. position S (u) of Si)=r∈[k]With the original data mrThen, according to the above decryption algorithm, there are:
due to e in the above formulaijA square matrix with empty diagonal line and unchanged transposition is formed. Therefore, the temperature of the molten metal is controlled,
the algorithm can decrypt successfully. So that the aggregation center can properly aggregate the raw data of all users.
Privacy
As can be seen from the above algorithm, any user within all groups has only the original data encrypted at its corresponding location. The final decryption result is therefore a k-dimensional vector (where k is the total number of users in the group) representing the original data for all users in the group. However, the number of users in the group is large, the positions of the users are random, and only the users in the group know the users, so that the aggregation center does not know the users corresponding to the original data, and privacy protection of the user data can be realized.
Safety
It can be known from the above algorithm that the user performs random encryption using the hash function, and the security of encryption can be well realized due to the pseudo-randomness of the hash function. The aggregation center wants to decrypt the data only by obtaining the user encryption key. However, the user's encrypted private key is in the form of:
the encryption key of each user cannot be obtained according to the public key of the user, which is equivalent to solving the classical computational Diffie-Hellman problem. Of course, if all users in the system group collude to attack an honest user, it is obvious that the original data of the user can be recovered. Therefore, the application scenario of the present invention must satisfy that a maximum of k-2 users in a group, where k is the total number of users in the group, are malicious. This condition is easily satisfied for most large-scale user-oriented data aggregation applications, such as by making the total number of users per group large.
Fig. 2 is a schematic block diagram of a data aggregation apparatus according to an embodiment of the present application. As shown in fig. 2, the present application also provides a data aggregation apparatus corresponding to the above data aggregation method. The data aggregation apparatus, which comprises means for performing the above-mentioned data aggregation method steps, may be configured in a server.
As shown in fig. 2, the data aggregation apparatus 400 includes: an obtaining unit 410, a first executing unit 420, a second executing unit 430 and a decrypting unit 440.
An obtaining unit 410, configured to obtain a system disclosure parameter;
a first executing unit 420, configured to enable a user to freely join a plurality of user groups set in the system, and generate an encryption key corresponding to each user according to the public parameter;
a second execution unit 430, configured to encrypt, by the user, original data of the user according to the encryption key, and upload the encrypted original data to the aggregation center;
the decrypting unit 440 is configured to decrypt the encrypted original data according to a preset rule by the aggregation center, and complete data aggregation.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the data aggregation apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described apparatus may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 3.
Referring to fig. 3, fig. 3 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 700 may be a terminal or a server.
Referring to fig. 3, the computer device 700 includes a processor 720, a memory, which may include a non-volatile storage medium 730 and an internal memory 740, and a network interface 750, which are connected by a system bus 710.
The non-volatile storage medium 730 may store an operating system 731 and computer programs 732. The computer program 732, when executed, may cause the processor 720 to perform any of a variety of data aggregation methods.
The processor 720 is used to provide computing and control capabilities, supporting the operation of the overall computer device 700.
The internal memory 740 provides an environment for the execution of the computer program 732 in the non-volatile storage medium 730, and when the computer program 732 is executed by the processor 720, the processor 720 can be caused to perform any one of the data aggregation methods.
The network interface 750 is used for network communication such as sending assigned tasks and the like. Those skilled in the art will appreciate that the configuration shown in fig. 3 is a block diagram of only a portion of the configuration relevant to the present teachings and is not intended to limit the computing device 700 to which the present teachings may be applied, and that a particular computing device 700 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components. Wherein the processor 720 is configured to execute the program code stored in the memory to perform the following steps:
acquiring a system public parameter; the users freely join a plurality of user groups set by the system, and an encryption key corresponding to each user is generated according to the public parameters; the user encrypts the original data according to the encryption key and uploads the encrypted original data to the aggregation center; and the aggregation center decrypts the encrypted original data according to a preset rule and completes data aggregation.
It should be understood that, in the embodiment of the present Application, the Processor 720 may be a Central Processing Unit (CPU), and the Processor 720 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that the configuration of computer device 700 depicted in FIG. 3 is not intended to be limiting of computer device 700 and may include more or less components than those shown, or some components in combination, or a different arrangement of components.
It will be understood by those skilled in the art that all or part of the processes in the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, and the computer program may be stored in a storage medium, which is a computer-readable storage medium. In the embodiment of the present invention, the computer program may be stored in a storage medium of a computer system and executed by at least one processor in the computer system to implement the flow steps of the embodiments including the methods as described above.
The computer readable storage medium may be a magnetic disk, an optical disk, a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk or an optical disk, etc. which can store program codes.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed data aggregation apparatus and method may be implemented in other ways. For example, the data aggregation device embodiments described above are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the application can be combined, divided and deleted according to actual needs.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (5)
1. A method for data aggregation, comprising:
acquiring a system public parameter;
the user freely joins in one of a plurality of user groups set by the system, and generates an encryption key of the user according to the public parameter;
the user encrypts original data according to the encryption key and uploads the encrypted original data to the aggregation center;
after all users of the system finish uploading the encrypted original data according to the process, the aggregation center decrypts the encrypted original data according to a preset rule and finishes data aggregation;
the system public parameter acquisition method comprises the steps of acquiring a security parameter, the maximum number of users of the system, a secure hash function, a multiplication cyclic group and a public and private key pair corresponding to the users, wherein the public and private key pair comprises a public key and a private key, the private key is randomly acquired through a private key acquisition formula, and the public key is generated through a public key formula;
the private key obtaining formula is as follows:
the public key formula is as follows:
y=gx
wherein p is the order of the multiplication cycle group, and g is the generator of the multiplication cycle group;
the encryption key is generated through an encryption key formula;
the encryption key formula is as follows:
wherein, [ k ]]Represents a set of user locations {1, 2.., k } within a single said group of users,is corresponding to user ujOf public key xiIs corresponding to user uiPrivate key of (1), skiFor user uiThe encryption key of (1);
the user encrypts the original data of the user according to the encryption key into the original data encrypted by an encryption formula;
the encryption formula is as follows:
wherein t is the time period for all users in each of the user groups to complete the encryption of the original data, w ∈ [ k ]]H is the hash function, user uiThe position in the group of e.s is S (u)i)=r∈[k],mrFor user uiRaw data of e S, [ k []I represents a collection whose elements are all from k]But does not include i;
user uiE.g. S will encrypt the text CiwForming a ciphertext vector (c) by arranging the position sequence numbersi1,...,cik) Generating an identifier corresponding to the user group S, marking the ciphertext vector by the identifier and uploading the ciphertext vector to the aggregation center;
the aggregation center decrypts the encrypted original data according to a preset rule to decrypt the encrypted original data by using a decryption formula;
the decryption formula is:
wherein m iswFor a position w ∈ [ k ]]User u ofiThe decrypted original data.
2. The data aggregation method of claim 1, wherein the number of users per the user group is not less than 3.
3. A data aggregation apparatus configured to perform the steps of the method according to any one of claims 1-2, the data aggregation apparatus comprising:
an acquisition unit for acquiring system public parameters;
the first execution unit is used for enabling a user to freely join one of a plurality of user groups set by the system and generating an encryption key of the user according to the public parameter;
the second execution unit is used for encrypting the original data of the user according to the encryption key and uploading the encrypted original data to the aggregation center;
and the decryption unit is used for decrypting the encrypted original data by the aggregation center according to a preset rule and finishing data aggregation.
4. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method according to claim 1 or 2 when executing the computer program.
5. A storage medium, characterized in that the storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the steps of the method according to claim 1 or 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810648085.2A CN108768642B (en) | 2018-06-19 | 2018-06-19 | Data aggregation method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810648085.2A CN108768642B (en) | 2018-06-19 | 2018-06-19 | Data aggregation method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108768642A CN108768642A (en) | 2018-11-06 |
CN108768642B true CN108768642B (en) | 2021-06-01 |
Family
ID=63976434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810648085.2A Active CN108768642B (en) | 2018-06-19 | 2018-06-19 | Data aggregation method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108768642B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600216B (en) * | 2018-12-11 | 2021-08-27 | 安徽大学 | Construction method of chameleon hash function with strong collision resistance |
CN110166243B (en) * | 2019-05-22 | 2022-04-19 | 安徽师范大学 | Aggregation data privacy protection method based on elliptic curve in crowd sensing |
CN111931253B (en) * | 2020-09-15 | 2021-01-15 | 腾讯科技(深圳)有限公司 | Data processing method, system, device and medium based on node group |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9264407B2 (en) * | 2014-04-03 | 2016-02-16 | Palo Alto Research Center Incorporated | Computer-implemented system and method for establishing distributed secret shares in a private data aggregation scheme |
CN107147720A (en) * | 2017-05-16 | 2017-09-08 | 安徽大学 | Traceable effective public auditing method and traceable effective public auditing system in cloud storage data sharing |
-
2018
- 2018-06-19 CN CN201810648085.2A patent/CN108768642B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9264407B2 (en) * | 2014-04-03 | 2016-02-16 | Palo Alto Research Center Incorporated | Computer-implemented system and method for establishing distributed secret shares in a private data aggregation scheme |
CN107147720A (en) * | 2017-05-16 | 2017-09-08 | 安徽大学 | Traceable effective public auditing method and traceable effective public auditing system in cloud storage data sharing |
Also Published As
Publication number | Publication date |
---|---|
CN108768642A (en) | 2018-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107038383B (en) | Data processing method and device | |
Yang et al. | Lightweight sharable and traceable secure mobile health system | |
CN108629027B (en) | User database reconstruction method, device, equipment and medium based on block chain | |
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
Yang et al. | Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach | |
CN107145791B (en) | K-means clustering method and system with privacy protection function | |
Liu et al. | Toward highly secure yet efficient KNN classification scheme on outsourced cloud data | |
US8559631B1 (en) | Systems and methods for efficient decryption of attribute-based encryption | |
KR101744748B1 (en) | Contents protection, encryption and decryption apparatus using white-box cryptography | |
Xu et al. | An integrated privacy preserving attribute-based access control framework supporting secure deduplication | |
US11128452B2 (en) | Encrypted data sharing with a hierarchical key structure | |
CN108491184B (en) | Entropy source acquisition method of random number generator, computer equipment and storage medium | |
CN108768642B (en) | Data aggregation method and device, computer equipment and storage medium | |
KR20130085491A (en) | Multi-user searchable encryption system with index validation and tracing and method thereof | |
EP3343829A1 (en) | Searchable cryptograph processing system | |
CN109672521A (en) | Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation | |
CN112100144A (en) | Block chain file sharing method and device, storage medium and electronic equipment | |
CN111400728A (en) | Data encryption and decryption method and device applied to block chain | |
WO2021098152A1 (en) | Blockchain-based data processing method, device, and computer apparatus | |
CN113411323A (en) | Medical record data access control system and method based on attribute encryption | |
Abdel-Kader et al. | Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. | |
Liu et al. | Secure iot data outsourcing with aggregate statistics and fine-grained access control | |
Hong et al. | A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems | |
Cui et al. | Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database | |
Roslin Dayana et al. | Secure cloud data storage solution with better data accessibility and time efficiency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |