CN108881195A - Data safety sharing method and device based on cloud environment - Google Patents

Data safety sharing method and device based on cloud environment Download PDF

Info

Publication number
CN108881195A
CN108881195A CN201810579506.0A CN201810579506A CN108881195A CN 108881195 A CN108881195 A CN 108881195A CN 201810579506 A CN201810579506 A CN 201810579506A CN 108881195 A CN108881195 A CN 108881195A
Authority
CN
China
Prior art keywords
user
private key
key
identity
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810579506.0A
Other languages
Chinese (zh)
Inventor
蒋云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810579506.0A priority Critical patent/CN108881195A/en
Publication of CN108881195A publication Critical patent/CN108881195A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The data safety sharing method and device, method that the present invention provides a kind of based on cloud environment include:The initialization algorithm in preset password component is executed, determines corresponding public and private key;System user information table is initialized, and is stored through safe lane transmission system user information table and recipient's private key to privately owned Cloud Server;Public address system Your Majesty key and recipient's public key;Privately owned Cloud Server is received according to the User Identity and keyword to be checked of user cloud file access request acknowledgment of your inquiry, and carries out cipher-text information retrieval;Transmission retrieves the return file set after determining to the corresponding user terminal of user cloud file access request.According to the technical solution of the present invention, data sharing has flexible access control and the searching ciphertext function based on keyword independent of the shared of same private key, realizes controllable shared and retrieval purpose, while reducing local computing amount and the amount of being locally stored.

Description

Data safety sharing method and device based on cloud environment
Technical field
The present invention relates to technical field of data security, shared in particular to a kind of data safety based on cloud environment Method and a kind of data safety sharing means based on cloud environment.
Background technique
Although searching ciphertext technology is protects the privacy of cloud data to provide the approach of a kind of " efficient ", it only belongs to In the single user searching ciphertext the case where, and now the application scenarios of cloud computing data outsourcing storage that can be found everywhere are to searching ciphertext Requirement it is much more complex.Under current application scenarios, keyword can be based on from cloud service according to access strategy between user Device is retrieved to obtain shared data, this is a kind of loose, flexible, popular data outsourcing application scenarios.It is current to adapt to The application scenarios of cloud computing data outsourcing storage are in the related technology that all users with legitimate access rights is allowed to be owned by The key of data owner is to access the file that the owner shares, but there are a series of defects for this method:
(1)It increases the risk that key is potentially leaked and abused and finds the attacker of key if some user has lost Mi Lang It can be obtained the ability for accessing the All Files that the user owner shares.
(2)Lead to user key enormous amount, if user has the access authority of the shared file for multiple owners, So he can be assigned multiple keys, and the quantity of these keys is capable of the number of sources of the shared file of Lawful access with him (That is the number of data owner)It is directly proportional, and the key of these enormous amounts how is kept properly, it is a stubborn problem.
(3)It is unfavorable for formulating flexibly controllable access strategy, for a user, all sharing files of same owner are all Access attribute having the same may have access to or inaccessible, set flexible access attribute if need to classify, but will be at multiplication The quantity of big key.
(4)It is unfavorable for the revocation of access privilege, the search access right of user such as to be cancelled must update the user and be possessed All data owners key, while issuing updated key, calculation amount again for other related and unrevoked users It is huge.
Summary of the invention
The purpose of the present invention is to provide one kind securely and reliably, calculation amount is lower, operation is more stable and reliable based on cloud ring The data safety sharing method in border and a kind of data safety sharing means based on cloud environment.
To achieve the goals above, technical solution of the present invention provides a kind of shared side of the data safety based on cloud environment Method is suitable for publicly-owned Cloud Server, including:The initialization algorithm in preset password component is executed, determines corresponding public and private key, Public and private key includes system Your Majesty key, main system private key, recipient's public key, recipient's private key;System user information table is initialized, and System user information table is sent through safe lane and recipient's private key to privately owned Cloud Server stores;It public address system Your Majesty key and connects Receipts person's public key;Privately owned Cloud Server is received according to the User Identity of user cloud file access request acknowledgment of your inquiry and to be checked Keyword is ask, and carries out cipher-text information retrieval;Return file set to user cloud file access after transmission retrieval determines is asked Seek corresponding user terminal.
In the present solution, executing the initialization algorithm in preset password component, determine that corresponding public and private key, public and private key include System Your Majesty key, main system private key, recipient's public key, recipient's private key initialize system user information table later, and through safety Channel sends system user information table and recipient's private key to privately owned Cloud Server stores, public address system Your Majesty key and reception later Person's public key realizes the configuration of key, is advantageously implemented controllable shared and retrieval purpose, while reducing local computing amount, By receiving User Identity and to be checked pass of the privately owned Cloud Server according to user cloud file access request acknowledgment of your inquiry Keyword, and cipher-text information retrieval is carried out, the return file set after transmission retrieval judgement to user cloud file access request pair The user terminal answered realizes the shared of file, using the flexibility and self-help of publicly-owned Cloud Server, privately owned Cloud Server Safety realizes the balance of safety and efficiency.
It should be noted that preset password component is the broadcast enciphering IBBE of identity-based and public key can search for adding Close PEKS, the initialization algorithm of the broadcast enciphering of identity-based are stetup (λ, n), and the specially algorithm inputs security parameter λ With the maximum number n of the recipient allowed in a broadcast enciphering, output system Your Majesty key and main system private key, public key be can search for The initialization algorithm of encryption is stetup (λ), and the specially algorithm inputs security parameter λ, exports recipient's public key and recipient Private key.
Furthermore it is also possible to determine corresponding public and private key, specially by following scheme:It inputs parameter lambda and initializes prime number p Rank is the two-wire group G for generating member with g, and defines bilinear map ê thereon:G×G→GTAnd binary-coded character set of strings On hash function H:{0,1 }*→Zp, { 0,1 } * indicates the set being made of the string of binary characters of random length here; Randomly select g2, g3, { hi}m i=1∈RGWith x ∈ RZp, and output system Your Majesty's key, pk=(G, g1, g2, g3, { hi}m i=1), here g1=gx;Calculate msk=g2 xAs main system private key;Initialising subscriber information table T and permission set Ρ={ p1, p2..., here, and for each pi∈ Ρ randomly selects symmetrical recipient's private key, with initialising subscriber information table T and power Limit set Ρ is sent to privately owned Cloud Server storage and management together.
Preferably, further include:When receiving new user's application addition request, it is added according to new user application in requesting User Identity and main system private key generate the broadcast enciphering private key of the identity-based of corresponding user;Execute preset number The public and private key of a pair of digital signature scheme is randomly generated in the initialization function of signature algorithm;Determine User Identity, based on body The broadcast enciphering private key, digital signature scheme private key of part are private key for user, and return to corresponding new user Shen through safe lane The corresponding user terminal of request please be added;New user's registration information is sent to privately owned Cloud Server, and updates system user information Table, new user's registration information include User Identity, digital signature scheme public key;When determining revocation user is based on keyword Retrieval permissions when, send corresponding User Identity to privately owned Cloud Server, so that privately owned Cloud Server is according to user's body Part identification search simultaneously deletes the list item corresponded in system user information table.
In the present solution, being added according to new user application in requesting by when receiving new user's application addition request User Identity and main system private key generate the broadcast enciphering private key of the identity-based of corresponding user, are advantageously implemented new The application of user is added, and by executing the initialization function of preset number signature algorithm, the one of digital signature scheme is randomly generated To public and private key, determine that User Identity, the broadcast enciphering private key of identity-based, digital signature scheme private key are that user is private later Key, and return to corresponding new user through safe lane and apply that the corresponding user terminal of request is added, be conducive to user and be total to Permission is enjoyed, when receiving cryptograph files, can decrypt as clear text file, be read out and use, passes through and sends new user's note Volume information updates system user information table to privately owned Cloud Server, and new user's registration information includes User Identity, number Signature scheme public key reduces key and potentially leaks and abuse risk, and user key quantity is smaller, is conducive to be protected It deposits, storage occupied space is reduced, and calculation amount is smaller, by when the retrieval permissions based on keyword for determining revocation user When, corresponding User Identity is sent to privately owned Cloud Server, so that privately owned Cloud Server is searched for according to User Identity And the list item corresponded in system user information table is deleted, realize the more efficiently revocation of access privilege, Er Qiewu More new key need to be issued again for other related and unrevoked users, reduce calculation amount, promoting data sharing safety While, improve the efficiency of data sharing.
Technical solution of the present invention additionally provides a kind of data safety sharing method based on cloud environment, is suitable for data master Terminal, including:The broadcast enciphering algorithm for executing identity-based generates session key and right according to the set of User Identity The broadcast message head answered;According to session key symmetric cryptography shared file, cryptograph files are generated;Executing public key can search for encryption calculation Method encrypts keyword relevant to shared file, generates ciphertext keyword;Cipher-text information is sent to publicly-owned cloud service Device, cipher-text information include the set of User Identity, cryptograph files, ciphertext keyword, broadcast message head.
In the present solution, according to the set of User Identity, generating meeting by the broadcast enciphering algorithm for executing identity-based Key and corresponding broadcast message head are talked about, is advantageously implemented the generation of cryptograph files, the upload for the data that data master terminal possesses, By generating cryptograph files according to session key symmetric cryptography shared file, is conducive to the safety for ensureing shared file, passes through Executing public key can search for Encryption Algorithm, encrypt to keyword relevant to shared file, generates ciphertext keyword, is conducive to The retrieval for realizing cryptograph files, by sending cipher-text information to publicly-owned Cloud Server, cipher-text information includes User Identity Set, cryptograph files, ciphertext keyword, broadcast message head are conducive to publicly-owned Cloud Server and are asked according to user to shared file Ask, carry out the retrieval of cipher-text information, to realize that the safety of data is shared, cipher-text information include User Identity set, Cryptograph files, ciphertext keyword, broadcast message head, the user for only meeting condition could obtain plaintext corresponding to cryptograph files File has further ensured the safety of data sharing, and calculation amount is small, and storage occupies little space.
Technical solution of the present invention additionally provides a kind of data safety sharing method based on cloud environment, is suitable for private clound Server, including:When receiving user cloud file access request, according to User Identity, searching system user is searched Information table, user cloud file access request include User Identity, keyword to be checked, user using digital signature scheme Signature of the private key to User Identity and keyword to be checked;When lookup retrieves the respective table in system user information table , and when signature verification success, search result will be searched and be translated as trapdoor form, and by User Identity and key to be checked Word is sent to publicly-owned Cloud Server, so that publicly-owned Cloud Server carries out cipher-text information retrieval.
In the present solution, according to User Identity, searching retrieval by when receiving user cloud file access request System user information table, user cloud file access request include User Identity, keyword to be checked, user's use number Signature scheme private key is to the signature of User Identity and keyword to be checked, later when lookup retrieves system user information Corresponding list item in table, and when signature verification success, will search search result and be translated as trapdoor form, and by User Identity It is sent to publicly-owned Cloud Server with keyword to be checked, so that publicly-owned Cloud Server carries out cipher-text information retrieval, is taken full advantage of The mutual cooperation of privately owned Cloud Server and publicly-owned Cloud Server further improves the safety of data sharing, utilizes public cloud The flexibility and self-help of server, the safety of privately owned Cloud Server realize the balance of safety and efficiency, independent of same Sharing for one private key, is provided simultaneously with flexible access control and the searching ciphertext function based on keyword, is locally stored in liberation While, also ensure the safety of privately owned Cloud Server storage and the safety of data sharing process.
Technical solution of the present invention additionally provides a kind of data safety sharing method based on cloud environment, and it is whole to be suitable for user End, including:Receive the private key for user that publicly-owned Cloud Server determines, private key for user include User Identity, identity-based it is wide Broadcast encryption key, digital signature scheme private key;Receive the return file set after publicly-owned Cloud Server retrieval determines;Execution is based on The broadcast decipherment algorithm of identity restores the session key with data master terminal;It is decrypted and is returned in file set according to session key Each cryptograph files, generate corresponding clear text file.
In the present solution, the private key for user determined by receiving publicly-owned Cloud Server, private key for user include User Identity, Broadcast enciphering private key, the digital signature scheme private key of identity-based are conducive to quickly solve in the cryptograph files for receiving request Close is clear text file, retrieves the return file set after determining by receiving publicly-owned Cloud Server, executes identity-based later Decipherment algorithm is broadcasted, the session key with data master terminal is restored, is decrypted returned in file set according to session key later Each cryptograph files generate corresponding clear text file, and the user for only meeting condition could obtain corresponding to the bright of cryptograph files File further improves convenience and the safety of data sharing independent of the shared of same private key.
Technical solution of the present invention additionally provides a kind of data safety sharing means based on cloud environment, is suitable for public cloud Server, including:Execution unit determines corresponding public and private key, public affairs for executing the initialization algorithm in preset password component Private key includes but is not limited to system Your Majesty key, main system private key, recipient's public key, recipient's private key;Transmission unit, for initial Change system user information table, and is deposited through safe lane transmission system user information table and recipient's private key to privately owned Cloud Server Storage;Unit is announced, public address system Your Majesty key and recipient's public key are used for;Receiving unit, for receive privately owned Cloud Server according to The User Identity and keyword to be checked of user cloud file access request acknowledgment of your inquiry, and carry out cipher-text information retrieval; It is whole to the corresponding user of user cloud file access request to be used for transmission the return file set after retrieval determines for transmission unit End.
In the present solution, executing the initialization algorithm in preset password component, determine that corresponding public and private key, public and private key include System Your Majesty key, main system private key, recipient's public key, recipient's private key initialize system user information table later, and through safety Channel sends system user information table and recipient's private key to privately owned Cloud Server stores, public address system Your Majesty key and reception later Person's public key realizes the configuration of key, is advantageously implemented controllable shared and retrieval purpose, while reducing local computing amount, By receiving User Identity and to be checked pass of the privately owned Cloud Server according to user cloud file access request acknowledgment of your inquiry Keyword, and cipher-text information retrieval is carried out, the return file set after transmission retrieval judgement to user cloud file access request pair The user terminal answered realizes the shared of file, using the flexibility and self-help of publicly-owned Cloud Server, privately owned Cloud Server Safety realizes the balance of safety and efficiency.
It should be noted that preset password component is the broadcast enciphering IBBE of identity-based and public key can search for adding Close PEKS, the initialization algorithm of the broadcast enciphering of identity-based are stetup (λ, n), and the specially algorithm inputs security parameter λ With the maximum number n of the recipient allowed in a broadcast enciphering, output system Your Majesty key and main system private key, public key be can search for The initialization algorithm of encryption is stetup (λ), and the specially algorithm inputs security parameter λ, exports recipient's public key and recipient Private key.
Furthermore it is also possible to determine corresponding public and private key, specially by following scheme:It inputs parameter lambda and initializes prime number p Rank is the two-wire group G for generating member with g, and defines bilinear map ê thereon:G×G→GTAnd binary-coded character set of strings On hash function H:{0,1 }*→Zp, { 0,1 } * indicates the set being made of the string of binary characters of random length here; Randomly select g2, g3, { hi}m i=1∈RGWith x ∈ RZp, and output system Your Majesty's key, pk=(G, g1, g2, g3, { hi}m i=1), here g1=gx;Calculate msk=g2 xAs main system private key;Initialising subscriber information table T and permission set Ρ={ p1, p2..., here, and for each pi∈ Ρ randomly selects symmetrical recipient's private key, with initialising subscriber information table T and power Limit set Ρ is sent to privately owned Cloud Server storage and management together.
Preferably, further include:Generation unit, for when receiving new user and applying that request is added, according to new user Shen The User Identity in request and main system private key please be added, the broadcast enciphering for generating the identity-based of corresponding user is private Key;Execution unit is also used to:The initialization function for executing preset number signature algorithm, is randomly generated a pair of digital signature scheme Public and private key;Determination unit, for determining broadcast enciphering private key, the digital signature scheme private key of User Identity, identity-based For private key for user, and through safe lane returns to corresponding new user and apply being added and request corresponding user terminal;Transmission unit It is also used to:New user's registration information is sent to privately owned Cloud Server, and updates system user information table, new user's registration information packet Include User Identity, digital signature scheme public key;Transmission unit is also used to:When the inspection based on keyword for determining revocation user Suo Quan prescribes a time limit, and sends corresponding User Identity to privately owned Cloud Server, so that privately owned Cloud Server is according to user identity mark Know and searches for and delete corresponding to the list item in system user information table.
In the present solution, being added according to new user application in requesting by when receiving new user's application addition request User Identity and main system private key generate the broadcast enciphering private key of the identity-based of corresponding user, are advantageously implemented new The application of user is added, and by executing the initialization function of preset number signature algorithm, the one of digital signature scheme is randomly generated To public and private key, determine that User Identity, the broadcast enciphering private key of identity-based, digital signature scheme private key are that user is private later Key, and return to corresponding new user through safe lane and apply that the corresponding user terminal of request is added, be conducive to user and be total to Permission is enjoyed, when receiving cryptograph files, can decrypt as clear text file, be read out and use, passes through and sends new user's note Volume information updates system user information table to privately owned Cloud Server, and new user's registration information includes User Identity, number Signature scheme public key reduces key and potentially leaks and abuse risk, and user key quantity is smaller, is conducive to be protected It deposits, storage occupied space is reduced, and calculation amount is smaller, by when the retrieval permissions based on keyword for determining revocation user When, corresponding User Identity is sent to privately owned Cloud Server, so that privately owned Cloud Server is searched for according to User Identity And the list item corresponded in system user information table is deleted, realize the more efficiently revocation of access privilege, Er Qiewu More new key need to be issued again for other related and unrevoked users, reduce calculation amount, promoting data sharing safety While, improve the efficiency of data sharing.
Technical solution of the present invention additionally provides a kind of data safety sharing means based on cloud environment, is suitable for data master Terminal, including:Execution unit, according to the set of User Identity, is generated for executing the broadcast enciphering algorithm of identity-based Session key and corresponding broadcast message head;Generation unit, for generating ciphertext according to session key symmetric cryptography shared file File;Execution unit is also used to:Executing public key can search for Encryption Algorithm, encrypt to keyword relevant to shared file, Generate ciphertext keyword;Transmission unit, for sending cipher-text information to publicly-owned Cloud Server, cipher-text information includes user identity mark The set of knowledge, cryptograph files, ciphertext keyword, broadcast message head.
In the present solution, according to the set of User Identity, generating meeting by the broadcast enciphering algorithm for executing identity-based Key and corresponding broadcast message head are talked about, is advantageously implemented the generation of cryptograph files, the upload for the data that data master terminal possesses, By generating cryptograph files according to session key symmetric cryptography shared file, is conducive to the safety for ensureing shared file, passes through Executing public key can search for Encryption Algorithm, encrypt to keyword relevant to shared file, generates ciphertext keyword, is conducive to The retrieval for realizing cryptograph files, by sending cipher-text information to publicly-owned Cloud Server, cipher-text information includes User Identity Set, cryptograph files, ciphertext keyword, broadcast message head are conducive to publicly-owned Cloud Server and are asked according to user to shared file Ask, carry out the retrieval of cipher-text information, to realize that the safety of data is shared, cipher-text information include User Identity set, Cryptograph files, ciphertext keyword, broadcast message head, the user for only meeting condition could obtain plaintext corresponding to cryptograph files File has further ensured the safety of data sharing, and calculation amount is small, and storage occupies little space.
Technical solution of the present invention additionally provides a kind of data safety sharing means based on cloud environment, is suitable for private clound Server, including:Retrieval unit is searched, for when receiving user cloud file access request, according to User Identity, Searching system user message table is searched, user cloud file access request includes User Identity, keyword to be checked, user Using digital signature scheme private key to the signature of User Identity and keyword to be checked;Transmission unit, for when lookup The corresponding list item in system user information table is retrieved, and when signature verification success, search result will be searched and be translated as trapdoor shape Formula, and User Identity and keyword to be checked are sent to publicly-owned Cloud Server, so that publicly-owned Cloud Server carries out ciphertext Information retrieval.
In the present solution, according to User Identity, searching retrieval by when receiving user cloud file access request System user information table, user cloud file access request include User Identity, keyword to be checked, user's use number Signature scheme private key is to the signature of User Identity and keyword to be checked, later when lookup retrieves system user information Corresponding list item in table, and when signature verification success, will search search result and be translated as trapdoor form, and by User Identity It is sent to publicly-owned Cloud Server with keyword to be checked, so that publicly-owned Cloud Server carries out cipher-text information retrieval, is taken full advantage of The mutual cooperation of privately owned Cloud Server and publicly-owned Cloud Server further improves the safety of data sharing, utilizes public cloud The flexibility and self-help of server, the safety of privately owned Cloud Server realize the balance of safety and efficiency, independent of same Sharing for one private key, is provided simultaneously with flexible access control and the searching ciphertext function based on keyword, is locally stored in liberation While, also ensure the safety of privately owned Cloud Server storage and the safety of data sharing process.
Technical solution of the present invention additionally provides a kind of data safety sharing means based on cloud environment, and it is whole to be suitable for user End, including:Receiving unit, the private key for user determined for receiving publicly-owned Cloud Server, private key for user include User Identity, Broadcast enciphering private key, the digital signature scheme private key of identity-based;Receiving unit is also used to:Publicly-owned Cloud Server retrieval is received to sentence Return file set after fixed;Execution unit restores and data master terminal for executing the broadcast decipherment algorithm of identity-based Session key;Generation unit generates corresponding for decrypting each cryptograph files returned in file set according to session key Clear text file.
In the present solution, the private key for user determined by receiving publicly-owned Cloud Server, private key for user include User Identity, Broadcast enciphering private key, the digital signature scheme private key of identity-based are conducive to quickly solve in the cryptograph files for receiving request Close is clear text file, retrieves the return file set after determining by receiving publicly-owned Cloud Server, executes identity-based later Decipherment algorithm is broadcasted, the session key with data master terminal is restored, is decrypted returned in file set according to session key later Each cryptograph files generate corresponding clear text file, and the user for only meeting condition could obtain corresponding to the bright of cryptograph files File further improves convenience and the safety of data sharing independent of the shared of same private key.
Both had the flexibility and self-help of publicly-owned Cloud Server using mixing cloud environment by above technical scheme, It can be with secure storage, independent of same further through the cryptograph files that the safety of privately owned Cloud Server uploads data master terminal Sharing for one private key, has flexible access control and the searching ciphertext function based on keyword, realizes controllable shared and inspection The purpose of rope, while reducing local computing amount and the amount of being locally stored.
Additional aspect and advantage of the invention will provide in following description section, will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures Obviously and it is readily appreciated that, wherein:
Fig. 1 is the schematic flow diagram of the data safety sharing method based on cloud environment in an embodiment;
Fig. 2 is the schematic flow diagram of the data safety sharing method based on cloud environment in an embodiment;
Fig. 3 is the schematic flow diagram of the data safety sharing method based on cloud environment in an embodiment;
Fig. 4 is the schematic flow diagram of the data safety sharing method based on cloud environment in an embodiment;
Fig. 5 is the schematic block diagram of the data safety sharing means based on cloud environment in an embodiment;
Fig. 6 is the schematic block diagram of the data safety sharing means based on cloud environment in an embodiment;
Fig. 7 is the schematic block diagram of the data safety sharing means based on cloud environment in an embodiment;
Fig. 8 is the schematic block diagram of the data safety sharing means based on cloud environment in an embodiment.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
As shown in Figure 1, the data safety sharing method based on cloud environment in the embodiment, is suitable for publicly-owned cloud service Device includes the following steps:
S102 executes the initialization algorithm in preset password component, determines corresponding public and private key, public and private key includes system Your Majesty Key, main system private key, recipient's public key, recipient's private key;
S104 initializes system user information table, and sends system user information table and recipient's private key to private through safe lane There is Cloud Server storage;
S106, public address system Your Majesty key and recipient's public key;
S108 receives privately owned Cloud Server according to the User Identity of user cloud file access request acknowledgment of your inquiry and to be checked Keyword is ask, and carries out cipher-text information retrieval;
S110, transmission retrieve the return file set after determining to the corresponding user terminal of user cloud file access request.
In the present embodiment, the initialization algorithm in preset password component is executed, determines corresponding public and private key, public and private key packet System Your Majesty key, main system private key, recipient's public key, recipient's private key are included, initializes system user information table later, and through pacifying All channel sends system user information table and recipient's private key to privately owned Cloud Server and store, later public address system Your Majesty key with connect Receipts person's public key realizes the configuration of key, is advantageously implemented controllable shared and retrieval purpose, while reducing local computing Amount, by receiving privately owned Cloud Server according to the User Identity of user cloud file access request acknowledgment of your inquiry and to be checked Keyword, and cipher-text information retrieval is carried out, the return file set after transmission retrieval judgement to user cloud file access request Corresponding user terminal realizes the shared of file, utilizes the flexibility and self-help of publicly-owned Cloud Server, privately owned Cloud Server Safety, realize the balance of safety and efficiency.
It should be noted that preset password component is the broadcast enciphering IBBE of identity-based and public key can search for adding Close PEKS, the initialization algorithm of the broadcast enciphering of identity-based are stetup (λ, n), and the specially algorithm inputs security parameter λ With the maximum number n of the recipient allowed in a broadcast enciphering, output system Your Majesty key and main system private key, public key be can search for The initialization algorithm of encryption is stetup (λ), and the specially algorithm inputs security parameter λ, exports recipient's public key and recipient Private key.
Furthermore it is also possible to determine corresponding public and private key, specially by following scheme:It inputs parameter lambda and initializes prime number p Rank is the two-wire group G for generating member with g, and defines bilinear map ê thereon:G×G→GTAnd binary-coded character set of strings On hash function H:{0,1 }*→Zp, { 0,1 } * indicates the set being made of the string of binary characters of random length here; Randomly select g2, g3, { hi}m i=1∈RGWith x ∈ RZp, and output system Your Majesty's key, pk=(G, g1, g2, g3, { hi}m i=1), here g1=gx;Calculate msk=g2 xAs main system private key;Initialising subscriber information table T and permission set Ρ={ p1, p2..., here, and for each pi∈ Ρ randomly selects symmetrical recipient's private key, with initialising subscriber information table T and power Limit set Ρ is sent to privately owned Cloud Server storage and management together.
Preferably, further include:When receiving new user's application addition request, it is added according to new user application in requesting User Identity and main system private key generate the broadcast enciphering private key of the identity-based of corresponding user;Execute preset number The public and private key of a pair of digital signature scheme is randomly generated in the initialization function of signature algorithm;Determine User Identity, based on body The broadcast enciphering private key, digital signature scheme private key of part are private key for user, and return to corresponding new user Shen through safe lane The corresponding user terminal of request please be added;New user's registration information is sent to privately owned Cloud Server, and updates system user information Table, new user's registration information include User Identity, digital signature scheme public key;When determining revocation user is based on keyword Retrieval permissions when, send corresponding User Identity to privately owned Cloud Server, so that privately owned Cloud Server is according to user's body Part identification search simultaneously deletes the list item corresponded in system user information table.
In the present embodiment, by being added according to new user application in requesting when receiving new user's application addition request User Identity and main system private key, generate the broadcast enciphering private key of the identity-based of corresponding user, be advantageously implemented The application of new user is added, and by executing the initialization function of preset number signature algorithm, digital signature scheme is randomly generated A pair of public and private key determines that User Identity, the broadcast enciphering private key of identity-based, digital signature scheme private key are user later Private key, and return to corresponding new user through safe lane and apply that the corresponding user terminal of request is added, be conducive to user's acquisition Share Permissions can be decrypted as clear text file when receiving cryptograph files, be read out and use, and pass through and send new user Registration information updates system user information table to privately owned Cloud Server, and new user's registration information includes User Identity, number Word signature scheme public key reduces key and potentially leaks and abuse risk, and user key quantity is smaller, is conducive to carry out It saves, storage occupied space is reduced, and calculation amount is smaller, by when the retrieval permissions based on keyword for determining revocation user When, corresponding User Identity is sent to privately owned Cloud Server, so that privately owned Cloud Server is searched for according to User Identity And the list item corresponded in system user information table is deleted, realize the more efficiently revocation of access privilege, Er Qiewu More new key need to be issued again for other related and unrevoked users, reduce calculation amount, promoting data sharing safety While, improve the efficiency of data sharing.
As shown in Fig. 2, the data safety sharing method based on cloud environment in the embodiment, is suitable for data master terminal, Specifically include following steps:
S202 executes the broadcast enciphering algorithm of identity-based, according to the set of User Identity, generates session key and correspondence Broadcast message head;
S204 generates cryptograph files according to session key symmetric cryptography shared file;
S206, executing public key can search for Encryption Algorithm, encrypt to keyword relevant to shared file, and it is crucial to generate ciphertext Word;
S208, sends cipher-text information to publicly-owned Cloud Server, cipher-text information include the set of User Identity, cryptograph files, Ciphertext keyword, broadcast message head.
In the present embodiment, by executing the broadcast enciphering algorithm of identity-based, according to the set of User Identity, generate Session key and corresponding broadcast message head, are advantageously implemented the generation of cryptograph files, the data that data master terminal possesses it is upper It passes, by the way that according to session key symmetric cryptography shared file, generation cryptograph files are conducive to the safety for ensureing shared file, It can search for Encryption Algorithm by executing public key, keyword relevant to shared file encrypted, ciphertext keyword is generated, has Conducive to the retrieval for realizing cryptograph files, by sending cipher-text information to publicly-owned Cloud Server, cipher-text information includes user identity mark The set of knowledge, cryptograph files, ciphertext keyword, broadcast message head are conducive to publicly-owned Cloud Server according to user to shared file Request, carry out the retrieval of cipher-text information, to realize that the safety of data is shared, cipher-text information includes the collection of User Identity Conjunction, cryptograph files, ciphertext keyword, broadcast message head, the user for only meeting condition could obtain corresponding to cryptograph files Clear text file has further ensured the safety of data sharing, and calculation amount is small, and storage occupies little space.
As shown in figure 3, the data safety sharing method based on cloud environment in the embodiment, is suitable for privately owned cloud service Device specifically includes following steps:
S302, according to User Identity, searches searching system user information when receiving user cloud file access request Table, user cloud file access request include User Identity, keyword to be checked, user using digital signature scheme private key To the signature of User Identity and keyword to be checked;
S304 will search retrieval knot when lookup retrieves the corresponding list item in system user information table, and signature verification is successful Fruit is translated as trapdoor form, and User Identity and keyword to be checked are sent to publicly-owned Cloud Server, for public cloud Server carries out cipher-text information retrieval.
In the present embodiment, by according to User Identity, searching inspection when receiving user cloud file access request Cable system user message table, user cloud file access request include User Identity, keyword to be checked, user using number Word signature scheme private key believes the signature of User Identity and keyword to be checked when lookup retrieves system user later The corresponding list item in table is ceased, and when signature verification success, search result will be searched and be translated as trapdoor form, and by user identity mark Know and keyword to be checked is sent to publicly-owned Cloud Server, so that publicly-owned Cloud Server carries out cipher-text information retrieval, makes full use of The mutual cooperation of privately owned Cloud Server and publicly-owned Cloud Server, further improves the safety of data sharing, utilization is publicly-owned The flexibility and self-help of Cloud Server, the safety of privately owned Cloud Server realize the balance of safety and efficiency, independent of Sharing for same private key, is provided simultaneously with flexible access control and the searching ciphertext function based on keyword, locally deposits in liberation While storage, the safety of privately owned Cloud Server storage and the safety of data sharing process have also been ensured.
As shown in figure 4, the data safety sharing method based on cloud environment in the embodiment, is suitable for user terminal, tool Body includes the following steps:
S402, receives the private key for user that publicly-owned Cloud Server determines, private key for user include User Identity, identity-based it is wide Broadcast encryption key, digital signature scheme private key;
S404 receives the return file set after publicly-owned Cloud Server retrieval determines;
S406 executes the broadcast decipherment algorithm of identity-based, restores the session key with data master terminal;
S408 decrypts each cryptograph files returned in file set according to session key, generates corresponding clear text file.
In the present embodiment, the private key for user determined by receiving publicly-owned Cloud Server, private key for user includes user identity mark Know, the broadcast enciphering private key of identity-based, digital signature scheme private key, is conducive to quick in the cryptograph files for receiving request Decryption is clear text file, retrieves the return file set after determining by receiving publicly-owned Cloud Server, executes identity-based later Broadcast decipherment algorithm, restore with the session key of data master terminal, decrypted returned in file set according to session key later Each cryptograph files, generate corresponding clear text file, the user for only meeting condition could obtain corresponding to cryptograph files Clear text file further improves convenience and the safety of data sharing independent of the shared of same private key.
As shown in figure 5, the data safety sharing means 500 based on cloud environment in the embodiment, are suitable for public cloud and take Business device, including:Execution unit 502 determines corresponding public and private key for executing the initialization algorithm in preset password component, Public and private key includes but is not limited to system Your Majesty key, main system private key, recipient's public key, recipient's private key;Transmission unit 504 is used System user information table and recipient's private key are sent to privately owned cloud service in initialization system user information table, and through safe lane Device storage;Unit 506 is announced, public address system Your Majesty key and recipient's public key are used for;Receiving unit 508, for receiving private clound Server carries out ciphertext according to the User Identity and keyword to be checked of user cloud file access request acknowledgment of your inquiry Information retrieval;Transmission unit 510 is used for transmission the return file set after retrieval determines to user cloud file access request pair The user terminal answered.
In the present embodiment, the initialization algorithm in preset password component is executed, determines corresponding public and private key, public and private key packet System Your Majesty key, main system private key, recipient's public key, recipient's private key are included, initializes system user information table later, and through pacifying All channel sends system user information table and recipient's private key to privately owned Cloud Server and store, later public address system Your Majesty key with connect Receipts person's public key realizes the configuration of key, is advantageously implemented controllable shared and retrieval purpose, while reducing local computing Amount, by receiving privately owned Cloud Server according to the User Identity of user cloud file access request acknowledgment of your inquiry and to be checked Keyword, and cipher-text information retrieval is carried out, the return file set after transmission retrieval judgement to user cloud file access request Corresponding user terminal realizes the shared of file, utilizes the flexibility and self-help of publicly-owned Cloud Server, privately owned Cloud Server Safety, realize the balance of safety and efficiency.
It should be noted that preset password component is the broadcast enciphering IBBE of identity-based and public key can search for adding Close PEKS, the initialization algorithm of the broadcast enciphering of identity-based are stetup (λ, n), and the specially algorithm inputs security parameter λ With the maximum number n of the recipient allowed in a broadcast enciphering, output system Your Majesty key and main system private key, public key be can search for The initialization algorithm of encryption is stetup (λ), and the specially algorithm inputs security parameter λ, exports recipient's public key and recipient Private key.
Furthermore it is also possible to determine corresponding public and private key, specially by following scheme:It inputs parameter lambda and initializes prime number p Rank is the two-wire group G for generating member with g, and defines bilinear map ê thereon:G×G→GTAnd binary-coded character set of strings On hash function H:{0,1 }*→Zp, { 0,1 } * indicates the set being made of the string of binary characters of random length here; Randomly select g2, g3, { hi}m i=1∈RGWith x ∈ RZp, and output system Your Majesty's key, pk=(G, g1, g2, g3, { hi}m i=1), here g1=gx;Calculate msk=g2 xAs main system private key;Initialising subscriber information table T and permission set Ρ={ p1, p2..., here, and for each pi∈ Ρ randomly selects symmetrical recipient's private key, with initialising subscriber information table T and power Limit set Ρ is sent to privately owned Cloud Server storage and management together.
The data safety sharing means 500 for being preferably based on cloud environment further include:Generation unit 512 is received for working as When new user applies that request is added, the User Identity being added in request and main system private key are applied for according to new user, generated The broadcast enciphering private key of the identity-based of corresponding user;Execution unit 502 is also used to:Execute the first of preset number signature algorithm The public and private key of a pair of digital signature scheme is randomly generated in beginningization function;Determination unit 514, for determining User Identity, base It is private key for user in the broadcast enciphering private key of identity, digital signature scheme private key, and returns to corresponding new use through safe lane Family application, which is added, requests corresponding user terminal;Transmission unit 504 is also used to:New user's registration information is sent to privately owned cloud service Device, and system user information table is updated, new user's registration information includes User Identity, digital signature scheme public key;It sends Unit 504 is also used to:When determining the retrieval permissions based on keyword of revocation user, corresponding User Identity is sent extremely Privately owned Cloud Server, so that privately owned Cloud Server is searched for according to User Identity and is deleted corresponding in system user information table List item.
In the present embodiment, by being added according to new user application in requesting when receiving new user's application addition request User Identity and main system private key, generate the broadcast enciphering private key of the identity-based of corresponding user, be advantageously implemented The application of new user is added, and by executing the initialization function of preset number signature algorithm, digital signature scheme is randomly generated A pair of public and private key determines that User Identity, the broadcast enciphering private key of identity-based, digital signature scheme private key are user later Private key, and return to corresponding new user through safe lane and apply that the corresponding user terminal of request is added, be conducive to user's acquisition Share Permissions can be decrypted as clear text file when receiving cryptograph files, be read out and use, and pass through and send new user Registration information updates system user information table to privately owned Cloud Server, and new user's registration information includes User Identity, number Word signature scheme public key reduces key and potentially leaks and abuse risk, and user key quantity is smaller, is conducive to carry out It saves, storage occupied space is reduced, and calculation amount is smaller, by when the retrieval permissions based on keyword for determining revocation user When, corresponding User Identity is sent to privately owned Cloud Server, so that privately owned Cloud Server is searched for according to User Identity And the list item corresponded in system user information table is deleted, realize the more efficiently revocation of access privilege, Er Qiewu More new key need to be issued again for other related and unrevoked users, reduce calculation amount, promoting data sharing safety While, improve the efficiency of data sharing.
As shown in fig. 6, the data safety sharing means 600 based on cloud environment in the embodiment, are suitable for data main end End, including:Execution unit 602, it is raw according to the set of User Identity for executing the broadcast enciphering algorithm of identity-based At session key and corresponding broadcast message head;Generation unit 604, for according to session key symmetric cryptography shared file, life At cryptograph files;Execution unit 604 is also used to:Executing public key can search for Encryption Algorithm, to keyword relevant to shared file It is encrypted, generates ciphertext keyword;Transmission unit 606, for sending cipher-text information to publicly-owned Cloud Server, cipher-text information packet Include set, the cryptograph files, ciphertext keyword, broadcast message head of User Identity.
In the present embodiment, by executing the broadcast enciphering algorithm of identity-based, according to the set of User Identity, generate Session key and corresponding broadcast message head, are advantageously implemented the generation of cryptograph files, the data that data master terminal possesses it is upper It passes, by the way that according to session key symmetric cryptography shared file, generation cryptograph files are conducive to the safety for ensureing shared file, It can search for Encryption Algorithm by executing public key, keyword relevant to shared file encrypted, ciphertext keyword is generated, has Conducive to the retrieval for realizing cryptograph files, by sending cipher-text information to publicly-owned Cloud Server, cipher-text information includes user identity mark The set of knowledge, cryptograph files, ciphertext keyword, broadcast message head are conducive to publicly-owned Cloud Server according to user to shared file Request, carry out the retrieval of cipher-text information, to realize that the safety of data is shared, cipher-text information includes the collection of User Identity Conjunction, cryptograph files, ciphertext keyword, broadcast message head, the user for only meeting condition could obtain corresponding to cryptograph files Clear text file has further ensured the safety of data sharing, and calculation amount is small, and storage occupies little space.
As shown in fig. 7, the data safety sharing means 700 based on cloud environment in the embodiment, are suitable for private clound and take Business device, including:Retrieval unit 702 is searched, for when receiving user cloud file access request, according to user identity mark Know, search searching system user message table, user cloud file access request include User Identity, keyword to be checked, User is using digital signature scheme private key to the signature of User Identity and keyword to be checked;Transmission unit 704, is used for When lookup retrieves the corresponding list item in system user information table, and signature verification is successful, search result will be searched and be translated as Trapdoor form, and User Identity and keyword to be checked are sent to publicly-owned Cloud Server, for publicly-owned Cloud Server into The retrieval of row cipher-text information.
In the present embodiment, by according to User Identity, searching inspection when receiving user cloud file access request Cable system user message table, user cloud file access request include User Identity, keyword to be checked, user using number Word signature scheme private key believes the signature of User Identity and keyword to be checked when lookup retrieves system user later The corresponding list item in table is ceased, and when signature verification success, search result will be searched and be translated as trapdoor form, and by user identity mark Know and keyword to be checked is sent to publicly-owned Cloud Server, so that publicly-owned Cloud Server carries out cipher-text information retrieval, makes full use of The mutual cooperation of privately owned Cloud Server and publicly-owned Cloud Server, further improves the safety of data sharing, utilization is publicly-owned The flexibility and self-help of Cloud Server, the safety of privately owned Cloud Server realize the balance of safety and efficiency, independent of Sharing for same private key, is provided simultaneously with flexible access control and the searching ciphertext function based on keyword, locally deposits in liberation While storage, the safety of privately owned Cloud Server storage and the safety of data sharing process have also been ensured.
As shown in figure 8, the data safety sharing means 800 based on cloud environment in the embodiment, are suitable for user terminal, Including:Receiving unit 802, the private key for user determined for receiving publicly-owned Cloud Server, private key for user include User Identity, Broadcast enciphering private key, the digital signature scheme private key of identity-based;Receiving unit 802 is also used to:Receive publicly-owned Cloud Server inspection Return file set after rope judgement;Execution unit 804, for executing the broadcast decipherment algorithm of identity-based, recovery and data The session key of master terminal;Generation unit 806, for decrypting each ciphertext text returned in file set according to session key Part generates corresponding clear text file.
In the present embodiment, the private key for user determined by receiving publicly-owned Cloud Server, private key for user includes user identity mark Know, the broadcast enciphering private key of identity-based, digital signature scheme private key, is conducive to quick in the cryptograph files for receiving request Decryption is clear text file, retrieves the return file set after determining by receiving publicly-owned Cloud Server, executes identity-based later Broadcast decipherment algorithm, restore with the session key of data master terminal, decrypted returned in file set according to session key later Each cryptograph files, generate corresponding clear text file, the user for only meeting condition could obtain corresponding to cryptograph files Clear text file further improves convenience and the safety of data sharing independent of the shared of same private key.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, and the invention proposes a kind of numbers based on cloud environment Both had publicly-owned according to secure sharing method and a kind of data safety sharing means based on cloud environment using mixing cloud environment The flexibility and self-help of Cloud Server, the ciphertext text for further through the safety of privately owned Cloud Server data master terminal being uploaded Part can have flexible access control and the ciphertext inspection based on keyword independent of the shared of same private key with secure storage Suo Gongneng realizes controllable shared and retrieval purpose, while reducing local computing amount and the amount of being locally stored.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality Apply each technical characteristic in example it is all possible combination be all described, as long as however the combination of these technical characteristics be not present Contradiction all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot be therefore understands that for the limitation to patent of invention range.It should be pointed out that for those of ordinary skill in the art, Under the premise of not departing from design of the invention, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of data safety sharing method based on cloud environment is suitable for publicly-owned Cloud Server, which is characterized in that including:
The initialization algorithm in preset password component is executed, determines corresponding public and private key, the public and private key includes system Your Majesty Key, main system private key, recipient's public key, recipient's private key;
System user information table is initialized, and sends the system user information table and recipient's private key extremely through safe lane Privately owned Cloud Server storage;
Announce the system Your Majesty key and recipient's public key;
Receive User Identity and to be checked pass of the privately owned Cloud Server according to user cloud file access request acknowledgment of your inquiry Keyword, and carry out cipher-text information retrieval;
Transmission retrieves the return file set after determining to the corresponding user terminal of user cloud file access request.
2. the data safety sharing method according to claim 1 based on cloud environment, which is characterized in that further include:
When receiving new user's application addition request, applied that the user identity mark in requesting is added according to the new user Knowledge and the main system private key, generate the broadcast enciphering private key of the identity-based of corresponding user;
The public and private key of a pair of digital signature scheme is randomly generated in the initialization function for executing preset number signature algorithm;
The User Identity, the broadcast enciphering private key of the identity-based, the digital signature scheme private key are determined to use Family private key, and return to the corresponding new user through the safe lane and apply that the corresponding user terminal of request is added;
New user's registration information is sent to the privately owned Cloud Server, and updates the system user information table, the new user Registration information includes the User Identity, the digital signature scheme public key;
When determining the retrieval permissions based on keyword of revocation user, the corresponding User Identity is sent to the private There is Cloud Server, is searched for and deleted according to the User Identity for the privately owned Cloud Server and used corresponding to the system List item in the information table of family.
3. a kind of data safety sharing method based on cloud environment is suitable for data master terminal, which is characterized in that including:
The broadcast enciphering algorithm for executing identity-based generates session key and correspondence according to the set of the User Identity Broadcast message head;
According to the session key symmetric cryptography shared file, cryptograph files are generated;
Executing public key can search for Encryption Algorithm, encrypt to keyword relevant to the shared file, and it is crucial to generate ciphertext Word;
Cipher-text information is sent to publicly-owned Cloud Server, the cipher-text information includes the set, described close of the User Identity File, the ciphertext keyword, the broadcast message head.
4. a kind of data safety sharing method based on cloud environment is suitable for privately owned Cloud Server, which is characterized in that including:
When receiving user cloud file access request, according to User Identity, searching system user message table, institute are searched Stating user cloud file access request includes the User Identity, keyword to be checked, user using digital signature scheme Signature of the private key to the User Identity and the keyword to be checked;
When lookup retrieves the corresponding list item in the system user information table, and the signature verification is successful, examined searching Hitch fruit is translated as trapdoor form, and the User Identity and the keyword to be checked are sent to publicly-owned cloud service Device, so that the publicly-owned Cloud Server carries out cipher-text information retrieval.
5. a kind of data safety sharing method based on cloud environment is suitable for user terminal, which is characterized in that including:
Receive the private key for user that publicly-owned Cloud Server determines, the private key for user include User Identity, identity-based it is wide Broadcast encryption key, digital signature scheme private key;
Receive the return file set after the publicly-owned Cloud Server retrieval determines;
The broadcast decipherment algorithm of identity-based is executed, the session key with data master terminal is restored;
Each cryptograph files in the return file set are decrypted according to the session key, generate corresponding clear text file.
6. a kind of data safety sharing means based on cloud environment are suitable for publicly-owned Cloud Server, which is characterized in that including:
Execution unit determines corresponding public and private key, the public and private key for executing the initialization algorithm in preset password component Including but not limited to system Your Majesty key, main system private key, recipient's public key, recipient's private key;
Transmission unit sends the system user information table and institute for initializing system user information table, and through safe lane Recipient's private key to privately owned Cloud Server is stated to store;
Unit is announced, for announcing the system Your Majesty key and recipient's public key;
Receiving unit, for receiving privately owned Cloud Server according to the user identity mark of user cloud file access request acknowledgment of your inquiry Knowledge and keyword to be checked, and carry out cipher-text information retrieval;
It is corresponding to user cloud file access request to be used for transmission the return file set after retrieval determines for transmission unit User terminal.
7. the data safety sharing means according to claim 6 based on cloud environment, which is characterized in that further include:
Generation unit, for being added according to new user's application in requesting when receiving new user's application addition request The User Identity and the main system private key generate the broadcast enciphering private key of the identity-based of corresponding user;
The execution unit is also used to:The initialization function for executing preset number signature algorithm, is randomly generated digital signature scheme The public and private key of a pair;
Determination unit, for determining the broadcast enciphering private key of the User Identity, the identity-based, the digital signature Scheme private key is private key for user, and returns to the corresponding new user through the safe lane and apply that the corresponding use of request is added Family terminal;
The transmission unit is also used to:New user's registration information is sent to the privately owned Cloud Server, and updates the system and uses Family information table, the new user's registration information include the User Identity, the digital signature scheme public key;
The transmission unit is also used to:When determining the retrieval permissions based on keyword of revocation user, send corresponding described User Identity is to the privately owned Cloud Server, so that the privately owned Cloud Server is searched for simultaneously according to the User Identity Delete the list item corresponded in the system user information table.
8. a kind of data safety sharing means based on cloud environment are suitable for data master terminal, which is characterized in that including:
Execution unit, according to the set of the User Identity, generates meeting for executing the broadcast enciphering algorithm of identity-based Talk about key and corresponding broadcast message head;
Generation unit, for generating cryptograph files according to the session key symmetric cryptography shared file;
The execution unit is also used to:Execute public key can search for Encryption Algorithm, to keyword relevant to the shared file into Row encryption, generates ciphertext keyword;
Transmission unit, for sending cipher-text information to publicly-owned Cloud Server, the cipher-text information includes the User Identity Set, the cryptograph files, the ciphertext keyword, the broadcast message head.
9. a kind of data safety sharing means based on cloud environment are suitable for privately owned Cloud Server, which is characterized in that including:
Retrieval unit is searched, for according to User Identity, searching retrieval when receiving user cloud file access request System user information table, user cloud file access request include the User Identity, keyword to be checked, user Using digital signature scheme private key to the signature of the User Identity and the keyword to be checked;
Transmission unit, for retrieving corresponding list item in the system user information table when searching, and the signature verification at When function, search result will be searched and be translated as trapdoor form, and the User Identity and the keyword to be checked are sent To publicly-owned Cloud Server, so that the publicly-owned Cloud Server carries out cipher-text information retrieval.
10. a kind of data safety sharing means based on cloud environment are suitable for user terminal, which is characterized in that including:
Receiving unit, the private key for user determined for receiving publicly-owned Cloud Server, the private key for user include User Identity, Broadcast enciphering private key, the digital signature scheme private key of identity-based;
The receiving unit is also used to:Receive the return file set after the publicly-owned Cloud Server retrieval determines;
Execution unit restores the session key with data master terminal for executing the broadcast decipherment algorithm of identity-based;
Generation unit, for decrypting each cryptograph files in the return file set, generation pair according to the session key The clear text file answered.
CN201810579506.0A 2018-06-07 2018-06-07 Data safety sharing method and device based on cloud environment Pending CN108881195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810579506.0A CN108881195A (en) 2018-06-07 2018-06-07 Data safety sharing method and device based on cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810579506.0A CN108881195A (en) 2018-06-07 2018-06-07 Data safety sharing method and device based on cloud environment

Publications (1)

Publication Number Publication Date
CN108881195A true CN108881195A (en) 2018-11-23

Family

ID=64337126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810579506.0A Pending CN108881195A (en) 2018-06-07 2018-06-07 Data safety sharing method and device based on cloud environment

Country Status (1)

Country Link
CN (1) CN108881195A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981267A (en) * 2019-03-22 2019-07-05 西安电子科技大学 Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method
CN110012024A (en) * 2019-04-16 2019-07-12 广东工业大学 A kind of data sharing method, system, equipment and computer readable storage medium
CN110059055A (en) * 2019-03-28 2019-07-26 广东紫晶信息存储技术股份有限公司 A kind of file storage and read method and device based on distributed private clound
CN111314385A (en) * 2020-03-23 2020-06-19 郑州悉知信息科技股份有限公司 Data access method and device
CN111625852A (en) * 2020-05-21 2020-09-04 杭州尚尚签网络科技有限公司 Electronic signature method based on document and user private key under hybrid cloud architecture
CN111626338A (en) * 2020-05-06 2020-09-04 中移雄安信息通信科技有限公司 Cloud environment matching method, device, equipment and medium based on fusion classification model
CN111835692A (en) * 2019-04-22 2020-10-27 中国信息通信研究院 Information distribution management system and method
CN111917759A (en) * 2020-07-27 2020-11-10 八维通科技有限公司 Data security interaction method for gas station
CN112019553A (en) * 2020-08-31 2020-12-01 航天信息股份有限公司 Data sharing method based on IBE/IBBE
CN112187757A (en) * 2020-09-21 2021-01-05 上海同态信息科技有限责任公司 Multilink privacy data circulation system and method
CN112257096A (en) * 2020-11-23 2021-01-22 中电万维信息技术有限责任公司 Searching method for cloud storage ciphertext encrypted data
CN112383550A (en) * 2020-11-11 2021-02-19 郑州轻工业大学 Dynamic authority access control method based on privacy protection
CN112434026A (en) * 2020-10-29 2021-03-02 暨南大学 Secure intellectual property pledge financing method based on Hash chain
CN113037743A (en) * 2021-03-05 2021-06-25 杭州奕锐电子有限公司 Encryption method and system for cloud server file
CN113642014A (en) * 2021-07-23 2021-11-12 广州有信科技有限公司 Data access system based on hybrid cloud and public cloud server
CN114978665A (en) * 2022-05-17 2022-08-30 中原银行股份有限公司 Data verification method and data isolation system based on Redis distributed cache platform
CN116781266A (en) * 2022-01-06 2023-09-19 西安链科信息技术有限公司 Data security private cloud control system, control method, medium, equipment and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103181129A (en) * 2011-10-25 2013-06-26 华为技术有限公司 Data message processing method and system, message forwarding device
CN104079429A (en) * 2014-05-22 2014-10-01 汉柏科技有限公司 Hotlinking prevention method based on referer field and Web gateway
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103181129A (en) * 2011-10-25 2013-06-26 华为技术有限公司 Data message processing method and system, message forwarding device
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
CN104079429A (en) * 2014-05-22 2014-10-01 汉柏科技有限公司 Hotlinking prevention method based on referer field and Web gateway

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李明义: "云环境下加密数据的安全检索机制研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
李晓瑜: "云外包数据安全共享的等级密钥管理", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981267B (en) * 2019-03-22 2021-06-08 西安电子科技大学 Large-scale user multi-key scene cloud encryption database system and storage query method
CN109981267A (en) * 2019-03-22 2019-07-05 西安电子科技大学 Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method
CN110059055A (en) * 2019-03-28 2019-07-26 广东紫晶信息存储技术股份有限公司 A kind of file storage and read method and device based on distributed private clound
CN110059055B (en) * 2019-03-28 2022-04-29 深圳紫晶存储科技有限公司 File storage and reading method and device based on distributed private cloud
CN110012024A (en) * 2019-04-16 2019-07-12 广东工业大学 A kind of data sharing method, system, equipment and computer readable storage medium
CN110012024B (en) * 2019-04-16 2021-07-06 广东工业大学 Data sharing method, system, equipment and computer readable storage medium
CN111835692A (en) * 2019-04-22 2020-10-27 中国信息通信研究院 Information distribution management system and method
CN111314385A (en) * 2020-03-23 2020-06-19 郑州悉知信息科技股份有限公司 Data access method and device
CN111314385B (en) * 2020-03-23 2022-06-28 郑州悉知信息科技股份有限公司 Data access method and device
CN111626338A (en) * 2020-05-06 2020-09-04 中移雄安信息通信科技有限公司 Cloud environment matching method, device, equipment and medium based on fusion classification model
CN111626338B (en) * 2020-05-06 2022-11-29 中移雄安信息通信科技有限公司 Cloud environment matching method, device, equipment and medium based on fusion classification model
CN111625852A (en) * 2020-05-21 2020-09-04 杭州尚尚签网络科技有限公司 Electronic signature method based on document and user private key under hybrid cloud architecture
CN111917759A (en) * 2020-07-27 2020-11-10 八维通科技有限公司 Data security interaction method for gas station
CN112019553A (en) * 2020-08-31 2020-12-01 航天信息股份有限公司 Data sharing method based on IBE/IBBE
CN112187757A (en) * 2020-09-21 2021-01-05 上海同态信息科技有限责任公司 Multilink privacy data circulation system and method
CN112434026A (en) * 2020-10-29 2021-03-02 暨南大学 Secure intellectual property pledge financing method based on Hash chain
CN112383550B (en) * 2020-11-11 2022-07-26 郑州轻工业大学 Dynamic authority access control method based on privacy protection
CN112383550A (en) * 2020-11-11 2021-02-19 郑州轻工业大学 Dynamic authority access control method based on privacy protection
CN112257096A (en) * 2020-11-23 2021-01-22 中电万维信息技术有限责任公司 Searching method for cloud storage ciphertext encrypted data
CN113037743A (en) * 2021-03-05 2021-06-25 杭州奕锐电子有限公司 Encryption method and system for cloud server file
CN113642014A (en) * 2021-07-23 2021-11-12 广州有信科技有限公司 Data access system based on hybrid cloud and public cloud server
CN116781266A (en) * 2022-01-06 2023-09-19 西安链科信息技术有限公司 Data security private cloud control system, control method, medium, equipment and terminal
CN114978665A (en) * 2022-05-17 2022-08-30 中原银行股份有限公司 Data verification method and data isolation system based on Redis distributed cache platform

Similar Documents

Publication Publication Date Title
CN108881195A (en) Data safety sharing method and device based on cloud environment
CN111835500B (en) Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN106254324B (en) A kind of encryption method and device of storage file
CN109614818B (en) Authorized identity-based keyword search encryption method
CN103595793B (en) Cloud data safe deleting system and method without support of trusted third party
US9379891B2 (en) Method and system for ID-based encryption and decryption
US20190294811A1 (en) System and a method for management of confidential data
CN104780161A (en) Searchable encryption method supporting multiple users in cloud storage
US11296879B2 (en) Encrypted search
CN103731432A (en) Multi-user supported searchable encryption system and method
Swathy et al. Providing advanced security mechanism for scalable data sharing in cloud storage
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
CN103237040A (en) Storage method, storage server and storage client
CN104993931B (en) The encryption searching method of multi-user in a kind of cloud storage
Li et al. Enabling efficient and secure data sharing in cloud computing
CN104158827A (en) Cryptograph data sharing method and device, inquiring server and data uploading client terminal
WO2018047698A1 (en) Encoded message retrieval method, message transmission/reception system, server, terminal, and program
CN110581839A (en) Content protection method and device
CN109063496A (en) A kind of method and device of data processing
CN104796411A (en) Method for safely transmitting, storing and utilizing data in cloud and mobile terminal
Yan et al. Secure and efficient big data deduplication in fog computing
CN108933758A (en) Cloud storage encipher-decipher method, device and system can be shared
Chang et al. Multi-user searchable encryption scheme with constant-size keys
JP6840685B2 (en) Data sharing method, data sharing system, communication terminal, data sharing server, program
Zheng et al. Improved anonymous proxy re-encryption with CCA security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123

WD01 Invention patent application deemed withdrawn after publication