CN112751673B - Supervision-capable data privacy sharing method based on end side cloud cooperation - Google Patents

Supervision-capable data privacy sharing method based on end side cloud cooperation Download PDF

Info

Publication number
CN112751673B
CN112751673B CN202110361878.8A CN202110361878A CN112751673B CN 112751673 B CN112751673 B CN 112751673B CN 202110361878 A CN202110361878 A CN 202110361878A CN 112751673 B CN112751673 B CN 112751673B
Authority
CN
China
Prior art keywords
key
data
chain
supervision
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110361878.8A
Other languages
Chinese (zh)
Other versions
CN112751673A (en
Inventor
高丰
郑欢欢
孙爽
王晓江
郁善金
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Lab
Original Assignee
Zhejiang Lab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Lab filed Critical Zhejiang Lab
Priority to CN202110361878.8A priority Critical patent/CN112751673B/en
Publication of CN112751673A publication Critical patent/CN112751673A/en
Application granted granted Critical
Publication of CN112751673B publication Critical patent/CN112751673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a method for sharing data privacy capable of being supervised based on end side cloud cooperation, which aims at sharing and supervising the data privacy under an end side cloud scene and comprises the following steps: data cloud storage and metadata generation based on symmetric key encryption, metadata chaining based on distributed keys of a federation chain, and data supervision based on searchable encryption, wherein the supervision mode comprises the following steps: the method comprises two granularity monitoring modes of envelope monitoring, unsealing monitoring and the like, wherein the envelope monitoring confirms whether a user submits a storage certificate of metadata within a certain time under the condition that all nodes are commonly identified; the unsealing supervision acquires a metadata storage certificate of a user, decrypts the stored data and acquires a data plaintext; the block chain system is used for storing the privacy data of the user, protecting the data privacy from being disclosed, and meanwhile, monitoring the data privacy under a sharing condition.

Description

Supervision-capable data privacy sharing method based on end side cloud cooperation
Technical Field
The invention relates to the technical field of edge computing and block chaining, in particular to a method for sharing evidence-storing privacy based on end edge cloud cooperation.
Background
With the opening of the big data era, a great deal of manpower and material resources are input into various industries and areas to develop the construction of a data center, big data application is continuously developed and popularized, various information systems are increasingly complex in scale, data volume is increasingly huge, data types are more and more, and data forms are also increasingly diverse. In the construction of a big data platform, the data resources usually comprise data of the department, and also comprise data of related cooperative departments and public data of the internet. With the continuous accumulation and use of data, the value of the data is larger and larger, and how to safely and reliably use the data becomes an increasingly prominent problem. Data security is typically reinforced from such dimensions as confidentiality, integrity, and availability. The data is protected not only to be read and written correctly and completely, but also to be invisible to people who should not see the data and to be visible to people who can see the data according with an authorization process.
The characteristics of non-tampering and non-repudiation of the block chain technology open a new technical approach for data privacy sharing. The block chain is an account book whole-network public system, and all nodes can participate in consensus and are not beneficial to data privacy protection essentially. The invention realizes the data privacy sharing of two granularity supervision by combining the searchable encryption technology and the block chain technology in the cryptography.
Disclosure of Invention
In order to solve the defects of the prior art, realize the purpose of data sharing under the condition of protecting the data privacy and realize the supervision modes of envelope supervision, unseal supervision and the like on the content of the data, the invention adopts the following technical scheme:
a supervision data privacy sharing method based on end side cloud cooperation comprises the following steps:
s1, storing and generating storage certificates z and z' based on the symmetrically encrypted data cloud;
s2, the data certificate chaining based on the distributed key, comprising the steps of:
s21, generating credential encryption based on symmetric cryptographic algorithm, Shamir secret sharing mechanism, and distributed key generation mechanismSecret shard t of the secret key sk, skjAnd obtains an assigned key value alpha of each nodeiAnd a public key β, where β ═ g, (h ═ g)a),α=∑αi,G1And G2Are two finite cyclic groups of prime order p, G being G1The generator of (e): g1×G1→G2Is a bilinear map, H1:{0,1}*→G1
Figure GDA0003060218370000011
Are two hash functions;
s22, the block link point calls an intelligent contract, and based on a distributed public key searchable encryption algorithm, obtains an encrypted searchable value C ═ DPEKS (β, z), and generates encrypted metadata C ═ Enc (sk, z') based on a public key;
s23, storing C and C' in a block chain;
s3, supervising the data content under the condition of privacy status and committee consensus, the supervising method includes: the method comprises two granularity supervision modes of envelope supervision and unseal supervision, wherein the envelope supervision confirms whether a user submits a storage certificate of metadata within a certain time under the condition that all nodes are commonly identified, and the method comprises the following steps:
s311, submitting the key word w by the node on the supervision chain and initiating a transaction;
s312, recovering the secret key to obtain Tw=H1(w)α
S313, the intelligent contract acquires C stored in the block chain, performs public key search keyword verification, and calculates:
H2(e(Tw,gr))=H2(e(H1(w)α,gr))=H2(e(H1(w),gαr))=H2(e(H1(w)α,hr))=H2(t) if the equation is true, it indicates that the keyword has been linked, otherwise, it indicates that the keyword has been linked, and this supervision method does not know the content of the user's certificate;
the unsealing supervision obtains the metadata storage certificate of the user, decrypts the stored data and obtains the data plaintext, and the unsealing supervision method comprises the following steps:
s321, submitting the key word w by the supervision node and initiating a transaction;
s322, the supervision node calls an intelligent contract, and the node on the supervision chain judges whether the condition of unsealing supervision is met;
s323, recovering the secret key to obtain sk;
s324, based on sk, calling an intelligent contract program to obtain an encryption key of the metadata, and recovering the key of z 'through consensus of nodes because alpha is a symmetric key for encrypting z', so as to recover all information of the data certificate;
and S325, calling the intelligent contract program to obtain the metadata according to the metadata encryption key by the user, and obtaining the content of the stored data.
Further, in step S312, the local trapdoor
Figure GDA0003060218370000021
Locally calculating according to own fragmentation key
Figure GDA0003060218370000022
And broadcast
Figure GDA0003060218370000023
Generating a global threshold function, a set of trapdoors
Figure GDA0003060218370000024
Figure GDA0003060218370000025
Figure GDA0003060218370000026
Representing a supervisory node.
Further, in step S21, the key is distributed, and the system selects the polynomial f (x) sk + b1x+b2x2+…+bkxkAt each consensus period of the federation chain, the blockchainThe nodes independently generate key slices according to a distributed key protocol and respectively generate own private keys alphaiAnd a public key beta, and a secret reconstructed slice value t1=f(1),t2=f(2),...,tn=f(n);
In step S312, the nodes in the chain of custody receive the secret values of k nodes through multi-node negotiation, and form list ═ (i ═ i)1,i2,...,is) Invoking an intelligent contract, calculating
Figure GDA0003060218370000027
So that sk (f (0) ═ Σ ci
Node calculation local threshold on chain of custody
Figure GDA0003060218370000028
With intelligent contract collecting different nodes
Figure GDA0003060218370000029
Form a
Figure GDA00030602183700000210
In step S323, secret values of k nodes are received
Figure GDA0003060218370000031
And node numbering
Figure GDA0003060218370000032
Form a
Figure GDA0003060218370000033
The intelligent contract is invoked and the intelligent contract is called,
Figure GDA0003060218370000034
so that sk (f (0) ═ Σ ci
Further, the distribution and recovery of the key adopt a distributed (k, n) key protocol, a key is divided into n parts, each member possesses an independent sub-key, and the following conditions are satisfied: any qualified member with no less than k can reconstruct the original key through the held sub-keys (k < n); any set of members within k cannot reconstruct the original key.
Further, in step S22, the distributed public key searchable encryption algorithm includes calculating: t ═ e (H)1(z),hr)∈G2
Where e () is a bilinear factor map, H1As a hash function, random numbers
Figure GDA0003060218370000035
And (3) outputting:
C=DPEKS(β,z)=[gr,H2(t)]
where β is used for encryption 2 as the public key of the blockchain node.
Further, the step S1 includes the following steps:
s11, in order to ensure the safety of the data, the user encrypts the data in a symmetrical encryption mode;
s12, the block chain platform generates a file according to the received data, calculates a digital abstract, uploads the digital abstract to the cloud, and obtains a file storage address;
s13, the blockchain platform initiates a transaction, calls an intelligent contract, encrypts and stores metadata into a blockchain network, wherein the metadata comprises a digital abstract and an encrypted file address, the blockchain network agrees with the transaction, and DO generates and outputs storage certificates z and z' of the metadata.
Further, in step S1, z ═ token, time, hash, url ], and z' ═ token, time, hash, url, key ], include information such as user credentials, time, data hash, storage address, and encryption key, where the encryption key is a symmetric key used by the user to encrypt files, and i represents a block chain node.
Further, in the step S1, a cloud-chain integrated architecture is constructed, and the encrypted data is stored on the private cloud.
Further, the data encrypted in the step S1 is stored in the Ceph cluster.
Further, the block chain is a union chain based on a practical Byzantine fault-tolerant PBFT mode, and transactions are verified through leader nodes of the PBFT and added to the latest block.
The invention has the advantages and beneficial effects that:
in big data storage, realize the sharing of data through the blockchain technique, under the prerequisite that need not know the content of depositing the card, supervise data, when guaranteeing dimensionalities such as data security, integrality, usability, realize sharing through authorizing, blockchain system is used for depositing the card to user's privacy data, and the protection data privacy is not revealed, realizes simultaneously to supervise under the data privacy shared condition.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a flow chart of data uplink and block chain verification in the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
The traditional physical storage has the problems that resources are scattered, the storage reliability cannot be guaranteed and the like, the storage virtualization means that all scattered and heterogeneous storage devices are mapped into a uniform and continuous addressing logical storage space which is called a virtual storage pool according to a certain strategy, the access address of the virtual storage pool is provided for an application system, and the storage virtualization improves the reliability and the availability of data through technologies such as data mirroring, data verification and multipath and the like.
The Ceph cluster is a data storage part in this embodiment, provides PB-level data storage capability, and meanwhile, the cluster has high scalability and high reliability, and can cope with the problem of insufficient cluster storage capability by adding nodes.
As shown in fig. 1 and 2, a supervisable data privacy sharing method based on end edge cloud collaboration includes the following steps: step S1, based on the symmetric encrypted data cloud storage and generating a storage credential, the data uploaded by the user is stored in the Ceph cluster in the form of a file, and the digital digest of the data, the storage address of the encrypted file in the Ceph cluster, the data encryption/decryption key, the data access record, and the like are stored in the blockchain.
Initialization and block synchronization: the block chain is based on a P2P network, a central node does not exist, the position of each node is the same, and the nodes can also directly communicate with other nodes to broadcast data to the whole network. After the user starts the block link node to access the alliance link, the alliance link network can perform identity authentication, and only the legal node can successfully join the alliance link. After joining the alliance chain, the node starts to monitor and wait for the broadcast data of the peer nodes in the network, and checks whether the block of the node is the highest block, and if not, the node synchronizes from other nodes.
In order to ensure the security of data, a user encrypts the data into a ciphertext in a symmetric encryption mode and finishes uploading the data, a platform generates a file according to the received data, calculates a digital abstract, stores the digital abstract in a Ceph cluster and obtains a file storage address;
specifically, according to data input by a user and user information, encrypted data is generated by adopting a symmetric key method and is stored in a cloud storage server; the block chain platform initiates a transaction, calls an intelligent contract, takes information such as a digital abstract and an encrypted file address as metadata, encrypts the metadata and stores the metadata in a block chain network, the block chain network agrees with the transaction, and the DO generates and outputs a storage certificate of the metadata: z ═ token, time, hash, url ] and z ═ token, time, hash, url, key ], including information w such as user credentials, time, data hash, storage address, and encryption key, the encryption key is a symmetric key for the user to encrypt files, and i represents a block chain node;
the cloud chain integrated architecture is constructed, the encrypted data are stored on the private cloud, and the storage certificate of the access data comprises the user certificate, time, a Uniform Resource Location (URL) of data storage, an encryption key and other information to generate the storage certificate.
Step S2, based on the data certificate ul of the distributed key, the key is first distributed, and the system selects the polynomial f (x) sk + b1x+b2x2+…+b′kxkIn each consensus period of the alliance chain, the block chain nodes independently generate key slices according to the distributed key protocol, and respectively generate own private key and public key (alpha)iBeta), and secret reconstructed slice value t1=f(1),t2=f(2),...,tnF (n), wherein β (g, h) gα),α=∑αi,G1And G2Are two finite cyclic groups of prime order p, G being G1The generator of (e): g1×G1→G2Is a bilinear map, H1:{0,1}*→G1
Figure GDA0003060218370000051
The two hash functions are used, then, a block chain node calls an intelligent contract, an encryption searchable value C (DPEKS (beta, z)) and encryption metadata C ' Enc (sk, z ') encrypted based on a symmetric key are obtained based on a distributed public key searchable encryption algorithm, and finally, C and C ' are stored in a block chain;
specifically, a block chain node calls an intelligent contract, a public key alpha is generated based on a Shamir distributed secret sharing mechanism, and a distributed key value and a public key beta of each node are obtained; calling an intelligent contract by a block chain node to generate a distributed public key beta encryption searchable value C (DPESK (beta z)); the block chain node calls an intelligent contract, generates an encryption key sk according to the public key alpha, and generates encryption metadata C ═ Enc (sk, z'); block link point generation transaction, packaging C and C', leader node verification transaction of PBFT (practical bypath fault-tolerant, block chain is alliance chain based on practical bypath fault-tolerant) and adding to the latest block.
A distributed public key searchable encryption algorithm comprising the computations:
t=e(H1(z),hr)∈G2
where e () is a bilinear factor map, H1As a hash function, random numbers
Figure GDA0003060218370000052
And (3) outputting:
C=DPEKS(β,z)=[gr,H2(t)]
wherein β is used as the public key of the blockchain node for encrypting z, and finally, C is saved to the blockchain.
Step S3, in the privacy state, the content of the data is supervised under the condition that the committee obtains consensus, and the supervision method includes: and the envelope supervision confirms whether the user submits the metadata storage certificate within a certain time under the condition that all nodes are identified together, and the unsealing supervision acquires the metadata storage certificate of the user, decrypts the stored data and acquires the data plaintext.
1. The envelope supervision process comprises the following steps:
(1) submitting the key word w by the node on the supervision chain and initiating a transaction;
(2) recovering the key, receiving secret values of k nodes by nodes on the chain of supervision through multi-node negotiation, and forming list ═ i1,i2,...,is) And the intelligent contract is called,
Figure GDA0003060218370000061
list=(i1,i2,...,is) So that sk (f (0) ═ Σ ci
(3) Node calculation local threshold on chain of custody
Figure GDA0003060218370000062
With intelligent contract collecting different nodes
Figure GDA0003060218370000063
Form a
Figure GDA0003060218370000064
In particular, a local trapdoor
Figure GDA0003060218370000065
Locally calculating according to own fragmentation key
Figure GDA0003060218370000066
And broadcast
Figure GDA0003060218370000067
Generating a global threshold function, a set of trapdoors
Figure GDA0003060218370000068
wjRepresenting a supervisory node.
(4) The intelligent contract acquires C stored in the block chain, public key search keyword verification is carried out, if the result is True, the keyword is indicated to be in the envelope, and if the result is False, the keyword is not stored in the envelope; specifically, T is calculatedwAnd then, the chain of custody node calculates:
H2(e(Tw,gr))=H2(e(H1(w)α,gr))=H2(e(H1(w),gαr))=H2(e(H1(w)α,hr))=H2(t)
if the above equation is true, it indicates that a certain z has been uplink before, but this way of supervision does not know what the user has been certified.
(5) And finishing the envelope supervision.
2. The unsealing supervision process comprises the following steps:
(1) submitting the key word w by the supervision node and initiating a transaction;
(2) the supervision node calls an intelligent contract, and the node on the supervision chain judges whether the condition of unsealing supervision is met or not;
(3) the key is recovered, secret values of k nodes are received,
Figure GDA0003060218370000069
the intelligent contract is invoked and the intelligent contract is called,
Figure GDA00030602183700000610
so that sk (f (0) ═ Σ ci
(4) Based on sk, calling an intelligent contract program to obtain an encryption key of the metadata; because sk is a symmetric key for encrypting z ', the key for z' is recovered through the consensus of the nodes, so that all information of the data certificate is recovered;
(5) the user calls an intelligent contract program to obtain metadata according to the metadata encryption key and obtains the content of the stored data, and the data unsealing supervision is completed;
the distribution and recovery of the key adopt a distributed (k, n) key protocol, a key is divided into n parts, each member possesses an independent subkey, and the following conditions are satisfied:
any qualified member with no less than k can reconstruct the original key through the held sub-keys (k < n);
any member set below k cannot reconstruct the original key.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A supervision data privacy sharing method based on end side cloud cooperation is characterized by comprising the following steps:
s1, storing and generating storage certificates z and z' based on the symmetrically encrypted data cloud;
s2, searching for encrypted and symmetrically encrypted data certificate uplink based on public key, comprising the steps of:
s21, generating private key alpha for each certificate-storing chain node based on distributed key generation mechanismiAnd a public key β, where β ═ g, (h ═ g)α),α=∑αiI denotes a link node for storing certificates, G1And G2Are two finite cyclic groups of prime order p, G being G1G is the generator of1×G1→G2Is a bilinear map, H1:{0,1}*→G1
Figure FDA0003060218360000011
Two hash functions are used to generate a certificate encryption key sk, and the sk and sk are restored to a fragment t based on a Shamir secret sharing mechanismjAssigning a share to each node of the chain of credit, in particular randomly constructing a polynomial f (x) sk + b1x+b2x2+…+bkxkA handle t1=f(1),t2=f(2),...,tnF (n) is distributed to the node of the evidence-storing chain, and n is the number of the points of the evidence-storing chain links;
s22, the certificate storing node invokes an intelligent contract, obtains an encrypted searchable value C ═ DPEKS (β, z) based on a distributed public key searchable encryption algorithm, and generates encrypted metadata C ═ Enc (sk, z') based on a public key;
s23, storing C and C' in a certificate storing chain;
s3, supervising under the condition of privacy status and committee consensus, the supervising method includes: the method comprises the following steps of envelope supervision and unsealing supervision, wherein the envelope supervision confirms whether a user submits a storage certificate of metadata within a certain time under the condition that all nodes are in common knowledge, and the method comprises the following steps:
s311, submitting the key word w by the node on the supervision chain and initiating a transaction;
s312, the evidence storing chain link points commonly identify the retrieval trapdoor to obtain Tw=H1(w)α
S313, the intelligent contract acquires C stored in the block chain, performs public key search keyword verification, and calculates:
H2(e(Tw,gr))=H2(e(H1(w)α,gr))=H2(e(H1(w),gαr))=H2(e(H1(w)α,hr))=H2(t)
if the equation is established, the keyword is uplink-linked, otherwise, the keyword is not uplink-linked;
the unsealing supervision obtains the metadata storage certificate of the user, decrypts the stored data and obtains the data plaintext, and the unsealing supervision method comprises the following steps:
s321, submitting the key word w by the supervision node and initiating a transaction;
s322, the supervision node calls an intelligent contract, and the node on the storage chain judges whether the condition of unsealing supervision is met;
s323, recovering the secret key to obtain sk;
s324, based on sk, calling an intelligent contract to obtain an encryption key of the metadata, and recovering the key of z' through the consensus of the nodes so as to recover the data certificate;
and S325, calling the intelligent contract to obtain the metadata according to the metadata encryption key by the user, and obtaining the content of the stored data.
2. The supervisable data privacy sharing method based on end edge cloud collaboration as claimed in claim 1, wherein in the step S312, the local trapdoor
Figure FDA0003060218360000021
Locally calculating according to own fragmentation key
Figure FDA0003060218360000022
And broadcast
Figure FDA0003060218360000023
Generating a global threshold function, a set of trapdoors
Figure FDA0003060218360000024
Figure FDA0003060218360000025
wjRepresenting a supervisory node.
3. A termination based on claim 1The edge-cloud-collaborative supervised data privacy sharing method is characterized in that in the step S21, a key is distributed, and a system selects a polynomial f (x) sk + b1x+b2x2+…+bkxkIn each consensus period of the alliance chain, the block chain nodes independently generate key slices according to the distributed key protocol, and respectively generate own private keys alphaiAnd a public key beta, and a secret reconstructed slice value t1=f(1),t2=f(2),...,tn=f(n);
In step S312, the nodes in the chain of custody receive the secret values of k nodes through multi-node negotiation, and form list ═ (i ═ i)1,i2,...,is) Invoking an intelligent contract, calculating
Figure FDA0003060218360000026
So that sk (f (0) ═ Σ ci
Node calculation local threshold on chain of custody
Figure FDA0003060218360000027
With intelligent contract collecting different nodes
Figure FDA0003060218360000028
Form a
Figure FDA0003060218360000029
In step S323, secret values of k nodes are received
Figure FDA00030602183600000210
And node numbering
Figure FDA00030602183600000211
x is 1, 2, k, form
Figure FDA00030602183600000212
Invoking intelligent contracts and calculating
Figure FDA00030602183600000213
So that sk (f (0) ═ Σ ci
4. The supervised data privacy sharing method based on end edge cloud coordination as claimed in claim 3, wherein the distribution and recovery of the key adopt a distributed (k, n) key protocol, a key is divided into n parts, each member possesses an independent sub-key, and the following conditions are satisfied: any qualified member with no less than k can reconstruct the original secret key through the held sub secret keys, wherein k is less than n; any set of members within k cannot reconstruct the original key.
5. The supervised data privacy sharing method based on end edge cloud coordination as recited in claim 1, wherein in the step S22, the distributed public key searchable encryption algorithm includes calculating:
t=e(H1(z),hr)∈G2
where e () is a bilinear factor map, H1As a hash function, random numbers
Figure FDA00030602183600000214
And (3) outputting:
C=DPEKS(β,z)=[gr,H2(t)]
where β is used as the public key of the blockchain node for encryption z.
6. The supervised data privacy sharing method based on end edge cloud coordination as recited in claim 1, wherein the step S1 includes the steps of:
s11, encrypting data by the user in a symmetric encryption mode;
s12, the certificate storing chain platform generates a file according to the received data, calculates a digital abstract, uploads the digital abstract to the cloud end, and meanwhile obtains a file storage address;
and S13, initiating a transaction by the evidence chain storage platform, calling an intelligent contract, encrypting and storing metadata into the evidence chain storage platform, wherein the metadata comprises a digital abstract and an encrypted file address, the evidence chain storage platform agrees with the transaction, and generates and outputs storage evidence z and z' of the metadata.
7. The unsupervised data privacy sharing method based on end edge cloud coordination as claimed in claim 1, wherein the storage credentials z ═ token, time, hash, url ] and z' ═ token, time, hash, url, key ] in step S1 include user credentials, time, data hash, storage address and encryption key, and the encryption key is a symmetric key for user to encrypt files.
8. The supervised data privacy sharing method based on end edge cloud coordination as recited in claim 1, wherein in step S1, a cloud-chain integrated architecture is constructed, and the encrypted data is stored in a private cloud.
9. The supervisable data privacy sharing method based on end edge cloud cooperation according to claim 1, wherein the data encrypted in the step S1 is stored in a Ceph cluster.
10. The supervised data privacy sharing method based on end edge cloud coordination as recited in claim 1, wherein the block chain is a federation chain based on a practical Byzantine fault tolerant PBFT mode, and transactions are verified and added to the latest block through leader nodes of the PBFT.
CN202110361878.8A 2021-04-02 2021-04-02 Supervision-capable data privacy sharing method based on end side cloud cooperation Active CN112751673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110361878.8A CN112751673B (en) 2021-04-02 2021-04-02 Supervision-capable data privacy sharing method based on end side cloud cooperation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110361878.8A CN112751673B (en) 2021-04-02 2021-04-02 Supervision-capable data privacy sharing method based on end side cloud cooperation

Publications (2)

Publication Number Publication Date
CN112751673A CN112751673A (en) 2021-05-04
CN112751673B true CN112751673B (en) 2021-06-25

Family

ID=75651705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110361878.8A Active CN112751673B (en) 2021-04-02 2021-04-02 Supervision-capable data privacy sharing method based on end side cloud cooperation

Country Status (1)

Country Link
CN (1) CN112751673B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113542413B (en) * 2021-07-16 2024-01-05 北京数牍科技有限公司 Manageable privacy computing method, system and computer equipment based on trusted memory card
CN113326541B (en) * 2021-08-03 2021-11-16 之江实验室 Cloud edge collaborative multi-mode private data transfer method based on intelligent contract
CN114422273B (en) * 2022-03-29 2022-06-17 四川高速公路建设开发集团有限公司 Sensitive decision data safety sharing method in intelligent construction engineering information system
CN114584325A (en) * 2022-05-06 2022-06-03 四川野马科技有限公司 Bid quoted price data hybrid storage system and method based on block chain and cloud storage
CN114866236B (en) * 2022-05-11 2024-03-29 西安电子科技大学 Data sharing method of Internet of things in cloud based on alliance chain
CN115242555B (en) * 2022-09-21 2022-12-16 北京邮电大学 Monitorable cross-chain private data sharing method and device
CN116132112A (en) * 2022-12-22 2023-05-16 广州大学 Keyword encryption searching method based on alliance chain intelligent contract
CN116150793B (en) * 2023-03-17 2023-10-24 北京信源电子信息技术有限公司 DOA-based handle identification analysis technology data protection method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3379769A1 (en) * 2017-03-21 2018-09-26 Gemalto Sa Method of rsa signature or decryption protected using multiplicative splitting of an asymmetric exponent
CN109120398A (en) * 2018-08-03 2019-01-01 河南师范大学 A kind of privacy sharing method and apparatus based on block catenary system
CN110289951A (en) * 2019-06-03 2019-09-27 杭州电子科技大学 A kind of shared content monitoring method based on Threshold key sharing and block chain
CN111523133A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Block chain and cloud data collaborative sharing method
CN112163854A (en) * 2020-09-14 2021-01-01 北京理工大学 Hierarchical public key searchable encryption method and system based on block chain
CN112543187A (en) * 2020-11-26 2021-03-23 齐鲁工业大学 Industrial Internet of things safety data sharing method based on edge block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685989A (en) * 2017-02-07 2017-05-17 杭州秘猿科技有限公司 Privacy communication method based on license chain support and supervision
CN109768987B (en) * 2019-02-26 2022-01-28 重庆邮电大学 Block chain-based data file safe and private storage and sharing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3379769A1 (en) * 2017-03-21 2018-09-26 Gemalto Sa Method of rsa signature or decryption protected using multiplicative splitting of an asymmetric exponent
CN109120398A (en) * 2018-08-03 2019-01-01 河南师范大学 A kind of privacy sharing method and apparatus based on block catenary system
CN110289951A (en) * 2019-06-03 2019-09-27 杭州电子科技大学 A kind of shared content monitoring method based on Threshold key sharing and block chain
CN111523133A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Block chain and cloud data collaborative sharing method
CN112163854A (en) * 2020-09-14 2021-01-01 北京理工大学 Hierarchical public key searchable encryption method and system based on block chain
CN112543187A (en) * 2020-11-26 2021-03-23 齐鲁工业大学 Industrial Internet of things safety data sharing method based on edge block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"端—边—云"协同的智慧物联网;吴大鹏 等;《物联网学报》;20180930;第2卷(第3期);正文第21-27页 *
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks;Feng Gao 等;《IEEE Network》;20181231;第32卷(第6期);正文第184-192页 *
基于Shamir密钥分发算法的Android网盘多点存储系统;李帅 等;《通信技术》;20170131;第50卷(第1期);正文第151-156页 *

Also Published As

Publication number Publication date
CN112751673A (en) 2021-05-04

Similar Documents

Publication Publication Date Title
CN112751673B (en) Supervision-capable data privacy sharing method based on end side cloud cooperation
CN109756582B (en) Information recording method, device, node and storage medium in block chain network
US10805072B2 (en) System and method for autonomous dynamic person management
US10764047B2 (en) Synchronizable hardware security module
EP3850786B1 (en) System and method for secure multi-party computation based blockchain transactions
US11343081B2 (en) Synchronizable hardware security module
CN110289968B (en) Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN111066285A (en) Method for recovering public key based on SM2 signature
CN108292402A (en) The determination of the public secret of secure exchange for information and level certainty key
KR20180115701A (en) Secure manifold loss prevention of cryptographic keys for block-chain-based systems associated with wallet management systems Storage and transmission
JP6751130B2 (en) Scalable Crash Fault Tolerant Consensus Protocol with Efficient Message Aggregation
EP3794536B1 (en) Methods and systems for safe creation, custody, recovery, and management of a digital asset
US10887294B2 (en) Synchronizable hardware security module
CN115242555A (en) Supervisable cross-chain private data sharing method and device
WO2021057124A1 (en) Fpga-based privacy block chain implementing method and device
CN113643134A (en) Internet of things block chain transaction method and system based on multi-key homomorphic encryption
GB2603495A (en) Generating shared keys
CN110557367B (en) Secret key updating method and system for quantum computing secure communication resistance based on certificate cryptography
US11893577B2 (en) Cryptographic key storage system and method
CN110784318B (en) Group key updating method, device, electronic equipment, storage medium and communication system
CN112003690B (en) Password service system, method and device
CN110363528B (en) Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN108494552B (en) Cloud storage data deduplication method supporting efficient convergence key management
CN112926983A (en) Block chain-based deposit certificate transaction encryption system and method
Tabassum et al. Securely Transfer Information with RSA and Digital Signature by using the concept of Fog Computing and Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant