CN117411913B - Secure interaction method of cloud platform and health application based on power transformation - Google Patents

Secure interaction method of cloud platform and health application based on power transformation Download PDF

Info

Publication number
CN117411913B
CN117411913B CN202311723105.5A CN202311723105A CN117411913B CN 117411913 B CN117411913 B CN 117411913B CN 202311723105 A CN202311723105 A CN 202311723105A CN 117411913 B CN117411913 B CN 117411913B
Authority
CN
China
Prior art keywords
state
cloud platform
data
packet
health application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311723105.5A
Other languages
Chinese (zh)
Other versions
CN117411913A (en
Inventor
夏有兵
吴响
李书艳
张潇
张然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou Medical University
Original Assignee
Xuzhou Medical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuzhou Medical University filed Critical Xuzhou Medical University
Priority to CN202311723105.5A priority Critical patent/CN117411913B/en
Publication of CN117411913A publication Critical patent/CN117411913A/en
Application granted granted Critical
Publication of CN117411913B publication Critical patent/CN117411913B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/544Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices for evaluating functions by calculation
    • G06F7/552Powers or roots, e.g. Pythagorean sums
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Mathematical Optimization (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a secure interaction method of a cloud platform and a health application based on power transformation, which designs and defines the finite states of the cloud platform and the health application, describes all states experienced by the cloud platform and the health application in a communication life cycle and responds to external events; by analyzing the characteristics of information exchange in the communication process, data packets with different formats are designed, and the data packets with different formats are sent in different finite states; in consideration of the information transmission in the interaction process, the data sharing problem among all health applications and the attack risk problem faced in the plaintext transmission process, a method for transmitting data in an plaintext manner is adopted, and a safe interaction method of the cloud platform and the health applications based on power transformation is designed. According to the cloud platform and health application safe interaction method based on power transformation, interaction between the cloud platform and the health application is efficiently and safely completed under the condition that data are lossless.

Description

Secure interaction method of cloud platform and health application based on power transformation
Technical Field
The invention belongs to the technical field of safe interaction, and particularly relates to a safe interaction method of a cloud platform and health application based on power transformation.
Background
The interaction between the cloud platform and the health application refers to the health application storing, processing and managing health data of the user through the cloud platform. The cloud platform can provide powerful data analysis and mining capabilities and help health applications acquire valuable information from massive health data. Through the application of technologies such as statistical analysis and machine learning on data, potential health trends can be found, disease risks can be predicted, and personalized health suggestions can be provided. In addition, a mechanism of multi-user collaboration and data sharing is provided so that specific health data can be shared among multiple health applications. Thus doctors, nurses, patients and other health professionals can access and update data together, and better collaboration and communication are realized. Through interaction between the cloud platform and the health application, health data can be efficiently, safely and reliably processed and managed.
However, many potential safety hazards exist in the process of interaction between the health application and the cloud platform. In the authentication stage of the health application, the health application needs to provide sensitive information such as mobile phone number, age, geographic position and the like of the user; in requesting data from the cloud platform by the health application, sensitive characteristic information such as heart rate, pulse, eye movement and the like of a plurality of locatable personal diseases is involved; in the process of uploading local data to health data or downloading data analysis results, the risk of data privacy leakage exists. The data containing personal sensitive information has great economic value, and if leakage happens, advertising disturbance, promotion and even disease discrimination are brought to users. The existing method for the safe interaction process, such as data noise adding based on anonymous and differential privacy technology, encryption method based on physical circuit or secret key, distributed framework based on federal architecture, and the like, has the defects of low data availability, high realization cost, long encryption and decryption process and the like, and is not suitable for the frequent interaction process of cloud platform and health application. How to efficiently, lightweight and safely realize interaction between a cloud platform and health applications is a key problem to be solved at present.
Disclosure of Invention
The invention provides a secure interaction method of a cloud platform and health application based on power transformation, which aims to solve the problems of low data availability, high realization cost, long encryption and decryption process and the like.
The technology of the invention is implemented as follows: a method of power transformation of data, the method comprising the steps of:
first, determining whether the data type is a pure number or a combination of letters and numbers;
then, the operation is performed by using the designed power transformation operation method:
if the data to be transmitted is a pure number, the formula is directly used for calculation:
substituting the original data to be transmitted into c, randomly giving an x value, calculating a y value, and transmitting the (x, y) value;
if the combination of the letters and the numbers is adopted, firstly, the code number corresponding to the letters is found in an ASCII code table, and then, the calculation is carried out by utilizing a formula:
substituting the original data to be transmitted into c, randomly giving an x value, calculating a y value, and transmitting the (x, y) value;
to ensure that the same value range does not occur, the x values defined at random cannot take 0 and 1 and are positive integers.
The method is characterized in that the request-response is realized in a data packet transmission mode, the data packet transmission is correlated with the health application and the finite state of the cloud platform, the data packet comprises a serial number, a health application address, a cloud platform address, sensitive information and a timestamp, the sensitive information is represented by a set of power transformation data, and the power transformation data is obtained by the power transformation method.
Preferably, the data packet includes:
the health application sends a request packet and a response packet returned by the cloud platform response request to the cloud platform, wherein the request packet is a req_auth packet, and the response packet is a Res_auth packet;
the health application sends a request packet and a response packet returned by the cloud platform response request to the cloud platform, wherein the request packet is an ash link packet, and the response packet is a User data packet;
the health application sends a request packet and a response packet returned by the cloud platform response request to the cloud platform, wherein the request packet is an ash_load packet, and the response packet is an analysis_result packet;
according to the above, a secure interaction method between a cloud platform and a health application can be designed as the following steps:
step 1: the health application sends a req_auth packet to the cloud platform to request authentication so as to verify the identity and legitimacy of the application;
step 2: the cloud platform checks the authentication information and returns a Res_auth packet to the health application;
step 3: the health application sends an ask_link packet to the cloud platform to request to acquire the personal history health data of the user;
step 4: the cloud platform returns a user_data packet response request;
step 5: the health application sends an ash_load packet to the cloud platform, and the user monitoring data is uploaded to request the cloud platform to search and analyze;
step 6: and the cloud platform returns an analysis_result packet to the health application, and the health application displays the related analysis result to the user.
Preferably, the data packet in the above step is designed as follows:
(1) Req_auth packet: the user logs in the health application and grants the monitorable health permission, the health application sends a req_auth packet to the cloud platform to request for issuing cloud permission, and the data packet comprises five fields, namely P_ID, CP_Add, HA_Add, limits_auth and T_stamp, wherein the P_ID field represents a packet sequence number, and 01 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the limits_auth represents authority information of a user for granting health application, wherein the authority information comprises sensitive information such as mobile phone number, age, geographic position and the like of the user, and the authority information is represented by a group of power transformation data for protecting privacy; t_stamp represents a time Stamp, indicating the timeliness of the packet;
(2) Res_auth packet: the cloud platform judges whether to grant the access right according to the authorized application list and the user right setting, returns the data packet to the health application and responds to the request; the data packet comprises five fields, namely P_ID, CP_Add, HA_Add, API_code and T_stamp, wherein the P_ID field represents a packet sequence number, and 02 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a permission Code issued by the cloud platform, when the permission Code is 00, no permission is granted, and the permission Code is represented by a group of power transformation data for protecting privacy; T_Stamp represents the transmission time of the data packet to verify the timeliness of the data packet;
(3) Ask_link packet: the health application sends the data packet to the cloud platform, and requests to log in user history information or requests to share data with other health applications; the data packet comprises six fields, namely P_ID, CP_Add, HA_Add, API_code, req_Info and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 03 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a permission Code issued by the cloud platform and is represented by a group of power transformation data for protecting privacy; req_info indicates request information, 00 indicates history health information of a request log-in user, and 01 indicates a request for data sharing with other health applications; t_stamp represents the transmission time of the data packet in order to verify the timeliness of the data packet;
(4) User_data packet: the cloud platform returns the packet to the health application, responds to a Data request of the health application, and comprises five fields, namely P_ID, CP_Add, HA_Add, data_Info and T_Stamp, wherein the P_ID field represents the serial number of the Data packet, and 04 represents the packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; data_info represents user history information or other health application information, expressed in a set of power transformation Data for privacy protection; t_stamp represents the transmission time of the data packet in order to verify the timeliness of the data packet;
(5) Ask_load packet: the health application sends the packet to the cloud platform, and requests to upload data for data retrieval and mining; the data packet comprises six fields, namely P_ID, CP_Add, HA_Add, API_code, R_Upload and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 05 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a health application permission Code and is represented by a group of power transformation data for protecting privacy; R_Upload represents request content, wherein the request content is request uploading data, and the request content is represented by a group of power transformation data for protecting data security; T_Stamp represents the transmission time of the data packet to verify the timeliness of the data;
(6) Analy_result packet: the cloud platform returns the package to the health application, and responds to the request of the health application for data retrieval analysis and mining; the data packet comprises five fields, namely P_ID, CP_Add, HA_Add, result and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 06 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; result represents Result data of data retrieval and mining, and is represented by a group of power transformation data for protecting privacy; t_stamp represents the return time of the packet to verify the timeliness of the result.
Preferably, the finite state of the health application and the association relation between the finite state and the data packet transmission:
(1) Init state: this state indicates that the health application is in an initial state;
(2) Verify state: under the Init state, a user logs in the health application, and at the moment, the health application state is changed from the Init state to the Verify state, and a req_auth packet is sent to the cloud platform to request identity authentication;
(3) Linking state: in the Verify state, receiving a Res_auth packet returned by the cloud platform, changing the health application state from the Verify state to a Linking state if the identity verification is successful, and sending an ask_link packet to the cloud platform to request access to user history information; if the identity verification fails, the health application state keeps a Verify state, and the req_auth packet is resent to the cloud platform to request the identity verification;
(4) Send_data state: in the Linking state, receiving a user_data packet returned by the cloud platform, changing the health application state from the Linking state to the Send_data state, sending an ask_load packet to the cloud platform, and uploading User monitoring data to request the cloud platform to search and analyze;
(5) End state: and in the send_data state, receiving an analysis_result packet returned by the cloud platform, changing the health application state from the send_data state to the End state, and displaying a search analysis result, a suggestion or a report to a user to finish the interactive task.
Preferably, the finite state of the cloud platform and the association relation between the finite state and data packet transmission:
(1) Init state: this state indicates that the cloud platform is in an initial state;
(2) Ide_auth state: in the Init state, the cloud platform receives a req_auth packet sent by the health application, at the moment, the cloud platform state is changed from the Init state to the ideau state, and after receiving the authentication request, whether to grant the access right is judged according to the authorized application list and the user right setting;
(3) Ide_data state: in the Ide_auth state, the cloud platform receives an Ash_link packet sent by the health application, the cloud platform changes the Ide_auth state into the Ide_data state, verifies the access authority range of the health application, and returns a user_data packet containing User history health information to respond to the request;
(4) Ana_data state: in the Ide_data state, the cloud platform receives an ash_load packet sent by the health application, at the moment, the cloud platform state is changed from the Ide_data state to an Ana_data state, user data uploaded by the health application are retrieved and mined, and an Analy_result packet containing a retrieval analysis result, a suggestion or a report is returned to the health application;
(5) End state: in the Ana_data state, the cloud platform does not receive new data to be analyzed of the health application, and at the moment, the state of the cloud platform is changed from the Ana_data state to the End state, so that the task is completed.
Advantageous effects
The interaction flow between the cloud platform and the health application is normalized by defining the finite state and state conversion rule of the cloud platform and the health application, and the design of the communication data packet perfects the integrity of interaction;
the designed power transformation data operation method ensures the data safety in the interaction process, and the method has low requirements on the equipment performance, high data availability and short encryption and decryption time consumption, and is more suitable for the frequent interaction process of cloud platforms and health application.
Drawings
FIG. 1 is an overall flow chart of the present invention;
FIG. 2 is a diagram showing the format of a req_auth packet according to the present invention;
FIG. 3 is a diagram illustrating the Res_auth packet format according to the present invention;
FIG. 4 is a diagram showing an Ask_Link packet format according to the present invention;
FIG. 5 is a diagram illustrating a format of a user_data packet according to the present invention;
FIG. 6 is a diagram of an Ash_load packet format according to the present invention;
FIG. 7 is a diagram showing an Analy_result packet format according to the present invention;
FIG. 8 is a diagram illustrating a state transition for health applications according to the present invention;
fig. 9 is a schematic diagram of cloud platform state transition in the present invention.
Detailed Description
In one embodiment, as shown in fig. 1, a method for securely interacting a cloud platform based on power transformation with a health application, the method comprising the steps of:
step 1: the health application sends a req_auth packet to the cloud platform to request authentication so as to verify the identity and legitimacy of the application;
step 2: the cloud platform checks the authentication information and returns a Res_auth packet to the health application;
step 3: the health application sends an ask_link packet to the cloud platform to request to acquire the personal history health data of the user;
step 4: the cloud platform returns a user_data packet response request;
step 5: the health application sends an ash_load packet to the cloud platform, and the user monitoring data is uploaded to request the cloud platform to search and analyze;
step 6: and the cloud platform returns an analysis_result packet to the health application, and relevant analysis results are displayed to the user.
In some embodiments, as shown in fig. 2-7, the data packet is designed as follows:
(1) Req_auth packet: the user logs in the health application and grants the monitorable health permission, the health application sends a req_auth packet to the cloud platform to request for issuing cloud permission, the packet comprises five fields including P_ID, CP_Add, HA_Add, limits_auth and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 01 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the limits_auth represents authority information granted to health application by a user, and sensitive information such as mobile phone number, age, geographic position and the like of the user is represented by a group of power transformation data; t_stamp represents a time Stamp, indicating the timeliness of the packet;
(2) Res_auth packet: the cloud platform judges whether to grant the access right according to the authorized application list and the user right setting, returns the data packet to the health application and responds to the request; the data packet comprises five fields, namely P_ID, CP_Add, HA_Add, API_code and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 02 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a permission Code issued by the cloud platform, is represented by a group of power transformation data, and represents that no permission is granted when the API_code is 00; T_Stamp represents the transmission time of the data packet to verify the timeliness of the data packet;
(3) Ask_link packet: the health application sends the package to the cloud platform, and requests to log in user history information or requests to share data with other health applications; the packet comprises six fields, namely P_ID, CP_Add, HA_Add, API_code, req_Info and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 03 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a permission Code issued by the cloud platform and is represented by a group of power transformation data; req_info indicates request information, 00 indicates history health information of a request log-in user, and 01 indicates a request for data sharing with other health applications; t_stamp represents the packet transmission time in order to verify the timeliness of the packet;
(4) User_data packet: the cloud platform returns the packet to the health application, responds to a Data request of the health application, and comprises five fields, namely P_ID, CP_Add, HA_Add, data_Info and T_Stamp, wherein the P_ID field represents the serial number of the Data packet, and 04 represents the Data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; data_info represents user history information or other health application information, represented as a set of power transformation Data; t_stamp represents the packet transmission time in order to verify the timeliness of the data packet;
(5) Ask_load packet: the health application sends the packet to the cloud platform, and requests to upload data for data retrieval and mining; the packet comprises six fields, namely P_ID, CP_Add, HA_Add, API_code, R_Unload and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 05 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; the API_code represents a health application permission Code and is represented by a group of power transformation data for protecting privacy; R_Upload represents request content, wherein the request content is request uploading data and is represented by a group of power transformation data; T_Stamp represents the transmission time of the data packet to verify the timeliness of the data;
(6) Analy_result packet: the cloud platform returns the data packet to the health application, and responds to the request of the health application for data retrieval analysis and mining; the data packet comprises five fields, namely P_ID, CP_Add, HA_Add, result and T_Stamp, wherein the P_ID field represents the serial number of the data packet, and 06 represents the data packet; cp_add represents a cloud platform address; ha_add represents a healthy application address; result represents the Result data of data retrieval and mining, and is represented by a group of power transformation data; t_stamp represents the return time of the packet to verify the timeliness of the resulting data.
In one embodiment, as shown in fig. 8, the finite state of the health application and the association between the finite state and the packet transmission are designed as follows:
init state: this state indicates that the health application is in an initial state;
verify state: under the Init state, a user logs in the health application, and at the moment, the health application state is changed from the Init state to the Verify state, and a req_auth packet is sent to the cloud platform to request identity authentication;
linking state: in the Verify state, receiving a Res_auth packet returned by the cloud platform, changing the health application state from the Verify state to a Linking state if the identity verification is successful, and sending an ask_link packet to the cloud platform to request access to user history information; if the identity verification fails, the health application state keeps a Verify state, and the req_auth packet is resent to the cloud platform to request the identity verification;
send_data state: in the Linking state, receiving a user_data packet returned by the cloud platform, changing the health application state from the Linking state to the Send_data state, sending an ask_load packet to the cloud platform, and uploading User monitoring data to request the cloud platform to search and analyze;
end state: and in the send_data state, receiving an analysis_result packet returned by the cloud platform, changing the health application state from the send_data state to the End state, and displaying a retrieval analysis result, a suggestion or a report to a user to finish the interactive task.
In one embodiment, as shown in fig. 9, the finite state of the cloud platform and the association relationship between the finite state and the data packet transmission are designed as follows:
init state: this state indicates that the cloud platform is in an initial state;
ide_auth state: in the Init state, the cloud platform receives a req_auth packet sent by the health application, at the moment, the cloud platform state is changed from the Init state to the ideau state, and after receiving the authentication request, whether to grant the access right is judged according to the authorized application list and the user right setting;
ide_data state: in the Ide_auth state, the cloud platform receives an Ash_link packet sent by the health application, the cloud platform changes the Ide_auth state into the Ide_data state, verifies the access authority range of the health application, and returns a user_data packet containing User history health information to respond to the request;
ana_data state: in the Ide_data state, the cloud platform receives an ash_load packet sent by the health application, at the moment, the cloud platform state is changed from the Ide_data state to an Ana_data state, user data uploaded by the health application are retrieved and mined, and an Analy_result packet containing a retrieval analysis result, a suggestion or a report is returned to the health application;
end state: in the Ana_data state, the cloud platform does not receive a new round of data to be analyzed of the health application, and at the moment, the cloud platform state is changed from the Ana_data state to the End state to finish the task.
The power transformation method of the data comprises the following steps:
firstly, determining whether the data type of the sensitive information is a pure number or a combination of letters and numbers;
then, the operation is performed by using the designed power transformation operation method:
if the data to be transmitted is a pure number, the formula is directly used for calculation:
substituting the original data to be transmitted into c, randomly giving an x value, calculating a y value, and transmitting the (x, y) value;
if the combination of the letters and the numbers is adopted, firstly, the code number corresponding to the letters is found in an ASCII code table, and then, the calculation is carried out by utilizing a formula:
substituting the original data to be transmitted into c, randomly giving an x value, calculating a y value, and transmitting the (x, y) value;
to ensure that the same value range does not occur, the x values defined at random cannot take 0 and 1 and are positive integers.
Specific examples: in the interaction process, the data of the mobile phone number, age, heart rate, pulse, eye movement and the like of the user are pure digital data, and the mobile phone number of the user is taken as an example: 188ABCD3062, take the following formula
The method can obtain:
the [ (2, 2), (2,256), (3,6561), (2, E), (3, F), (4,J), (7,G), (8, 512), (0, 1), (2,64), (3, 9) ] is put into the limits_auth field of the req_auth packet, transmitted to the cloud platform, and the cloud platform solves according to the formula to obtain the original mobile phone number: 188ABCD3062, the verification is completed.
The API authorization code and the geographic position information are combinations of letters and numbers, firstly, the corresponding code number of the letters is found in an ASCII code table, and then power transformation is carried out.
With API authorization code: AS12df is exemplified by ASCII code number of AThe method comprises the following steps: 65, S has the ASCII code number: 83, d is 100 and f is 102, then the following formula is introduced:
is available in the form of
Transmitting [ [ (2,64), (2, 32) ], [ (4,65536), (3, 27) ], (3, 3), (5, 25), [ (7, 7), (8, 1), (9, 1) ], [ (10, 10), (3, 1), (12,144) ] ] in an API_code field in a Res_auth packet, an Ask_link packet and an Ask_load packet, and decrypting by the cloud platform to obtain an original API authorization Code: AS12df, verifies the health application rights.
While the embodiments of the present invention have been described in detail with reference to the examples/drawings, the present invention is not limited to the above embodiments, and it will be apparent to those skilled in the art that various equivalent changes and substitutions can be made therein without departing from the principles of the present invention, and such equivalent changes and substitutions should also be considered to be within the scope of the present invention.

Claims (10)

1. The secure interaction method of the cloud platform and the health application based on power transformation is characterized in that the request-response is realized in a data packet transmission mode, and the data packet transmission is associated with the finite states of the health application and the cloud platform; the data packet comprises a serial number, a health application address, a cloud platform address, sensitive information and a time stamp, wherein the sensitive information is represented by a group of power transformation data, the power transformation data is obtained by a power transformation method, and the power transformation method comprises the following steps:
s1, determining the data type of data, namely pure numbers or combination of letters and numbers;
s2, performing operation by using designed power transformation:
if the data to be transmitted is a pure number, the formula is directly used for calculation:
substituting data to be transmitted into c, and randomly giving xCalculating a y value, and transmitting the (x, y) value;
if the combination of the letters and the numbers is adopted, firstly, the code number corresponding to the letters is found in an ASCII code table, and then, the calculation is carried out by utilizing a formula:
substituting the original data to be transmitted into c, randomly giving an x value, calculating a y value, and transmitting the (x, y) value;
to ensure that the same value range does not occur, the x values defined at random cannot take 0 and 1 and are positive integers.
2. The method for secure interaction of a power-based cloud platform with a health application of claim 1, wherein the data packet comprises:
the health application sends a request packet to the cloud platform: the req_auth packet and a response packet returned by the cloud platform in response to the req_auth packet: res_auth packet;
the health application sends a request packet to the cloud platform: the response packet returned by the ask_link packet and the cloud platform in response to the ask_link packet: user_data packet;
the health application sends a request packet to the cloud platform: the response packet returned by the Ask_load packet and the response packet returned by the cloud platform in response to the health application Ask_load packet: an analysis_result packet.
3. The method for securely interacting the cloud platform and the health application based on the power transformation according to claim 2, wherein the sensitive information in the req_auth packet is authority information of the user for granting the health application, and the authority information comprises mobile phone number, age and geographical position information of the user and is represented by a set of power transformation data.
4. The secure interaction method for a cloud platform and a health application based on power transformation according to claim 2, wherein the sensitive information in the res_auth packet is a permission code issued by the cloud platform, and the permission code is represented by a set of power transformation data and is not granted when the sensitive information is 00.
5. The secure interaction method for a cloud platform and a health application based on power transformation according to claim 2, wherein the sensitive information in the ask_link packet is a permission code issued by the cloud platform and is represented by a set of power transformation data.
6. The method for securely interacting a cloud platform with a health application based on power transformation according to claim 2, wherein the sensitive information in the user_data packet is User history information or information of other health applications, and is represented by a set of power transformation data.
7. The secure interaction method of a cloud platform and a health application based on power transformation according to claim 2, wherein the sensitive information in the ask_load packet is a permission code and request content of the health application, wherein the permission code is represented by a set of power transformation data; the request content is data for which uploading is requested and is expressed by a group of power transformation data.
8. The method for secure interaction between a cloud platform and a health application based on power transformation according to claim 2, wherein the sensitive information in the analysis_result packet is a result of data retrieval and mining, and is represented by a set of power transformation data.
9. The secure interaction method of a cloud platform and a health application based on power transformation according to claim 1, wherein the finite state of the health application and the association relation between the finite state and data packet transmission:
(1) Init state: this state indicates that the health application is in an initial state;
(2) Verify state: under the Init state, a user logs in the health application, and at the moment, the health application state is changed from the Init state to the Verify state, and a req_auth packet is sent to the cloud platform to request identity authentication;
(3) Linking state: in the Verify state, receiving a Res_auth packet returned by the cloud platform, changing the health application state from the Verify state to a Linking state if the identity verification is successful, and sending an ask_link packet to the cloud platform to request access to user history information; if the identity verification fails, the health application state keeps a Verify state, and the req_auth packet is resent to the cloud platform to request the identity verification;
(4) Send_data state: in the Linking state, a user_data packet returned by the cloud platform is received, and at the moment, the health application state is changed from the Linking state to the Send_data state, and an ask_load packet is sent to the cloud platform to upload User monitoring data, so that the cloud platform is requested to search and analyze;
(5) End state: and in the send_data state, receiving an analysis_result packet returned by the cloud platform, changing the health application state from the send_data state to the End state, and displaying a retrieval analysis result, a suggestion or a report to a user to finish the interactive task.
10. The secure interaction method for a cloud platform and a health application based on power transformation according to claim 1, wherein the finite state of the cloud platform and the association relation between the finite state and data packet transmission:
(1) Init state: this state indicates that the cloud platform is in an initial state;
(2) Ide_auth state: in the Init state, the cloud platform receives a req_auth packet sent by the health application, at the moment, the cloud platform state is changed from the Init state to the ideau state, and after receiving the authentication request, whether to grant the access right is judged according to the authorized application list and the user right setting;
(3) Ide_data state: in the Ide_auth state, the cloud platform receives an Ash_link packet sent by the health application, the cloud platform changes the Ide_auth state into the Ide_data state, verifies the access authority range of the health application, and returns a user_data packet containing User history health information to respond to the request;
(4) Ana_data state: in the Ide_data state, the cloud platform receives an ash_load packet sent by the health application, at the moment, the cloud platform state is changed from the Ide_data state to an Ana_data state, user data uploaded by the health application are retrieved and mined, and an Analy_result packet containing a retrieval analysis result, a suggestion or a report is returned to the health application;
(5) End state: in the Ana_data state, the cloud platform does not receive a new round of data to be analyzed of the health application, and at the moment, the cloud platform state is changed from the Ana_data state to the End state to finish the task.
CN202311723105.5A 2023-12-15 2023-12-15 Secure interaction method of cloud platform and health application based on power transformation Active CN117411913B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311723105.5A CN117411913B (en) 2023-12-15 2023-12-15 Secure interaction method of cloud platform and health application based on power transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311723105.5A CN117411913B (en) 2023-12-15 2023-12-15 Secure interaction method of cloud platform and health application based on power transformation

Publications (2)

Publication Number Publication Date
CN117411913A CN117411913A (en) 2024-01-16
CN117411913B true CN117411913B (en) 2024-02-13

Family

ID=89494789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311723105.5A Active CN117411913B (en) 2023-12-15 2023-12-15 Secure interaction method of cloud platform and health application based on power transformation

Country Status (1)

Country Link
CN (1) CN117411913B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117650952A (en) * 2024-01-30 2024-03-05 徐州医科大学 Household medical health heterogeneous data safe transmission method based on geometric transformation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017207751A (en) * 2016-05-17 2017-11-24 富士通株式会社 Relational encryption
CN111984225A (en) * 2020-09-07 2020-11-24 青岛大学 Modular exponentiation operation task outsourcing method supporting privacy protection based on edge calculation
US10887104B1 (en) * 2020-04-01 2021-01-05 Onu Technology Inc. Methods and systems for cryptographically secured decentralized testing
CN112328699A (en) * 2020-11-20 2021-02-05 中山大学 Security outsourcing method and system based on block chain fully homomorphic encryption algorithm
CN113286296A (en) * 2021-05-24 2021-08-20 广东电网有限责任公司广州供电局 Data processing method and device of wireless sensor network and computer equipment
CN116760840A (en) * 2023-06-15 2023-09-15 江苏大学 Efficient data sharing method based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8184803B2 (en) * 2008-12-29 2012-05-22 King Fahd University Of Petroleum And Minerals Hash functions using elliptic curve cryptography

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017207751A (en) * 2016-05-17 2017-11-24 富士通株式会社 Relational encryption
US10887104B1 (en) * 2020-04-01 2021-01-05 Onu Technology Inc. Methods and systems for cryptographically secured decentralized testing
CN111984225A (en) * 2020-09-07 2020-11-24 青岛大学 Modular exponentiation operation task outsourcing method supporting privacy protection based on edge calculation
CN112328699A (en) * 2020-11-20 2021-02-05 中山大学 Security outsourcing method and system based on block chain fully homomorphic encryption algorithm
CN113286296A (en) * 2021-05-24 2021-08-20 广东电网有限责任公司广州供电局 Data processing method and device of wireless sensor network and computer equipment
CN116760840A (en) * 2023-06-15 2023-09-15 江苏大学 Efficient data sharing method based on block chain

Also Published As

Publication number Publication date
CN117411913A (en) 2024-01-16

Similar Documents

Publication Publication Date Title
US11937081B2 (en) Quorum-based secure authentication
KR101590076B1 (en) Method for managing personal information
US8485438B2 (en) Mobile computing device authentication using scannable images
EP1997291B1 (en) Method and arrangement for secure authentication
US7665118B2 (en) Server, computer memory, and method to support security policy maintenance and distribution
JP5024999B2 (en) Cryptographic management device, cryptographic management method, cryptographic management program
CN117411913B (en) Secure interaction method of cloud platform and health application based on power transformation
US20060236363A1 (en) Client architecture for portable device with security policies
CN1953375A (en) Account management in a system and method for providing code signing services
CN100507934C (en) System and method for registering entities for code signing services
CN111475841A (en) Access control method, related device, equipment, system and storage medium
CN104169935A (en) Information processing device, information processing system, information processing method, and program
US20060271482A1 (en) Method, server and program for secure data exchange
CN107040520A (en) A kind of cloud computing data-sharing systems and method
US9432344B2 (en) Secure storage and sharing of user objects
Moura et al. Assessing access control risk for mhealth: A delphi study to categorize security of health data and provide risk assessment for mobile apps
Lu et al. Security and privacy solutions for smart healthcare systems
CN101599117A (en) Be used to provide the system and method for code signature service
KR101914416B1 (en) System for providing security service based on cloud computing
CN115514523A (en) Data security access system, method, device and medium based on zero trust system
CN108550208A (en) Method for managing user right, server and the readable medium of intelligent door lock
GB2407461A (en) Server including an encoded data converter apparatus.
Li et al. A privacy protection mechanism for numerical control information in Internet of things
CN117118750B (en) Data sharing method and device based on white-box password, electronic equipment and medium
JP7284957B2 (en) Information management device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant