Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe mode index outsourcing method and system under single malicious cloud server

A cloud server, modular index technology, applied in the field of cloud computing, can solve problems such as low verifiability and inability to find lazy servers to deceive users.

Active Publication Date: 2015-12-02
SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at technical problems such as the low verifiability of the single-server modulus index outsourcing method in the prior art, and the inability to discover the deception of the user by the lazy server, the present invention discloses a security modulus index outsourcing method under a single malicious cloud server , and discloses a system implementing this approach

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe mode index outsourcing method and system under single malicious cloud server
  • Safe mode index outsourcing method and system under single malicious cloud server
  • Safe mode index outsourcing method and system under single malicious cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific implementation manner of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0032] Suppose p, q are two large prime numbers, q|p-1, and u q = 1modp, giving an arbitrary exponent and base calculate u a modp, which requires the values ​​of a and u to be kept secret from U during the outsourced computation. This is a requirement of the security model index outsourcing method, which belongs to the existing general requirements, and will not be described in detail here.

[0033] Such as figure 1 A schematic diagram of the system architecture of the outsourcing modulo index method of the present invention is shown. There are three participating parties in the present invention: the subroutine Rand, the user T, and the malicious cloud server U.

[0034] Subroutine Rand: Each call can honestly return a form (k,g k ), the computational efficiency can be improved by calling Rand.

[0035] Malicious cloud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe mode index outsourcing method and a safe mode index outsourcing system under a single malicious cloud server. The method comprises the steps as follows: step1, a user T calls a sub-program Rand for six times to obtain six random pairs; step 2, the user T splits a mode index which needs to calculate according to the random pairs returned by the sub-program Rand, and simultaneously, the user T selects a random value r and multiplies the index of the mode index by r to obtain a new mode index, and splits the new mode index; step 3, the user T requests a server U to separately calculate the values which needs to calculate after splitting; step 4, the user T multiplies a random value which is related to ua and which is remained by the T by a result which is related to the ua and which is returned by the server U, and multiplies the results for r times to obtain a verification result 1; and the user T multiplies a random value which is related to ura and which is remained by the T by a result which is related to the ura and which is returned by the server U to obtain a verification result 2; comparing the result 1 and the result 2, and judging that the server could accurately perform calculation if the result 1 and the result 2 are equal to each other.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a method and system for outsourcing security modulus index under a single malicious cloud server. Background technique [0002] In recent years, cloud computing has developed rapidly in the IT field and has good applications in the field of industrial technology, bringing great hope to solve the problem of limited computing resources. In the cloud environment, outsourced computing allows users with limited resources to choose to outsource tedious computing tasks to servers with abundant computing resources for a fee. However, outsourcing means that the control of user data is transferred from itself to the cloud service provider, which inevitably creates new security issues: first, some privacy of users may be leaked; second, the server may also due to various reasons The calculation is not done correctly, causing huge losses to the user. [0003] First of all, in order...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/123H04L67/10
Inventor 叶俊吴树林张金山魏正曦李科刘勇
Owner SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products