Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method and system based on cp-abe ciphertext in fog computing environment

A CP-ABE, privacy protection technology, applied in the field of access control based on CP-ABE ciphertext, can solve the problem of not knowing the ciphertext

Active Publication Date: 2021-02-02
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In KP-ABE, the key is related to the access policy, and the ciphertext is related to the attribute set. The encryptor can only choose descriptive attributes for the data, and cannot decide who can decrypt the ciphertext, only the key issuer can be trusted.
The attributes in CP-ABE are used to describe the user's private key. The encryptor can use the access policy to determine the access to encrypted data, but the encryptor does not know who can access the ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and system based on cp-abe ciphertext in fog computing environment
  • Privacy protection method and system based on cp-abe ciphertext in fog computing environment
  • Privacy protection method and system based on cp-abe ciphertext in fog computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these examples are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention All modifications of the valence form fall within the scope defined by the appended claims of the present application.

[0058] A privacy protection system based on CP-ABE ciphertext access control in a fog computing environment, such as Figure 1-2 As shown, it includes an initialization module, a private key generation module, an encrypted data module, and a decrypted ciphertext module. The encrypted data module includes a fog node encryption module and a data owner encryption module. The decrypted ciphertext module includes a fog node decryption module, User decryption module, where...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a privacy protection method and system based on CP-ABE ciphertext in a fog computing environment, adopting an LSSS-based linear secret sharing matrix access structure, which not only supports fine-grained description of attributes of access users, but also has high computing efficiency . Part of the calculations are outsourced to fog nodes during the encryption and decryption stages, reducing the burden on users. Considering that the access structure may leak the user's privacy, this method introduces the technology of partially hiding the access structure to ensure the security of the user's privacy. Finally, in order to verify whether the ciphertext has been tampered in the process of transmission and outsourcing decryption, the ciphertext is verified to ensure the correctness of the ciphertext.

Description

technical field [0001] The invention relates to a CP-ABE ciphertext-based access control method capable of realizing privacy protection in a fog computing environment, and belongs to the technical field of fog computing. Background technique [0002] Fog computing (Fog Computing), in which data, (data) processing and applications are concentrated in devices at the edge of the network, rather than stored almost entirely in the cloud, is an extended concept of cloud computing (Cloud Computing). Fog computing mainly uses devices in the edge network, and data transmission has extremely low latency. It has a vast geographical distribution, a large-scale sensor network with a large number of network nodes. Moreover, the mobility of fog computing is good. Mobile phones and other mobile devices can communicate directly with each other, and the signal does not need to go around the cloud or even the base station, which supports high mobility. Due to the large-scale and low-cost cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0869H04L63/0407H04L63/10
Inventor 陈燕俐陈梦书
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products