Access control and range query method of ciphertext spatial data in cloud environment

A technology for spatial data and access control, applied in the field of cloud computing security, can solve the problems of not supporting user rights allocation, increasing storage space, etc., and achieve the effects of reducing computing overhead, reducing matching time, and strong security protection

Active Publication Date: 2018-12-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing range search schemes for ciphertext spatial data in the cloud environment have the following problems: (a) In terms of efficiency, the ciphertext query efficiency and storage cost of the current range search schemes increase linearly with the search range, that is, With the continuous expansion of the query range, the existing scheme needs to match all the ciphertexts in the range. In addition, the storage space required for the corresponding ciphertext instructions also increases; (b) in terms of security, the current Some range query schemes do not support user permission assignment, that is, legal users have access to all ciphertexts by default. However, in real life, different users often only have access to their correspondingly authorized user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control and range query method of ciphertext spatial data in cloud environment
  • Access control and range query method of ciphertext spatial data in cloud environment
  • Access control and range query method of ciphertext spatial data in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0022] This embodiment provides a method for realizing access control and range query of ciphertext space data in a cloud environment, including the following steps:

[0023] Step 1. System initialization: the system generates public parameters and generates the keys required for AES, secure inner product operation and order-preserving encryption;

[0024] Step 2. Generate data index: the data owner uses AES to encrypt the original spatial data and sends it to the cloud server; at the same time, in order to improve the efficiency of ciphertext range query, the data owner uses secure inner product operation and order-preserving encryption to encrypt each data Generate an index associated with it, in which all ciphertext indexes are stored in the form of R-tree;

[0025] Step 3. Generate a search command: the user encrypts the current geometric range by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control and range query method of ciphertext spatial data in a cloud environment, belonging to the cloud computing security technical field. In the invention, a dataowner firstly generates a ciphertext data index by using the order-preserving encryption and the safe inner product operation, and all the indexes are indexed by R-tree is organized and sent to the cloud server; the user generates ciphertext search instructions according to the geometric range of the query and submits them to the cloud server; the cloud server returns the corresponding ciphertextmatching result according to the user's request and the user's current access authority; finally, after receiving the ciphertext result, the user decrypts the ciphertext by using the key sent by the data owner in advance, and realizes the range query and data access control under the ciphertext environment. The method guarantees the high efficiency and security in the search process, and the specific user can only access the authorized ciphertext spatial data.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and in particular relates to a method for realizing access control and range query of ciphertext space data in a cloud environment. Background technique [0002] Cloud computing is the next-generation information technology (Information Technology, IT) architecture that is most concerned by academia and industry. Services, ubiquitous network access, location-independent resource pools, rapid scaling of resources, pay-per-use, and risk transfer. Cloud computing brings together huge computing resources, storage resources and other service resources, provides users with a variety of novel, convenient and reliable services, and brings huge business opportunities and benefits to cloud service providers. Among many services, cloud storage services have become the focus of widespread attention in academia and industry because they provide users with a more convenient, efficient and rel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30G06F21/60
CPCG06F21/602G06F21/6218
Inventor 李洪伟徐国文任彦之李思远杨浩淼刘森
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products