Permission sharing model by medical cloud search

A cloud search and permission technology, applied in the field of searchable encryption, which can solve the problem of access policies relying on authorization centers, etc.

Inactive Publication Date: 2019-03-08
DALIAN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the attribute encryption of the key policy is adopted, and the setting of the access policy can only rely on the authorization center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission sharing model by medical cloud search
  • Permission sharing model by medical cloud search
  • Permission sharing model by medical cloud search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] 1 Basic concept description

[0047] 1.1 Bilinear Mapping

[0048] Definition 1 bilinear map. G and G T are two multiplicative cyclic groups of order p. Bilinear map e:G×G→G T ,g,g T Respectively G, G T The generator of , satisfying the following properties at the same time:

[0049] Bilinear: there exists e(g a , g b )=e(g,g) ab ,in

[0050] • Non-degenerate: There exists g∈G such that e(g,g)≠1.

[0051] Computability: yes e(u,v) can be calculated efficiently.

[0052] 1.2 Difficult Problem Hypothesis

[0053] Definition of n-multilinear map: Given a security parameter l and a l-bit prime number p, an n-multilinear map is composed of n p-order groups (G 0 ,G 1 ,...,G n-1 ) and n-1 mappings e i :G 0 ×G i →G i+1 (i=0,...n-2) composition. The n-multilinear map should satisfy the following properties, for (i=0,...n-2):

[0054] · If g ∈ G 0 for G 0 generator, then g i+1 = e i (g 0 , g i ) is G i+1 generator of .

[0055] Satisfy

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A permission sharing model by medical cloud search belongs to the field of searchable encryption, and solves the problem that the search permission cannot be shared. The model includes four entities,namely an authorization center, a cloud server, a data owner and a search user, and the data owner uploads personal medical data and data keywords to the cloud after encryption, thereby separating thesearch and decryption to make the design be more flexible and easy to operate.

Description

technical field [0001] The invention belongs to the field of searchable encryption and relates to an attribute-based ciphertext search method with controllable search authority. Background technique [0002] With the rapid development of cloud computing technology and big data, cloud storage effectively reduces the cost of local data storage and management, and realizes high-quality application services, so it is increasingly favored by enterprises and individual users. Because the data on the cloud server is not absolutely safe, it is usually necessary to encrypt the data and then store the ciphertext data in the cloud server. Although this approach solves the data security problem, the encrypted data ciphertext retrieval and search access Control becomes a problem. [0003] In order to ensure data confidentiality and limit users' decryption ability at the same time, the method of Attribute-Based Encryption (ABE) was proposed. The communication mode based on the attribute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/08G06F16/9535
CPCH04L9/0861H04L9/3213H04L63/0807H04L67/12
Inventor 刘艳段茹季长清王丹
Owner DALIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products