Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A safe, controllable and efficient data sharing method and system in a cloud computing environment

A cloud computing environment and data sharing technology, applied in transmission systems and key distribution, can solve the problem that verifiable outsourcing decryption schemes cannot provide data authentication functions, bottlenecks in the use of devices with limited computing resources, and the growth of decryption computing access control structures, etc. problem, to achieve the effect of reducing communication and computing overhead, facilitating the use of resource-constrained devices, and efficiently verifying

Active Publication Date: 2020-05-22
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the ABE scheme can be used as a powerful tool for secure and flexible data sharing in cloud computing scenarios, it has a major disadvantage in practical applications: the cost of decryption computation grows linearly with the complexity of the access control structure, which is critical for computing Users of resource-constrained devices are a serious usage bottleneck
It can be seen that the verifiable outsourcing decryption scheme cannot provide data authentication function, and there are security problems in practical applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe, controllable and efficient data sharing method and system in a cloud computing environment
  • A safe, controllable and efficient data sharing method and system in a cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Attached below figure 1 with figure 2 The technical scheme of the present invention is described in further detail.

[0030] First, we introduce a safe, controllable and efficient data sharing method in a cloud computing environment and a cryptographic module required by the system.

[0031] 1. Attribute encryption algorithm ABE, including five sub-algorithms:

[0032] This scheme uses the attribute encryption algorithm ABE as the key encapsulation (KEM), so the description of the sub-algorithm is different from the general attribute encryption algorithm.

[0033] initialization algorithm Input the security parameter λ and the attribute space Output system public parameters PP and system master key MSK;

[0034] key generation algorithm Input system public parameter PP, system master key MSK and attribute set Output transformation key TK and recovery key RK;

[0035] Encryption Algorithm Input system public parameters PP and access control structure Out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe, controllable and efficient data sharing method and system in a cloud computing environment. The method comprises the following steps: setting a system public parameterPP and a system master key MSK; generating a public key PK and a private key SK of the data owner according to the parameter PP;generating a conversion key TK and a recovery key RK of the data consumer according to the parameter PP, the main key MSK and the attribute set (please see the formula in the specification); encrypting the plaintext message m according to the parameter PP, the private keySK and the access control structure, and generating a file original ciphertext CT (Computed Tomography); converting the key TK according to the parameter PP, and performing outsourcing decryption onthe CT to generate a file intermediate ciphertext TCT; and according to the parameter PP, the public key PK and the recovery key RK, carrying out decryption operation on the file intermediate ciphertext TCT, and verifying whether the file intermediate ciphertext TCT is a plaintext message m encrypted by the data owner. According to the invention, the user can efficiently verify the correctness ofoutsourcing calculation and authenticate the data source.

Description

technical field [0001] The present invention relates to the field of outsourcing services under the cloud computing environment and the field of data encryption and data authentication for network security. In particular, a safe, controllable and efficient data sharing system and method are realized in the cloud computing environment. The method utilizes a cloud server Outsourced computing capabilities, on the premise of ensuring data confidentiality, effectively reduce user communication and computing overhead, and realize the verifiability of outsourced computing and data sources, and detect whether the cloud server has calculated errors or forged data. Background technique [0002] With the rapid development of cloud computing technology, data sharing has become one of the current research and application hotspots. Attributed Encryption (ABE), as a public key encryption scheme with one-to-many encryption characteristics, is an important technical tool to realize secure da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
Inventor 周永彬王提马晖张锐
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products