Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy-preserving encrypted data query method based on fog assistance

A privacy protection and query method technology, which is applied in the field of fog-assisted privacy protection encrypted data query, can solve the problems of reducing service quality, communication overhead, increasing computing overhead, and increasing the difficulty of data processing, so as to improve query efficiency, The effect of reducing certification pressure

Active Publication Date: 2020-06-30
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve this problem, usually LP can encrypt the original data, and then outsource the encrypted data to the cloud server, but this will reduce the operability of the data and increase the difficulty of data processing
In addition, when a large number of query requests are connected to the cloud server at the same time, the cloud server needs to perform a large number of connection establishment operations and a large number of authentication operations, which will undoubtedly increase the communication overhead and calculation overhead of the cloud server, and reduce service quality.
[0003] In addition, the existing methods of encrypting data usually use order-preserving encryption. In the outsourcing environment of Internet of Vehicles data, it is difficult to solve the problem of data being processed on the cloud server at one time, and this encryption method is difficult to resist known plaintext attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-preserving encrypted data query method based on fog assistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0042] Such as figure 1 As shown, the fog-assisted privacy protection encrypted data query method includes the following steps:

[0043] S1. Based on the data owner, build a data query system by building an R tree, building a cloud server and a fog device;

[0044] S2. The user generates a query area SR and sends a query request to the fog device;

[0045] S3. Aggregate user requests through the fog device, and forward the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fog-assisted privacy protection encrypted data query method, which includes the following steps: S1, based on the data owner, constructing a data query system by establishing an R tree, building a cloud server and a fog device; S2, generating a query area by the user And send the query request to the fog device; S3, aggregate the user request through the fog device, and forward the aggregated user query request to the cloud server; S4, according to the query area SR in the user query request and the node in the R tree corresponding to the minimum The overlap of enclosing rectangles finds the overlapping leaf nodes, and queries the data points contained in the query area SR in the overlapping leaf nodes. The invention constructs a light data outsourcing privacy protection structure, and protects the data privacy of the data owner and the query privacy of the user under the framework.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a fog-assisted privacy protection encrypted data query method. Background technique [0002] The existing data outsourcing framework mainly includes vehicle users, LP (data owner), and cloud servers. Since the cloud server can directly process LP data and the cloud server is not completely reliable, if the LP does not process the data, directly asking the cloud server to query the location service will undoubtedly bring about the risk of data privacy leakage. In order to solve this problem, usually LP can encrypt the original data, and then outsource the encrypted data to the cloud server, but this will reduce the operability of the data and increase the difficulty of data processing. In addition, when a large number of query requests are connected to the cloud server at the same time, the cloud server needs to perform a large number of connection establishment operations and a la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06H04L29/08G06F16/901G06F21/60G06F21/62
CPCH04L9/008H04L9/0861H04L63/0442H04L63/0823H04L67/10G06F21/602G06F21/6227G06F16/9027H04L67/60H04L67/63
Inventor 廖丹严鑫李慧张明李玉娟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products