Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data sharing method, device, computer equipment and storage medium

A data sharing and data encryption technology, applied in the computer field, can solve problems such as low security of user data, and achieve the effect of improving security and patching security loopholes

Active Publication Date: 2021-06-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen from the above that the existing re-encryption scheme still has security loopholes, which leads to low security of user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method, device, computer equipment and storage medium
  • Data sharing method, device, computer equipment and storage medium
  • Data sharing method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0102] See figure 1 , is a system architecture diagram of data sharing provided by the embodiment of this application. Data sharing involves a server 10d and a terminal device cluster, and the terminal device cluster may include: a terminal device 10a, a terminal device 10b, and a terminal device 10c.

[0103] Taking terminal device 10a and terminal device 10b as an example, terminal device 10a is the terminal device where user A is located, and terminal device 10a is the data sender; term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a data sharing method, device, computer equipment, and storage medium. The data sharing method includes: the sending node obtains the target data, and determines the data fingerprint of the target data; the sending node uses the sending node's sending public key and data fingerprint Encrypt the target data to obtain the first encrypted data; the sending node obtains the receiving public key of the receiving node, and generates a re-encryption key for the first encrypted data according to the sending private key, receiving public key and data fingerprint of the sending node; sending The node sends the re-encryption key and the first encrypted data to the proxy server. By adopting the application, the security of user data can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a data sharing method, device, computer equipment and storage medium. Background technique [0002] Cloud storage meets the needs of users for data sharing, and users can store and share data by purchasing cloud storage services. However, the amount of data circulating in the cloud is increasing day by day, which also contains a large amount of sensitive data and private information. Therefore, how to protect the privacy of user data is of great significance in the field of cloud computing. [0003] At present, when a user needs to share data in the cloud server, a proxy re-encryption mechanism can be used to protect the security of user data in the cloud server. The specific process is as follows: first, user A encrypts file 1, and encrypts the encrypted 1 Upload to the cloud server. When user A needs to share file 1 with user B, user A generates a re-encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L67/10
Inventor 彭立彭思翔罗易
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products