Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on fuzzy grouping of trusted third-party attributes in cloud environment

A cloud environment and trusted technology, applied in the field of cloud computing security, can solve problems such as illegal reading of user data, leakage of user identity and attribute privacy, cloud privacy data leakage, etc., to prevent malicious parties from attacking, protect identity privacy, and ensure safety effect

Active Publication Date: 2017-02-22
BEIJING UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, when a user remotely accesses cloud data, malicious cloud service providers or attackers can obtain the user's identity information by monitoring its operation, and then use this information to illegally read, maliciously tamper or destroy the user data, which will lead to Therefore, the issue of privacy protection has become the key to the sustainable development and wide application of cloud computing technology.
Although the existing privacy protection methods can solve the problem of user privacy protection in the cloud environment to a certain extent, most methods still require cloud users to provide attribute certificates for identity authentication before accessing data, which cannot meet the user's anonymous access needs. The problem of identity and attribute privacy disclosure
In addition, although some methods allow users to access the cloud anonymously, the anonymity also makes it difficult to determine the identity of the user accessing the cloud data, and there is a security risk of cloud privacy data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on fuzzy grouping of trusted third-party attributes in cloud environment
  • Privacy protection method based on fuzzy grouping of trusted third-party attributes in cloud environment
  • Privacy protection method based on fuzzy grouping of trusted third-party attributes in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0025] The specific implementation process of the privacy protection method based on the fuzzy grouping of trusted third-party attributes according to the present invention is as follows: figure 1 shown, including the following steps:

[0026] Step 1: Cloud user registration.

[0027] Cloud user registration can choose direct or anonymous method.

[0028] Step 1.1: Register using the direct method.

[0029] (1) The user submits a direct registration request to the cloud service provider.

[0030] (2) The cloud responds to the user's registration request. At the same time, the cloud sends the attribute ontology to the trusted third party, and the trusted third party provides an anonymous registration method based on the attribute ontology.

[0031] Step 1.2: Register anonymously.

[0032] (1) The user submits an anonymous registration reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a privacy protection method based on trusted third party attribute fuzzy grouping under the cloud environment. The method comprises an attribute fuzzy grouping access control method and an interaction protocol based on trusted third party protection, and is mainly used for three stages of cloud user registration, cloud end data creation and cloud end data access, and the stages support direct interaction and indirect interaction. Through the access control method based on attribute fuzzy grouping, conversion of an access entity, an access control policy and user requests is achieved on the three stages by the trusted third party, leakage of privacy information of users can be effectively avoided, and authenticity of anonymous access users is ensured. Through the interaction protocol based on trusted third party protection, interaction behaviors of the user, the trusted third party and the cloud service party are stipulated, data encryption, timestamp and other technological means are added to the protocol, and safety of user data, user identities and attribute privacy is guaranteed in the interaction process of the user, the trusted third party and the cloud service party.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and specifically relates to a data privacy protection method based on a trusted third party in a cloud environment. The method proposes two technologies: an access control method based on attribute fuzzy grouping and an interactive protocol based on trusted third party protection , which can not only ensure the security of data stored by cloud users, but also prevent the leakage of user identity and attribute privacy. Background technique [0002] Cloud computing has become one of the current research hotspots in the information field. By introducing a virtual layer between system software and hardware, it shields the dynamics, distribution, and heterogeneity of the hardware platform, and realizes the effective aggregation and reuse of underlying IT resources. , and provide dynamic, scalable large-scale computing and storage services to remote computer users in a simple and trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 林莉刘婷婷胡健
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products