A secure re-encryption method for cloud data privacy protection

A privacy protection and re-encryption technology, applied in the field of computer security, can solve problems such as user loss, high consumption cost, user data leakage, etc., to achieve the effect of improving security and efficiency, reducing re-encryption overhead, and improving security

Inactive Publication Date: 2017-07-11
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the data security caused by this method is low and the cost of consumption is also large
[0006] (2) Although some cloud platforms, such as Kingsoft Express, allow users to choose to encrypt data stored in the cloud, the key is generated, distributed and managed by the cloud, so the control of the data is still in the cloud. If the cloud service Providers are not completely trusted, and user data in the cloud will be leaked
[0007] (3) Since the cloud platform is an open and multi-user environment, the cloud service provider itself cannot guarantee the data security of the cloud. If the user's data is directly stored in the cloud, it may be used by malicious programs with various There are various ways to steal and cause losses to users, such as the leakage of Internet user information such as CSDN in recent years, and the leakage of hotel customer information such as Home Inn Hanting
Patent application number CN201210116114.3), so that the ciphertext cannot be safely distributed among multiple users. Once a user obtains the decryption key, he also knows the decryption password of other users, which leads to the leakage of user data, and this type of No specific implementation examples are given in the patent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure re-encryption method for cloud data privacy protection
  • A secure re-encryption method for cloud data privacy protection
  • A secure re-encryption method for cloud data privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] To solve the problem of incomplete trustworthiness of cloud service providers, the present invention proposes a security model for cloud data services, and converts the ciphertext data of the data owner into a ciphertext data that can be decrypted by the data user by means of the re-encrypted ciphertext conversion feature. text, and ensure that the conversion operator cannot obtain any information of the plain text, forming a re-encryption scheme framework for cloud data privacy protection.

[0050] ElGamal algorithm is a relatively common encryption algorithm, which is based on the public key cryptosystem and elliptic curve encryption system proposed in 1984. For the problems caused by symmetric keys in cloud data services, the present invention constitutes a cloud data privacy protection security re-encryption method based on EIGamal according to the security and effectiveness characteristics of the EIGamal algorithm, so that the cloud data privacy protection security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data privacy protection security re-encryption method. The method comprises the steps that a data owner encrypts plaintext data and places the encrypted data to a cloud, and a cloud service provider conducts storage and relevant operations on the encrypted data; after obtaining access authorization, a data user sends a data request, and the cloud service provider feeds back the data request to the data owner after obtaining the data request; the data owner obtains information parameters of the data request of the data user, generates a re-encryption secret key, and sends the re-encryption secret key to the cloud service provider; the cloud service provider encrypts ciphertext data placed to the cloud by the data owner through the re-encryption secret key, and re-encryption ciphertext is obtained; the data user downloads the re-encryption ciphertext from a cloud platform, decrypts the re-encryption ciphertext according to a private key of the data user, and obtains the needed plaintext data. According to the technical scheme, the computing and storing capacity of cloud computing can be utilized, and data privacy confidentiality can be protected as well.

Description

technical field [0001] The invention belongs to the field of computer security, and more specifically relates to a cloud data privacy protection method, especially a cloud data service model and re-encryption technology. Background technique [0002] The acceleration of informatization and the rapid development of the Internet have changed the data storage and data processing modes of data services. In traditional data services, enterprises must have a large number of high-performance service equipment to continuously increase the data volume. storage space and improve the performance of service data processing, but the subsequent replacement of computer hardware equipment brings high service basic costs to enterprises, and the contradiction between improving data service quality and reducing enterprise service costs is becoming more and more obvious. With the development of cloud computing, with the flexibility of mass data access, low cost, and high-performance computing, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 徐正全熊礼治徐彦彦王涛
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products