Similar sub-image inquiring method and system for protecting privacy under cloud computing environment

A cloud computing environment, privacy protection technology, applied in the field of information security, can solve the problems of infringing the privacy of data owners, infringing the privacy of users, etc.

Inactive Publication Date: 2015-03-11
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Privacy during the query process: Since the similar subgraph query process is completed interactively between the client and the cloud platform, some intermediate information will be generated during the interaction process, which also involves some private information of the user. The cloud computing provider Or other users may use intermediate information to infer some content of query requests and indexes, which violates user privacy
On the other hand, during the query process, some relevant information of the index will be decrypted on the client side, some users may construct some request graph structures, analyze the index, obtain the real information of the index, and violate the privacy of the data owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Similar sub-image inquiring method and system for protecting privacy under cloud computing environment
  • Similar sub-image inquiring method and system for protecting privacy under cloud computing environment
  • Similar sub-image inquiring method and system for protecting privacy under cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] like figure 1 As shown, the present invention provides a similar subgraph query method for protecting privacy under a cloud computing environment, including:

[0047] S1. Extract the feature substructure of a given graph data set to form a feature substructure set; and express the number of each feature substructure contained in each graph data in the graph data set in the form of a vector to form a feature vector ;

[0048] S2. Generate parameters for the privacy homomorphic encryption algorithm and a random vector for information masking of the feature vector;

[0049] S3. Use the parameters in step S2 to perform an encryption operation on the feature vector corresponding to each graph data in the graph data set and the random vector, and use the result of the encryption operation to generate a security code corresponding to each graph data. Vector, and establish a security index, and outsource the encrypted graphic data set and the security index to the cloud platf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a similar sub-image inquiring method and system for protecting privacy under a cloud computing environment. The similar sub-image inquiring method comprises the following steps: extracting characteristic sub-structures of an image shape data set; representing the quantity of each characteristic sub-structure contained in each image datum by using a characteristic vector; generating a parameter for encrypting and a random vector, and carrying out encryption calculation on the characteristic vector and the random vector of each image shape datum to generate a safety vector and establish a safety index; outsourcing the encrypted image shape data set and safety index into a cloud platform; extracting a characteristic sub-structure from an inquiry request image, and representing the quantity of each characteristic sub-structure contained in the inquiry request image by using a request characteristic vector; calculating a maximum allowable characteristic structure difference number, and generating a trap door and submitting the trap door to the cloud platform; after the cloud platform receives the trap door, calculating the difference between the request characteristic vector and the safety vector corresponding to the image shape data on the safety index to further inquire a similar sub-image. According to the similar sub-image inquiring method and system, the safety of privacy information referred in a similar sub-image inquiring process can be protected.

Description

technical field [0001] The invention relates to the field of information security, in particular to a privacy-protecting similar subgraph query method and system in a cloud computing environment. Background technique [0002] Graph data is widely used to represent complex structured data and is ubiquitous in the real world. As graph data grows in size, it becomes increasingly difficult to manage and process it locally. Cloud computing has attracted a large number of users by virtue of its powerful storage capacity, computing power, pay-as-you-go and elastic scaling. More and more individuals and enterprises hope to outsource their graph data to the cloud platform for convenient and flexible management, so as to effectively reduce local resource overhead and save costs. [0003] In order to improve the utilization rate of massive graph data in the cloud computing environment, it is necessary to query the data to obtain effective information. Since the graph data generally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F16/2462G06F16/2228G06F21/6227
Inventor 苏森张忠宝程祥双锴徐鹏
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products