Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for outsourcing security mode indexes in cloud environment

A modular index and cloud environment technology, applied in the field of cloud computing, can solve the problems of low verifiability and failure to detect lazy servers deceiving users

Inactive Publication Date: 2015-06-24
SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the low verifiability of the outsourcing method in the prior art, and the inability to discover such technical problems as the lazy server deceiving the user, the present invention discloses a security module index outsourcing method and system in a cloud environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for outsourcing security mode indexes in cloud environment
  • Method and system for outsourcing security mode indexes in cloud environment
  • Method and system for outsourcing security mode indexes in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific implementation manner of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] Suppose p, q are two large prime numbers, q|p-1, and u q = 1mod p, giving an arbitrary exponent and base calculate u a mod p, requires the value of a and u to be U in the outsourced calculation process 1 , U 2 confidential. This is a requirement of the safety modulus index outsourcing method.

[0029] Such as figure 1 A schematic diagram of the system architecture of the outsourcing modulo index method of the present invention is shown. There are four participants in the present invention: subroutine Rand, user T, two lazy servers U who do not collude 1 and U 2 . Subroutine Rand: each call can honestly return a random pair (t,g t ) mod p, the calculation efficiency can be improved by calling Rand.

[0030] Server: The computing power is very powerful, but it is not completely reliable. It may return a correct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing, and discloses a method for outsourcing security mode indexes in a cloud environment. The method specially includes the steps that u is split into a formula shown in the specification by a user T according to pairs returned by Rand, the formula is sent to an idle server U1 and an idle server U2 which are not collaborated to be computed, the two servers return the computing results to the user T, and the user T verifies the returned results. By the adoption of the method, calling of Rand is small, logic splitting of u is simple, the computing amount is small, and the detection rate can reach 100%. The invention further discloses a system for outsourcing the security mode indexes in the cloud environment.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a method and system for outsourcing security modulus index in a cloud environment. Background technique [0002] In recent years, cloud computing has developed rapidly in the IT field and has good applications in the field of industrial technology, bringing great hope to solve the problem of limited computing resources. In the cloud environment, outsourced computing allows users with limited resources to choose to outsource tedious computing tasks to servers with abundant computing resources for a fee. However, outsourcing means that the control of user data is transferred from itself to the cloud service provider, which inevitably creates new security issues: first, some privacy of users may be leaked; second, the server may also due to various reasons The calculation is not done correctly, causing huge losses to the user. [0003] First of all, in order to protect the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L9/0816H04L63/06H04L67/1097
Inventor 叶俊兰恒友林旭东
Owner SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products