Unlock instant, AI-driven research and patent intelligence for your innovation.

Spatial data safety system based on access mode protection

A technology for spatial data and security systems, applied in the field of information security, can solve problems such as lack of good solutions, and achieve the effect of reducing complexity and avoiding the risk of leaking secrets

Inactive Publication Date: 2015-09-02
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of the above methods is a good solution for how to deal with attackers guessing user information from access patterns

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Spatial data safety system based on access mode protection
  • Spatial data safety system based on access mode protection
  • Spatial data safety system based on access mode protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Such as Figure 4 As shown, in this embodiment, when the client C obtains an id from the server S, it needs to be decrypted and re-encrypted when the client returns data from the server, specifically:

[0048] Step 1. The execution end judges whether v exists in the hierarchical list L

[0049] Step 2. When v exists in L:

[0050] 2.1) For each layer in L, client C sends a data item query command to server S to get a masquerade data number The corresponding data value, and ignore the data value when received.

[0051] 2.2) Send data item query command Get(PRP s (v)), and receive the result b returned by the server S.

[0052] 2.3) Execute encrypted transmission processing shelterInsert(v,b).

[0053] 2.4) will decrypt SK (b) Return to the user as a result.

[0054] Step 3. When v does not exist in L:

[0055] 3.1) Let l be the highest layer in the layer where the item with id v in L is located.

[0056] 3.2) For each layer i≠l in L, the client sends a requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a spatial data safety system based on access mode protection. When a user end obtains an id from a server end, the server is decrypted, and when the user end returns the server data, the user end performs re-encryption. The system ensures query efficiency, and realizes data encryption, and meanwhile the system hides and protects data access modes, so as to greatly reduce risks of information leakage.

Description

technical field [0001] The invention relates to a technology in the field of information security, in particular to a space data security system based on access mode protection. Background technique [0002] Since its inception, data security has been one of the most significant challenges cloud storage services face. Because data is stored in the cloud and accessed through the network, it is inevitable that it will be exploited by attackers. Although the content of the data itself can be encrypted, an attacker can still gain useful information from a user's access patterns. How to design a reasonable structure to minimize the information leakage in cloud storage and minimize the risk of being attacked has always been an important issue. In this field, the current representative works are as follows: [0003] Goldreich et al. were the first to study the problem of how to hide access patterns to avoid message leakage. The idea is to use a physically isolated CPU with a ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 过敏意姚斌沈耀谢丁星周憬宇薛广涛
Owner SHANGHAI JIAO TONG UNIV