Data sharing system

A data sharing and data technology, applied in the information field, can solve the problems of inflexible decryption, key leakage, low efficiency, etc., and achieve the effect of improving security performance, reducing the amount of calculation, and strong anti-attack ability.

Inactive Publication Date: 2015-12-30
CHINA STANDARD SOFTWARE
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the inefficient decryption and inflexibility of this method, most of the existing attribute-based access control schemes are not suitable for implementing distributed data sharing systems
[0009] In addition, the attribute encryption methods in the prior art all rely on a trusted key distribution center, resulting in the security of the entire system resting on a single key distribution center. If the key distribution server is attacked, the attacker is in charge of the key distribution center During the key distribution process, the keys of the entire system will be leaked, and data confidentiality cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing system
  • Data sharing system
  • Data sharing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will describe the implementation of the present invention in detail with reference to the accompanying drawings and embodiments, so that the implementers of the present invention can fully understand how the present invention applies technical means to solve technical problems, and achieve the realization process of technical effects and based on the above realization process Specific implementation of the present invention. It should be noted that, as long as there is no conflict, each embodiment of the present invention and each feature in each embodiment can be combined with each other, and the technical solutions formed are all within the protection scope of the present invention.

[0049] In view of the problems existing in the attribute access control method in the prior art, the present invention proposes a data sharing method. To implement the method of the present invention, a key distribution center needs to be constructed first. The usual attribut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data sharing method and system. The method comprises the following steps that: a plurality of secret key distribution center is constructed by using a unified common parameter; on the basis of the common parameter, each secret key distribution center generates an attribute public key corresponding to an attribute of a user; a corresponding secret key is generated based on a user attribute of a data visitor; a data sharer constructs an access strategy according to an access limit demand of shared data; encryption is carried out on the shared data by using an encryption secret key to generate a ciphertext; on the basis of the access strategy and the corresponding attribute public key, the encryption secret key is encrypted to generate a ciphertext public key; and the ciphertext is decrypted according to the ciphertext public key and a private key of the data visitor meeting the access strategy. Compared with the prior art, the safety performance of the system can be substantially improved with the method; and on the premise that safety is not reduced, the computational work of the method can be substantially reduced.

Description

Technical field [0001] The invention relates to the field of information technology, in particular to a data sharing method and system. Background technique [0002] With the continuous advancement of network technology, cloud storage services have been widely used. Through cloud storage services, users can easily store data to a remote server and share data with other users. Cloud storage services are very powerful, but they also bring new privacy and security challenges. After the user uploads the data, it is hosted on the server, and the control of the data is not in the control of the user. Therefore, data security and privacy are key issues that cloud storage needs to solve. [0003] In the prior art, one of the means for achieving secure access control of data in cloud storage is Ciphertext Policy Attribute-based Access Control. The ciphertext attribute access control strategy includes three parts: user, data, and key distribution center. among them: [0004] User: The us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/0428
Inventor 朱健伟黄粟姜春林申利飞
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products