Multiple users-based outsourcing database audit method

A multi-user and database technology, applied in the field of data processing, can solve problems such as increased user burden and low verification efficiency, and achieve the effect of reducing burden, reducing calculation cost and communication overhead, and reducing one interaction

Inactive Publication Date: 2017-02-22
XIDIAN UNIV
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the user gets all the results that satisfy his query request, the user must verify the correctness and in...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple users-based outsourcing database audit method
  • Multiple users-based outsourcing database audit method
  • Multiple users-based outsourcing database audit method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] refer to figure 1 , the implementation steps of the present invention are as follows:

[0028] Step 1. The data owner encrypts the data by proxy re-encryption to form a secondary ciphertext C 1 , and generate the re-encryption key sk′ according to the public key of the querying user.

[0029] Proxy re-encryption is a cryptographic concept proposed by cryptographers Blaz, Bleumer and Strauss in 1998. According to the nature of the proxy key, proxy re-encryption can be divided into two-way proxy re-encryption and one-way proxy re-encryption. According to the nature of whether the proxy ciphertext can be converted multiple times, proxy re-encryption is divided into two types: multi-hop proxy re-encryption and single-hop proxy re-encryption. What the present invention adopts is the single-hop one-way proxy re-encryption scheme that Ateniese et al. utilize bilinear construction.

[0030] refer to figure 2 , the specific implementation of this step is as follows:

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a multiple users-based outsourcing database audit method, aiming to solve problems of low signature verification efficiency and complex decryption in the prior art. The method comprises a first step that a data owner encrypts data by using a proxy re-encryption method so as to form a second-level ciphertext, generates a re-encryption secret key by inquiring a public key of a user, generates a searching label by using an Evdokimov encryption manner, and generates hash tree root signature by using aggregate signature; and the signature, second-level ciphertext, re-encryption secret key and the searching label are transmitted to a cloud server; a second step that the cloud server encrypts the second-level ciphertext so as to generate a first-level ciphertext; a third step that a user sends a search request to the cloud server, and the cloud server searches and returns a corresponding first-level ciphertext; and a fourth step that the user decrypts the first-level ciphertext so as to form a plaintext, and performs aggregate verification on the plaintext. Through adoption of the method, the burden on the data owner is greatly reduced, interaction is reduced for one time, data privacy protection is improved, and the method can be applied to safe data outsourcing in a cloud calculation environment.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a multi-user outsourcing database audit method, which can be used for data security outsourcing in a cloud computing environment. Background technique [0002] With the continuous development of cloud computing, the security outsourcing computing technology in the cloud computing environment has been well applied, so that users with limited resources can purchase the endless computing and storage resources provided by the cloud computing platform by paying on demand. , greatly reducing the user's burden on software management and hardware maintenance. Auditing of outsourced databases is a very important technology in security outsourcing, which usually needs to meet the privacy of data and the correctness and integrity of query results. It uploads its own encrypted data to the cloud server through the data owner, and the user puts forward his own query requirements to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L63/0218H04L9/0861H04L9/3236H04L9/3247H04L63/0281H04L63/0478H04L63/0807H04L63/0884
Inventor 高梓渊王保仓
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products