Key revocation method for key management tree in cloud database

A key management and database technology, applied in key distribution, can solve the problems of increased storage overhead, management difficulty, large computing overhead, etc., and achieve the effect of saving storage overhead

Active Publication Date: 2017-06-13
XIDIAN UNIV
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a key revocation scheme of the key management tree in the cloud database, which solves the problem that when the key management tree in the existing cloud database performs key revocation,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key revocation method for key management tree in cloud database
  • Key revocation method for key management tree in cloud database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] The present invention comprises the following steps:

[0027] 1. Key revocation state management tree establishment process:

[0028] 11) First select a root key K with a length of 256 bits r , set it as the root key K of the Hash tree with key r , and keep it secret;

[0029] 12) Define the number of branches and the depth of the tree according to the needs of the user, and establish a hash tree with a key;

[0030] 13) If figure 1 As shown, when the key management tree structure of the cloud database is established, the key revocation state management tree is correspondingly established to establish the state management tree corresponding to the structure; here, a hash tree with a key is taken as an example. This kind of key management tree structure is universal, here is just one example;

[0031] 14) Revocation state value S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key revocation method for a key management tree in a cloud database. The method comprises the steps of correspondingly generating a key revocation management tree for an existing key management tree structure of the cloud database while the tree structure is generated; recording the revocation state of each key management tree node of the cloud database; and when a user carries out revocation operation, updating corresponding key revocation management tree state, and thus completing the revocation process. The problems of increased storage expense and management difficulty and a lot of computation expense in a re-encryption process due to the fact that the key storage expense is increased along with an increase of the revocation times when key revocation is carried out on the key management tree in an existing cloud database are solved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a key revocation method for a key management tree in a cloud database, which is used for effective key revocation management on the key management tree in the cloud database. Background technique [0002] With the advent of information technology and the era of big data, more and more people outsource their data to cloud servers for storage and management. However, in recent years, cloud security issues have emerged one after another. Encryption; however, the encryption of massive data will bring complex key management issues. The encryption of massive data will generate a large number of keys, and these keys will also occupy a large amount of storage space. How to store a large number of keys is a huge challenge for users. At present, there are many methods that use a tree structure to store and manage keys. However, in the revocation process of the ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0891
Inventor 王祥宇马建峰苗银宾张凯常益嘉赵姝畅骆苑新雨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products