Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security outsourcing method for sequence comparison algorithm based on single server model, user terminal and server

A user terminal, sequence comparison technology, applied in the field of cloud computing security and bioinformatics security, can solve the problem of limited system security, reliability of two cloud service providers, not yet fully balanced sensitive information confidentiality and effective use, overall The architecture lacks effective measures to defend against cloud server collusion, etc., to achieve optimal computing and storage efficiency, minimize network communication overhead, and reasonable space-time overhead.

Inactive Publication Date: 2020-07-14
UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The system security under the multi-server model is severely limited by the reliability of the two cloud service providers;
[0006] (2) The overall architecture lacks effective measures to defend against cloud server collusion, and genetic privacy can be completely lost due to collusion attacks;
[0007] (3) The confidentiality and effective use of sensitive information have not been fully balanced, and the security, computing and communication overhead still need to be optimized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security outsourcing method for sequence comparison algorithm based on single server model, user terminal and server
  • A security outsourcing method for sequence comparison algorithm based on single server model, user terminal and server
  • A security outsourcing method for sequence comparison algorithm based on single server model, user terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0051] The invention is based on figure 1 The public cloud outsourcing general system model, proposes a sequence comparison algorithm security outsourcing method using a single cloud server (including the calculation of the Wagner-Fischer edit distance and the planning of the edit path, the Wagner-Fischer edit distance and the edit path are a well-known algorithm, the present invention carries out safe outsourcing to this algorithm). This method acts between both the end user and the cloud service provider. The end user is responsible for encrypting the genome sequence before outsourcing, and the cloud service provider uses a single cloud server to directly execute the sequence comparison algorithm on the ciphertext genome sequence in a non-interactive manner, and the returned ciphertext comparison result is decrypted by the end user. figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a single-server-model-based secure outsourcing method of a sequence comparison algorithm, a user terminal, and a server. The method is applied between a terminal user and a cloud service provider. The terminal user is responsible for encrypting a genome sequence before outsourcing; the cloud service provider uses a single cloud server to perform a sequence comparison algorithm directly on a ciphertext genome sequence in a non-interactive manner; and the returned ciphertext comparison result is decrypted by the terminal user. The user terminal mainly involves core service modules like an encryption module, a filling module, a division module, an expansion module, a decryption module and a filtering module. Therefore, secure outsourcing of a sequence comparison algorithm is realized only by using a single cloud server, so that the genetic data controlled by the user are stored reliable and the collusion-resistant ciphertext sequence is calculated efficiently.

Description

technical field [0001] The invention relates to a sequence comparison algorithm security outsourcing method based on a single server model, as well as a user terminal and a server for realizing the method, and belongs to the fields of cloud computing security and bioinformatics security. Background technique [0002] Sequence comparison of large-scale genomic data is a new type of outsourced computing service widely provided by public clouds, where the contradiction between the confidentiality and effective utilization of sensitive information of organisms is becoming increasingly severe. On the one hand, the individual genetic characteristics of cloud computing users (such as kinship, disease genetic markers, etc.) are facing a variety of security threats and the risk of privacy leakage. On the other hand, it is still a huge challenge for cloud service providers to meet their normal computing needs while protecting the privacy of genome sequences. [0003] Currently, publi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/00
Inventor 王晓菲张玉清
Owner UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products