Privacy protection method for storing shared data in mobile cloud

A technology for data sharing and privacy protection, applied in the field of cloud storage, it can solve problems such as only support, and achieve the effect of protecting privacy and reducing the amount of calculation.

Inactive Publication Date: 2018-04-27
SHANGHAI MARITIME UNIVERSITY
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in 2008, Nishide et al. used wildcards to construct an attribute-based encryption scheme that supports partial policy hiding, but this scheme only supports AND logic operations between mul

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for storing shared data in mobile cloud
  • Privacy protection method for storing shared data in mobile cloud
  • Privacy protection method for storing shared data in mobile cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]In order to make the technical means, creative features and functions realized by the present invention easy to understand, a method for privacy protection of mobile cloud storage shared data proposed by the present invention will be further described below in combination with diagrams and specific embodiments.

[0039] Such as figure 1 As shown, the present invention provides a kind of privacy protection method of mobile cloud storage shared data, and this method comprises the following steps:

[0040] Step 1, system initialization, generating system public parameters PP;

[0041] Step 2, attribute authority initialization: generate the public key and private key of the attribute authority;

[0042] The attribute authority is mainly responsible for generating the public key and private key of the system, as well as generating and distributing attribute private keys for users, and is an organization that is completely trusted by users;

[0043] Step 3. Key generation: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection method for storing shared data in a mobile cloud. The privacy of a data owner is effectively protected through strategy semi-hiding. A public key and a private key are generated when an attribute authority is initialized, the data owner encrypts the data by using the public key generated by the attribute authority, thereby generating ciphertext and uploading the ciphertext to a cloud server to store; a user and the attribute authority are interacted to generate a private key of the user; when the user sends an access request to the cloud server andacquires the ciphertext data stored at the cloud server by the data owner, the decryption is performed through plaintext data to be shared by the data owner and the related operation is performed. Through the privacy protection method disclosed by the invention, the protection of the privacy of the data owner can be well protected, the calculated quantity of the data owner in the traditional hiding access scheme is greatly reduced, and the method is suitable for the situation that the encryption strategy in the mobile terminal application is far less than the system attribute.

Description

technical field [0001] The invention relates to the field of cloud storage, in particular to a method for protecting privacy of shared data in mobile cloud storage. Background technique [0002] At present, with the development of information technology, more and more enterprises and individuals begin to use cloud platforms. Cloud computing has the advantages of powerful storage capacity and computing resources, which prompts them to outsource some data and some services to cloud servers. Cloud computing It has been widely used in industrial and commercial fields. At the same time, with the development of mobile networks, in the cloud computing environment, data sharing and query through mobile terminals are becoming more and more common. However, everything has two sides. Although storing data in the cloud is convenient for users to manage and operate, it also brings some security risks, such as data privacy security and access control. Because the cloud is not completely...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/062H04L63/10H04L63/107H04L67/1097
Inventor 田秋亭韩德志毕坤王军
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products