Fine-grained searchable encryption method for fog computing

An encryption method and fine-grained technology, applied in the field of information security, to achieve the effect of lightweight searchable encryption and broad application prospects

Active Publication Date: 2018-06-12
XIDIAN UNIV
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The computational and storage overhead of existing searchable encryption techniques for ciphertext policies is proportional to the complexity of access policies, which brings great limitations to IoT devices with limited computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-grained searchable encryption method for fog computing
  • Fine-grained searchable encryption method for fog computing
  • Fine-grained searchable encryption method for fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0057] Such as figure 1 As shown, the present invention provides a fine-grained searchable encryption method for fog computing, comprising the following steps:

[0058] Step 1, system initialization: the key generation center KGC generates the public parameter pm and the master key msk according to the security parameter k, where:

[0059] public parameters

[0060] Master key msk=(x,y,{t i} i∈[1,n] );

[0061] where G is the additive cyclic group of order p, g 0 , g 1 are two different generators of G, G T is the p factorial cyclic group, e is the bilinear map G×G→G T , H 1 Indicates that the collection {0,1} * Mapped to the integer ring Z of order p p Hash function, x represents the first random number: x∈Z p , y represents the second random number: y∈Z p , t i Indicates the third random number: t i ∈ Z p , i∈[1,n] represent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fine-grained searchable encryption method for fog computing. A cloud-fog terminal user system structure is established by using the attribute encryption technology and the searchable encryption technology of a ciphertext strategy, a fog node serves as an agent to share the computing burden of a terminal user by using the attribute encryption technology and the searchableencryption technology of the ciphertext strategy, the terminal user can quickly generate a trap door and decryption ciphertext, therefore lightweight searchable encryption is achieved, meanwhile fine-grained access control is supported, only legitimate data users can perform ciphertext retrieval, the fine-grained searchable encryption method has a broad application prospect in actual scenes, fine-grained access control is achieved, only the legitimate data users can perform ciphertext retrieval, and the fine-grained searchable encryption method has a broad application prospect in actual scenes.

Description

technical field [0001] The invention belongs to the field of information security technology, and specifically relates to attribute encryption technology of ciphertext policy and searchable encryption technology, which can be used to realize fine-grained searchable encryption under the background of fog computing. Background technique [0002] The Internet of Things is a technology that can connect objects to the Internet to make them more intelligent. With the continuous increase of networked devices, the massive data generated can be stored and calculated through cloud computing, which relieves end users from heavy equipment maintenance and data management. liberated from. However, traditional cloud computing has problems such as poor network architecture mobility and high latency, which pose great challenges to the development of the Internet of Things. Fog computing extends cloud computing to the edge of the network. Fog nodes, as the intermediary between the Internet o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/083H04L9/0861H04L9/0869H04L63/0435H04L63/06H04L63/065H04L67/10H04L67/01
Inventor 苗银宾马建峰伍祈应王祥宇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products