Method for implementing efficient and safe transmission of data between cloud computing servers

A cloud computing server and secure transmission technology, applied in the field of information security, can solve problems such as inability to achieve eCK security and low protocol efficiency

Inactive Publication Date: 2018-09-28
SOUTH CHINA NORMAL UNIVERSITY
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the efficiency of the protocol is not high, and the transmission bandwidth required for key negotiation is also higher than that of t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing efficient and safe transmission of data between cloud computing servers
  • Method for implementing efficient and safe transmission of data between cloud computing servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0060] The most widely used authentication key agreement between cloud computing servers is constructed based on traditional number theory puzzles. The invention constructs an anti-quantum attack authentication key agreement agreement among cloud computing servers based on the ideal lattice. Compared with many current authentication key exchange protocols based on ideal lattice, the present invention requires less transmission bandwidth, and is highly efficient and safe.

[0061] The present invention uses the technology of symmetric key consensus (Key Consensus with Noise, OKCN) and asymmetric key harmony (Asymmetric Key Consensus with Noise, ACKN) proposed by Zhao et al. The OKCN and AKCN algorithms are briefly introduced below.

[0062] In the algorithm OKCN, params=(q, m, g, d, aux) is the algorithm parameter, where q, m, g, d are positive integers, and satisfy m≤2, g≤q, aux=(q', α, β) Specifically, q'=lcm(q,m), lcm( ) is the function of taking the least common multiple,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for implementing the efficient and safe transmission of data between cloud computing servers, and the method comprises the following steps: S1, protocol creating: enabling a system to select Rq=Zq[x]/(xn+1) as a quotient ring with the modulus being a positive integer, selecting a Gaussian distribution Chi*alpha with the standard deviation alpha on Zn and the mean value 0, selecting expressions (shown in the description) as an anti-collision hash function and defining a common parameter pp=(Rq, a, q, H, Chi*alpha), wherein n is a positive integer which is the positive integer power of 2; S2, static key pair generation: transmitting data between a server A<^> and a server B<^>, enabling the servers to generate respective static key pairs (shown in the description) through a secret key generation algorithm; S3, protocol execution: enabling a cloud computing server A<^> and the server B<^> to execute a protocol to finally obtain a shared session key (shownin the description) through negotiation; S4, data transmission: enabling the cloud computing server A<^> and the server B<^> to execute encrypted transmission of communication information through thegenerated session key (shown in the description) and a symmetric encryption algorithm. The method improves the safety through employing ACKN exchange and element encryption transmission while reducingbandwidth, and achieves the dual implicit authentication.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for realizing efficient and safe data transmission between cloud computing servers. Background technique [0002] The concept of "cloud computing" was first proposed at the 2006 Search Engine Conference. Cloud computing, as a new service-oriented computing model, soon became the focus of academic and business circles after it was proposed, and its development has also attracted worldwide attention. Today, cloud computing services have been widely used in people's daily life, study and production. In the popularization and development of cloud computing, the most concerned issue is the security of cloud computing services. [0003] Cloud services involve the transmission of large volumes of data, and large amounts of data also need to be transmitted between cloud service servers. Two subjects in the cloud want to carry out secure data transmission, and data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L9/00H04L29/06
CPCH04L9/002H04L9/0631H04L9/0643H04L9/0816H04L9/0838H04L9/0841H04L63/0435
Inventor 杨景添王立斌
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products