Data authorization deterministic update method based on proxy re-encryption for cloud

A proxy re-encryption and data authorization technology is applied in the field of data authorization management and deterministic update based on proxy re-encryption in the cloud. burden effect

Active Publication Date: 2018-09-28
NANJING UNIV OF SCI & TECH
View PDF10 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to an increase in the amount of computing at the user end, which brings a large amount of computing burden to the cloud...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authorization deterministic update method based on proxy re-encryption for cloud
  • Data authorization deterministic update method based on proxy re-encryption for cloud
  • Data authorization deterministic update method based on proxy re-encryption for cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0086] figure 1 It is the system model diagram of the present embodiment, wherein:

[0087] Data creator A: Create the accessed data m, and perform security processing such as encryption on it, and finally share the data through the cloud server, and manage the authorized scope of the data at the same time.

[0088] Data sharing user B: Apply for access to the message M, obtain the data through the cloud server and decrypt it, and finally realize the acquisition of data or services.

[0089] KGC server: Initialize re-encryption parameters for users and generate public-private key pairs.

[0090] RKM server: used to store proxy re-encryption key parameters and also decryption key parameters. The server interacts with the data creator and achieves deterministic changes in authorization through parameter management;

[0091] RKG server: used to generate the proxy re-encryption key, which requires the user's initialization parameters and the parameters stored in RKM to jointly g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data authorization deterministic update method based on proxy re-encryption for a cloud. The method is realized based on a system model, and the system model comprises a KGCserver, an RKM server, an RKG server and an RE-Enc server; the method comprises the following steps of establishing a system; creating data; generating proxy re-encryption key parameters; generatingciphertext data with authorization information; obtaining the ciphertext data; carrying out re-encryption ciphertext decryption by a user; and updating authorization deterministic. According to the method, the proxy re-encryption is introduced into the cloud data sharing and authorization update, and authorization management of the data is carried out by managing a re-encryption key; and the key management difficulty and the calculation amount of the user during data sharing and authorization management are reduced, and meanwhile, the re-encryption key is segmented and managed, and the deterministic update of the key is realized when the authorization is changed.

Description

technical field [0001] The invention relates to ciphertext data authorization management technology, in particular to a data authorization management and deterministic update method based on proxy re-encryption in the cloud. Background technique [0002] Cloud computing meets people's needs for data sharing with abundant resources and powerful computing capabilities. More and more network users obtain services such as software, platforms, and infrastructure through the cloud. Users host data to the cloud for data storage, processing and sharing. The cloud provides users with convenient data usage methods, but also brings many challenges to the security of user data: 1) How to ensure the confidentiality and integrity of hosted data sex. 2) How to ensure the effectiveness of the user data access control strategy. 3) How to ensure the certainty of updating data access authorization. [0003] Aiming at the confidentiality and integrity of data, a cloud ciphertext access contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/085H04L9/0861H04L9/0894H04L63/0428H04L67/10
Inventor 苏铓汪良辰俞研付安民王永利张功萱
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products