A block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption

A technology of proxy re-encryption and blockchain, which is applied in the field of information security storage and sharing in cloud systems, and can solve problems such as service interruption, high computing cost, and information loss

Active Publication Date: 2019-01-11
南方电网互联网服务有限公司
View PDF8 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under the random oracle model, Liang et al. proved the key policy-based attribute agent re-encryption model that supports keyword retrieval, but the calculation cost of this invention is relatively high
All the studies proposed above adopt a centralized management model. All user information is concentrated in the resource pool. The third-party CSP uses specific software to enforce unified management of information. Once the software and hardware of the CSP fail or are attacked, it may be destroyed. Cause information loss, leakage, or even service interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption
  • A block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption
  • A block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] Example 1. Example process of contract user information interaction in the present invention.

[0101] 1) Alan, the information owner, sends a storage request, and at the same time submits an information quotation and a custom random string so that users can obtain information sharing rewards.

[0102] 2) The transmission leader node T in the cluster to the crowd node T in its own cluster n Broadcast authentication information and validity of user identity. If it is valid, the transmission leader node T will extract the data and temporarily store it in its own log; if it is invalid, it will feedback "illegal user".

[0103] 3) Transfer the leader node T to all the crowd nodes T in the cluster n Copy the information and wait for the response. After confirming that at least half of the nodes in the cluster have received the information, confirm to the information owner Alan that the information has been received. Once the user receives the confirmation information, it ...

Embodiment 2

[0110] Example 2. Information interaction smart contract execution process.

[0111] A large number of users and information are designed in the present invention. In order to facilitate transaction processing, it is divided into the following stages in chronological order: contract release, transaction release, authority review, security check, and transaction settlement. combine Figure 4 The specific expression is as follows:

[0112] 1) Formulate the contract: The contract creator uses a high-level language to convert the contract with the user attribute collection feature into a binary contract code, records it in the local network, and calls all local users to sign the contract. After the node confirms the signature, it passes the ether The Fang virtual machine is deployed in the Ethereum blockchain, and feeds back the contract address and calling instructions to the user.

[0113] 2) Release transaction: Alan, the information owner, stores metadata Data→{LC,w,IN} acc...

Embodiment 3

[0117] Example 3. Safety analysis of the present invention.

[0118] a) Security proof of information exchange:

[0119] The present invention is based on the q-parallel BDHE difficulty problem for security proof, and judges the bilinear difficulty problem. If the assumption is true, the adversary under the random oracle model The advantages Neglecting it means that the invention chooses plaintext security (CPA, Chosen Plaintext Attack).

[0120] Theorem 1 If the advantage of the present invention in solving the q-parallel BDHE problem is negligible, then it is said that the q-parallel BDHE hypothesis is in (G, G T ) is established, the invention is CPA safe under the random oracle model.

[0121] Prove the assumption that there exists an attacker In the CPA game, its advantages It cannot be ignored that the adversary wins the security game. then construct a game challenger If there is an attacker To break the CPA under the security model with an advantage of ξ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption is provided. On the basis of proxy re-encryption and attribute-based encryption technology, the invention proposes a block chain ciphertext storage sharing idea based on attribute proxy re-encryption for keyword retrieval. The metadata ciphertext is stored separately from the original information ciphertext by the attribute proxy re-encryption algorithm, the pool verification pool mechanism of block chain technology is used to determine the bookkeeping weight of the node, the information interaction contract is introduced to audit the identity of the user, and the transaction cost is automatically cleared. The security and the experimental analysis show that the invention shortens the encryption and decryption time, and reduces the high-frequency access pressure of the cloud memory. When the number of attributes is 100, the time consuming of re-encryption and decryption is 1.69 s, and the efficiency of the system is improved by 19.04%-49.68%. The method has stronger anti-collusion aggression, and has good application prospect in the field of internet of things.

Description

technical field [0001] The invention belongs to cryptography technology and smart contract technology in the field of block chain technology, and relates to a method for solving the problem of safe storage and sharing of information in a cloud system. Background technique [0002] With the rapid development of cloud computing and Internet of Things (IOT) technologies, cloud storage has become the most commonly used network storage service. At present, cloud storage sharing systems are mostly centralized, and personal information is managed with the help of a third-party cloud service provider (Cloud Service Provider, CSP), but this method not only requires a large amount of communication overhead, high computing costs, Moreover, the openness and transparency of the Internet of Things poses serious threats to the integrity, accuracy, and confidentiality of information. [0003] In order to better ensure information security and integrity, Hong et al. designed a hybrid cloud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/13G06F21/60H04L29/06H04L29/08
CPCG06F21/602H04L63/0428H04L63/08H04L67/1097
Inventor 张小红孙岚岚
Owner 南方电网互联网服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products