A Privacy-Preserving Resource Allocation Method in Fog Computing

A technology for resource allocation and privacy protection, which is applied in the field of resource allocation to protect privacy and can solve problems such as metadata leakage from terminal devices.

Active Publication Date: 2021-05-07
EAST CHINA NORMAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Metadata may be leaked to end devices without any protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Resource Allocation Method in Fog Computing
  • A Privacy-Preserving Resource Allocation Method in Fog Computing
  • A Privacy-Preserving Resource Allocation Method in Fog Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The privacy-protecting resource allocation method in fog computing of the present invention includes the following entities: a terminal device, a fog node, a mechanism for generating and distributing system parameters, that is, a trusted organization TA, an intelligent gateway, and a cloud server; the method includes the following steps:

[0025] (1) Initialization

[0026] Input a security parameter p, TA selects two cyclic multiplication groups whose order is a prime number q according to p and The generator of is g, and there is a bilinear map bilinear map satisfy the following properties:

[0027] Bilinear: for any is a quotient group of order q with established;

[0028] Non-degenerate: present satisfy not equal to 1;

[0029] Computability: There exists an efficient algorithm for can be calculated

[0030] TA randomly selects as the master key of the system; compute y=g η ; Select the cryptographic hash function H, public system parame...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy-protecting resource allocation method in fog computing. The method includes initialization, registration, group generation, keyword generation, message encapsulation, test authorization, and resource allocation. Aiming at the deficiencies of the existing resource allocation methods in fog computing, the present invention provides a privacy-protecting resource allocation method, which can still ensure the privacy of data when the gateway is malicious or tampered with, and the fog nodes Even if the private key of the private key is leaked, no metadata information will be leaked. The invention satisfies the characteristics of high efficiency, robustness and the like.

Description

technical field [0001] The invention belongs to the fields of fog computing, resource allocation and information security, and in particular relates to a resource allocation method for protecting privacy in fog computing. Background technique [0002] The Internet of Things (IoT) is an efficient framework that enables message exchange between various end devices. With the rapid development of the Internet of Things, various IoT devices generate huge amounts of data every day. Cloud computing is a promising platform to process the data generated by these IoT devices. It flexibly allocates the required resources according to the needs of end users. However, with the rapid growth of IoT devices, traditional cloud-based approaches may not be able to serve end users adequately in the future. Furthermore, for those delay-sensitive applications, due to factors such as the limitation of network bandwidth and the remote geographical location between the traditional cloud and a cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14H04L12/911H04L29/06
CPCH04L9/0863H04L9/0869H04L9/14H04L12/66H04L47/70H04L63/0428
Inventor 张磊黄志刚李江涛
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products