Unlock instant, AI-driven research and patent intelligence for your innovation.

Batch resource sharing method for untrusted cloud centers based on exclusive OR operation and chaos

A resource sharing and resource technology, applied in the field of cloud security, can solve problems such as increased difficulty of key management, reduce the possibility of guessing and cracking, and reduce the difficulty of key management

Inactive Publication Date: 2019-02-01
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, if batch resources are shared, one resource corresponds to one decryption key, which will also increase the difficulty of key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch resource sharing method for untrusted cloud centers based on exclusive OR operation and chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Client A shares batch resources with client B by using an algorithm based on XOR encryption and chaos theory. The batch resources are the string "ab" and the string "cd" respectively.

[0045] A method for sharing resources in batches in an untrustworthy cloud center based on XOR operation and chaos, comprising the following steps:

[0046] 1. Client A encrypts batch resources [S 1 ,S 2 ], and upload to the cloud center

[0047] Client A maps the shared string resource to a numeric array S 1 = {0x61,0x62}, S 2 ={0x63,0x64}, the mapping method is to take the ascii code of the string and convert it to hexadecimal;

[0048] 1.1: Client A is the batch resource [S 1 ,S 2 ] to generate the corresponding initial key as [k 11 ,k 12 ],k 11 =(M=0x8b3c, u=3.5699457, x=0.5, n=16), k 12=(M=0x497f, u=3.5699457, x=0.5, n=16), where u, x, n are random numbers, the value range of u is 3.5699456=1, M is a randomly generated bit string of n bits;

[0049] 1.2 Client A calls the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an untrusted cloud center batch resource sharing method based on exclusive OR operation and chaos. Client A encrypts the resource Si with the initial key k1i, and then uploadsthe encrypted resource to the cloud center. When the client A creates a target key k2, the process key is calculated according to the initial key and the target key k2. Client A uses an asymmetric keyencryption algorithm to obtain the encrypted key PBK; The client A sends the process key and the PBK to the cloud center. The cloud center records a resource sharing list; The cloud center queries the resource sharing list, and sends the key PBK corresponding to the batch resource to the client B. After obtaining the PBK and the encrypted resource from the cloud center, the client B decrypts thePBK with its own private key to obtain the target key k2, and decrypts the target key k2 to obtain the decrypted shared resource. The invention solves the problem of high algorithm complexity and highclient pressure when encrypting resource sharing.

Description

technical field [0001] The invention relates to an encrypted resource sharing method of an untrustworthy cloud, in particular to a batch resource sharing method of an untrustworthy cloud center based on XOR operation and chaos, and belongs to the field of cloud security. Background technique [0002] For resource sharing, the encrypted secret key needs to be informed to the shareees. As the number of people to be shared increases, the possibility of the secret key leaking increases. At the same time, the person who has the secret key has the ability to modify the original text, which is insufficient in security. [0003] A more reasonable approach is to use only one unique symmetric key Key for the encryption of the original document, and only one encrypted resource on the server. When resources need to be shared, the document key Key is encrypted with the public key of the target party and uploaded to the server. After obtaining it, the target party decrypts it with its own...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/50H04L9/00H04L9/08
CPCG06F9/5005H04L9/001H04L9/083
Inventor 李拥军陈英祺谢嵘邹少聪潘宇聪
Owner SOUTH CHINA UNIV OF TECH