Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy protection control method for a fog computing medical system

A medical system and privacy protection technology, applied in the field of network information security, can solve problems such as user privacy threats

Active Publication Date: 2019-05-10
上海闵行虹桥医院有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large number of unstable connections in the fog computing medical system, the system not only provides rich and convenient functions, but also poses a huge threat to the privacy of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection control method for a fog computing medical system
  • A privacy protection control method for a fog computing medical system
  • A privacy protection control method for a fog computing medical system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with the accompanying drawings and examples.

[0043] Architecture of the present invention:

[0044] Attributes: Attributes refer to certain characteristics of users of the medical system, such as gender, age, medical history, etc., and attributes are represented by att j Indicates that j is the unique index number of each attribute.

[0045] Attribute set: a set composed of attributes, in this method there are global attribute set Ω, local attribute set Ω i And user attribute set S three types of attribute sets. The global attribute set Ω contains all attributes of all users in the fog computing medical device; the local attribute set Ω i Contains a medical system fog device A i The managed attributes, where i represents the level of the fog device of the medical system, satisfy i≥1; the user attribute set S includes all the attributes of a medical system user.

[0046] Access strategy: a stra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method for a fog computing medical system, which adopts a hierarchical attribute encryption method to disperse the authority of attribute authority and computing load and improve the expandability of the authority and computing load, so that the authority and computing load are suitable for a dynamically changing fog computing environment; secondly, performing encryption processing on the privacy information of the user; in the encryption process, a ciphertext fixed length technology is used for generating a ciphertext with a constant length; on thebasis, modifying a key generation algorithm by utilizing an outsourcing decryption technology; firstly, an original private key is output; when requesting to decrypt, the user outputs a conversion private key and an Elgmal type key by using a key conversion algorithm; wherein the conversion private key is submitted to the decryption server, the Elagamal type private key is stored by a user, the decryption server starts a ciphertext conversion algorithm, the ciphertext is converted into the Elagamal type ciphertext by using the conversion private key, and finally, the user can recover the plaintext only through one time of multiplication.

Description

technical field [0001] The invention relates to a privacy protection control method, in particular to a privacy protection control method for a fog computing medical system, and belongs to the field of network information security. Background technique [0002] Fog computing medical system is a health service based on fog computing, which facilitates patients and doctors to upload, access, analyze and use various health information anytime and anywhere, such as user's physical state prediction, disease prevention, medical history analysis, medication analysis and other functions . Its predecessor is a medical system based on cloud computing, and its overly centralized system settings make the exchange of medical information often accompanied by huge transmission delays, resulting in unsatisfactory service quality. Using fog computing technology, routers, sensor nodes, smart wearable devices and other devices located between the cloud and medical users can be endowed with co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62H04L29/06
Inventor 顾振飞王璇陈凡袁小燕姜浩东丁一
Owner 上海闵行虹桥医院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products