Unlock instant, AI-driven research and patent intelligence for your innovation.

A data sharing method, system, device and computer-readable storage medium

A data sharing and computer technology, applied in the direction of digital transmission system, transmission system, user identity/authority verification, etc., can solve the problem of inability to guarantee user identity and attribute privacy security, inapplicable multi-to-pair group data sharing, and reduce user end Calculations etc.

Active Publication Date: 2021-07-06
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme can realize flexible access control and user identity query, etc., and has good security, but the calculation amount and complexity of the user end are relatively large
2. A sharing method with a delegation function, which delegates part of the encryption and decryption to the private cloud, thereby reducing the amount of calculation on the client side, but cannot guarantee the privacy and security of user identity and attributes
3. A scheme that outsources ABE's computationally intensive access control operations to a shared cloud, thereby reducing the computational burden on the client side and enabling fine-grained access control, but this scheme is not suitable for multi-to-pair group data shared
4. A balanced symmetric incomplete block design (SBIBD), which uses two rounds of key negotiation to achieve the security of group data sharing in the cloud. Group users use their own key pairs to negotiate a private key that can be shared by all users. The public key to decrypt the ciphertext allows some users to be offline. This scheme is suitable for group data sharing, but the user needs to perform a large number of bilinear and point multiplication operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data sharing method, system, device and computer-readable storage medium
  • A data sharing method, system, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The core of the present application is to provide a data sharing method, which can reduce the calculation amount of the user terminal when implementing user data security and fine-grained access control of shared data. Another core of the present application is to provide a data sharing system, device and computer-readable storage medium.

[0045] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data sharing method provided by this application includes: after the private cloud receives the user's attribute value, it judges whether the attribute value matches the access control tree in the private cloud; if so, then uses a signature algorithm to perform a signature operation on the attribute value Obtain the signature attribute value, and send the signature attribute value to the public cloud; the public cloud sends the ciphertext file corresponding to the signature attribute value to the user after verifying the signature attribute value with the verification signature algorithm. This method outsources the signature operation and the signature attribute value verification corresponding to the ciphertext file to the hybrid cloud, that is, the private cloud performs the signature operation, and the public cloud performs the signature attribute value verification, which can realize user data security and fine-grained access control of shared data. , reduce the amount of computation on the client side. The present application also provides a data sharing system, equipment, and computer-readable storage medium, all of which have the above-mentioned beneficial effects.

Description

technical field [0001] The present application relates to the field of user data security in cloud storage, and in particular to a data sharing method, system, device, and computer-readable storage medium. Background technique [0002] Hybrid cloud has the dual characteristics of a large amount of data storage space in public cloud and more secure and reliable private cloud. Therefore, hybrid cloud is accepted by many companies and has a wide range of practical application markets. With cloud storage services, companies allow their employees to store and share data anytime and anywhere in order to reduce management burden and save operation and maintenance costs. However, due to the separation of data ownership and management rights, cloud service providers are not completely trustworthy, and there are several problems in using cloud storage services for group user data sharing. First, due to the limited computing power of the client in the group users, the sharing and acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L63/08H04L63/10H04L67/06
Inventor 凌捷梁有懿谢锐孙宇平
Owner GUANGDONG UNIV OF TECH