Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection big data processing method and system supporting flexible access control

A technology for big data processing and privacy protection, applied in electrical digital data processing, digital transmission systems, transmission systems, etc., can solve high computing overhead and communication overhead, excessive interaction overhead and computing overhead, complex data processing and analysis, etc. question

Active Publication Date: 2019-08-20
XIDIAN UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Difficulty in division of encrypted data in the prior art: Outsourcing of encrypted data can prevent privacy data from leaking, but at the same time it also complicates data processing and analysis; existing homomorphic encryption algorithms used for outsourcing of private data have modulo operations Increased the difficulty of implementing privacy-preserving division operations
Although fully homomorphic encryption supports division operations on ciphertexts, it introduces high computational and communication overhead
In addition, the existing division operation schemes that implement safe division through operation conversion or bit decomposition lead to excessive interaction and calculation overhead between the two entities
[0009] (2) The problem of fine-grained access control of the result of the division operation in the prior art: flexible access control to the result of the ciphertext calculation can enhance data security and privacy
The previous scheme solved the seven basic operation problems of encrypted data and flexible access control, but it still cannot provide a method for flexible access control of the division ciphertext calculation result of large integers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection big data processing method and system supporting flexible access control
  • Privacy protection big data processing method and system supporting flexible access control
  • Privacy protection big data processing method and system supporting flexible access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0090] The traditional homomorphic encryption algorithm does not support the ciphertext division calculation of large integers; the existing encryption data division operation realized by the conversion operation makes the calculation overhead and the interaction overhead between entities too large; it does not support the ciphertext calculation of the encrypted data division The result is a problem of fine-grained access control. The present invention proposes a new scheme based on the homomorphic encryption algorithm to effectively realize the division operation of encrypted large integers; realizes fine-grained acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud computing data processing, and discloses a privacy protection big data division analysis processing method and system supporting flexible access control. The privacy protection big data division analysis processing method includes the steps that: a DP calls an encryption algorithm EncTK to encrypt molecules and denominators and then uploads theencrypted molecules and denominators to a cloud server; a DSP selects a random number to execute a preprocessing operation to hide the original data, calls a PDec1 decryption algorithm to partially decrypt and sends another obtained encrypted data packet to a CP; after receiving the data packet, the CP calls a PDec2 algorithm to decrypt and calculate to obtain an intermediate result, encrypts theintermediate result by using a public key generated by a data requester or an ABE algorithm and sends the intermediate result to the DSP; the DSP removes random disturbance added to the ciphertext byusing an addition homomorphic property to obtain a final ciphertext result; and a DR decrypts access data. According to the privacy protection big data division analysis processing method, division operation can be directly executed without operation conversion, so that the calculation efficiency is ensured; and, four different data processing schemes are designed to adapt to more application scenarios, and fine-grained access control of the user on a processing result is achieved.

Description

Technical field [0001] The invention belongs to the technical field of cloud computing data processing, and in particular relates to a privacy protection big data processing method and system supporting flexible access control. Background technique [0002] At present, the closest existing technology: cloud computing can use a large number of resources and powerful computing capabilities in the network to provide cloud users with a variety of services (for example, data storage and massive data analysis), while outsourcing computing is used as cloud computing One of the service modes of, which greatly facilitates users and devices with limited local resources. However, outsourcing personal data to cloud servers makes cloud users lose complete control over the data, and cloud servers, as an incompletely trusted entity, may threaten users' data privacy and security. Therefore, cloud users tend to encrypt private data before uploading to the cloud server for calculation processing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/00H04L9/08
CPCG06F21/6254H04L9/0816H04L9/008H04L9/0869
Inventor 丁文秀闫峥胡蕊钱薪任
Owner XIDIAN UNIV