Privacy protection method and system supporting range query in data-as-a-service mode

A data service and service model technology, applied in the field of data security, can solve problems such as high space requirements, consumption of computing resources, and high complexity, and achieve the effects of safe data management, data privacy security, and good time efficiency

Active Publication Date: 2019-10-25
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has already been implemented by algorithms, and related algorithms include OPE and OPES. However, the above method is time-consuming, and the complexity is high when inserting new data, which will consume more computing resources.
The method of bucketing is to divide the data range into several discrete intervals, and assign an identifier to each bucket. In an ideal state, if each bucket has at most one data, there will be no false hits in the query, but In actual situations, data is often not evenly distributed, and queries often have false hits
In terms of data verification technology, the current technology generally uses Merkle hash tree for verification. This method is difficult for multi-dimensional data verification and has relatively high space requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and system supporting range query in data-as-a-service mode
  • Privacy protection method and system supporting range query in data-as-a-service mode
  • Privacy protection method and system supporting range query in data-as-a-service mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The main technical points of the present invention include core steps such as value domain division, obtaining hash index, calculating hash signature chain, submitting, querying and verifying data. figure 2 It is an overall schematic flowchart of the solution of the present invention, which is mainly divided into three parts, data organizer, data service provider, and data user. These three parts can also be called data organization end, data server end and data use end respectively. The implementation of each part is described in detail below.

[0040] 1. Value range division.

[0041] The data organizer sets the value range of the index item of the query to be established as U, divides it into N intervals according to its distribution, and assigns an identifier id to each interval i . This identifier can uniquely match a range, and the mapping relationship between each range and its identifier is used as a part of the codebook, and the codebook is owned by the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a privacy protection method and a system for supporting range query in a data-as-a-service mode. In a data-as-service management mode, a security policy of a data service provider may not be complete, and a data owner does not trust the security policy completely. Under the environment, designing of a mechanism which can be complete is necessary, can ensure data privacy security and is relatively efficient in data query. Existing data, namely a service management mode, have the risks of low time efficiency and privacy information attack. The invention provides a complete scheme which is private and safe and supports range query and data verification, and the core of the scheme is that indexes are obtained by partitioning data and adopting a hash function partial sum mode on the data in the same partition; in order to avoid false hit data and data verification during range query, query precision and a verification matrix are introduced. Through experimental verification, the method has good time efficiency, and data information leakage can be well reduced.

Description

technical field [0001] The invention belongs to the technical field of data security such as data management and privacy protection, and specifically designs a data-as-a-service (DaaS) data management mode that ensures user privacy and security. Background technique [0002] Data as a Service (DaaS) is already a data management model in the era of cloud computing. Data organizers obtain on-demand data storage services by purchasing services. By placing storage tasks in the cloud, they can reduce enterprise costs and increase data management capabilities. However, data privacy security has become an issue that data organizers must consider. At present, the leakage of user privacy has caused serious social problems. [0003] In the user privacy protection technology, the first is to set up a reasonable access authority mechanism, and illegal identities cannot obtain data access authority. The second is to implement data encryption technology, encrypt and store key data or al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64
CPCG06F21/6245G06F21/64G06F2221/2107
Inventor 吴广君王勇王振宇李军
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products