Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for securely sharing heterogeneous cross-trust domain encrypted state data

A data security and trust domain technology, applied in the field of heterogeneous cross-trust domain confidential data security sharing methods and systems, can solve the problems of inability to retrieve a large number of users, no solutions, and inability to implement retrieval strategies, and achieves safety, efficiency and security. Share and improve the efficiency of storage and computing

Active Publication Date: 2021-10-08
TONGJI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, many SE schemes only support single-user retrieval, and cannot face the retrieval scenarios of a large number of users in a cross-trust domain environment, and the retrieval strategies of many existing SE schemes only support simple exact equality or AND gate matching, which cannot achieve flexible retrieval. Strategy
[0015] At the same time, most SE solutions are considered in a centralized environment. There is no effective solution for how to achieve flexible and efficient searchable ciphertext retrieval services in a distributed environment without a fully trusted authorization center.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for securely sharing heterogeneous cross-trust domain encrypted state data
  • A method and system for securely sharing heterogeneous cross-trust domain encrypted state data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0044] This application specifically solves: S1) realizing data owner-side access authorization based on heterogeneous cross-trust domain identity attribute certification; S2) constructing cross-domain encrypted keyword retrieval based on smart contracts to realize on-demand interest ciphertext subscription of data visitors ; S3) The online / offline encryption phase segmentation in the distributed environment is used to realize the lightweight data sharing mechanism of the client.

[0045] Among them, S1 uses the distributed and decentralized storage system IPFS to actually store ciphe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and system for securely sharing heterogeneous cross-trust domain encrypted data, which implements flexible access control by introducing an attribute-based encryption strategy in a non-centered environment, and realizes keyword retrieval of ciphertexts based on encrypted indexes and smart contracts. Segment real data storage and data address storage on the blockchain to reduce the storage overhead of the blockchain, and realize data security sharing services based on identity attributes and keyword ciphertext retrieval. Compared with the prior art, the present invention realizes a distributed decentralized security data sharing mechanism through the decentralized P2P storage system IPFS and block chain technology.

Description

technical field [0001] The invention relates to a method for securely sharing encrypted state data, in particular to a method and system for safely sharing heterogeneous cross-trust domain encrypted state data. Background technique [0002] With the development of Internet technology, cloud storage has become an important business service model that people need in their daily life. [0003] Cloud storage technology can provide users with various storage services, so that users (enterprises and individuals) can access network resources and share data anytime and anywhere. [0004] However, since the cloud service provider is not completely trustworthy, and the data stored in the cloud is actually out of the user's physical control, how to ensure the privacy and security of user data and how to ensure that users can smoothly access the required data become One of the important issues that need to be faced in the development of cloud storage. [0005] At the same time, the ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0435H04L63/06H04L63/0807H04L63/10H04L63/20H04L67/1097
Inventor 谭成翔徐潜朱文烨校娅
Owner TONGJI UNIV