Privacy protection encrypted data query method based on fog assistance

A technology for privacy protection and encrypted data, which is applied in digital data protection, homomorphic encryption communication, and other database retrieval, etc. It can solve the problems of communication overhead, increased computing overhead, reduced service quality, and increased data processing difficulty, etc., to achieve The effect of reducing certification pressure and improving query efficiency

Active Publication Date: 2019-12-20
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve this problem, usually LP can encrypt the original data, and then outsource the encrypted data to the cloud server, but this will reduce the operability of the data and increase the difficulty of data processing
In addition, when a large number of query requests are connected to the cloud server at the same time, the cloud server needs to perform a large number of connection establishment operations and a large number of authentication operations, which will undoubtedly increase the communication overhead and calculation overhead of the cloud server, and reduce service quality.
[0003] In addition, the existing methods of encrypting data usually use order-preserving encryption. In the outsourcing environment of Internet of Vehicles data, it is difficult to solve the problem of data being processed on the cloud server at one time, and this encryption method is difficult to resist known plaintext attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection encrypted data query method based on fog assistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0042] Such as figure 1 As shown, the fog-assisted privacy protection encrypted data query method includes the following steps:

[0043] S1. Based on the data owner, build a data query system by building an R tree, building a cloud server and a fog device;

[0044] S2. The user generates a query area and sends a query request to the fog device;

[0045] S3. Aggregate user requests through the fog device, and forward the ag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection encrypted data query method based on fog assistance, and the method comprises the following steps: S1, building an R tree, a cloud server and fog equipmentbased on a data owner, and building a data query system; s2, enabling the user to generate a query area and send a query request to the fog device; s3, aggregating the user requests through fog equipment, and forwarding the aggregated user query requests to a cloud server; and S4, finding leaf nodes with overlap according to the overlap of the query area SR in the user query request and the minimum bounding rectangle corresponding to the nodes in the R tree, and querying data points contained in the query area SR in the leaf nodes with overlap. According to the invention, a light data outsourcing privacy protection structure is constructed, and the data privacy of a data owner and the query privacy of a user are protected under the structure.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a fog-assisted privacy protection encrypted data query method. Background technique [0002] The existing data outsourcing framework mainly includes vehicle users, LP (data owner), and cloud servers. Since the cloud server can directly process LP data and the cloud server is not completely reliable, if the LP does not process the data, directly asking the cloud server to query the location service will undoubtedly bring about the risk of data privacy leakage. In order to solve this problem, usually LP can encrypt the original data, and then outsource the encrypted data to the cloud server, but this will reduce the operability of the data and increase the difficulty of data processing. In addition, when a large number of query requests are connected to the cloud server at the same time, the cloud server needs to perform a large number of connection establishment operations and a la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06H04L29/08G06F16/901G06F21/60G06F21/62
CPCH04L9/008H04L9/0861H04L63/0442H04L63/0823H04L67/10G06F21/602G06F21/6227G06F16/9027H04L67/60H04L67/63
Inventor 廖丹严鑫李慧张明李玉娟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products