Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Equivalent query method for lightweight privacy protection

A technology of privacy protection and query method, which is applied in the direction of public keys for secure communication, digital transmission systems, electrical components, etc., and can solve problems such as potential safety hazards

Active Publication Date: 2020-03-27
NORTHEASTERN UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the defects in the above-mentioned background technology and the hidden safety problems caused by it, the present invention aims to provide a light-weight privacy-protected equivalent query method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equivalent query method for lightweight privacy protection
  • Equivalent query method for lightweight privacy protection
  • Equivalent query method for lightweight privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, so as to make the technical features and advantages of the present invention more obvious.

[0054] A light-weight privacy-preserving equivalent query method such as figure 1 As shown, there are four roles including key center, IoT device, edge server, and authorized user:

[0055] Key center: a trusted entity, mainly responsible for the generation and distribution of public parameters and keys, including master keys, keys of data owners and users, computing keys of edge nodes, etc. These processes are performed offline;

[0056] IoT device: a semi-trusted entity. Each device not only has sensing capabilities, but also has communication capabilities. It can be regarded as a data owner, directly contacts with the data source, encrypts the data locally, and then outsources the ciphertext data to nearby edge servers;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an equivalent query method for lightweight privacy protection, which comprises four roles, namely a key center, IoT equipment, an edge server and an authorized user. The secret key center executes initialization operation, public parameters are disclosed, and a main secret key is stored by the secret key center; the secret key center executes a secret key generation operation, generates a secret key and distributes the secret key to other roles; the IoT equipment encrypts own data and then outsources the encrypted data to the edge server; the edge server re-encrypts the data and then stores the data; the authorized user sends a query request to the edge server; the edge server returns a query result in response to the query request; and finally, the authorized userdecrypts the query result returned by the server to obtain plaintext data. According to the method, proxy re-encryption is realized based on elliptic curve cryptography, and an efficient and safe query scheme in edge computing is effectively constructed. Compared with the prior art, the privacy of outsourcing data can be guaranteed, meanwhile, the calculation expenditure in the encryption and decryption process is reduced, and the method is more suitable for edge equipment with weak calculation and storage capacity.

Description

technical field [0001] The technology relates to the field of network security, in particular to a lightweight privacy-protected equivalent query method. Background technique [0002] With the development of cloud computing and the popularization of Internet of Things applications, a large number of sensing devices have exploded, such as smartphones, wearable devices, smart home appliances, etc., which generate a large amount of sensing data from the physical world. According to the Cisco Global Cloud Index (GCI), the data generated by IoT devices, personnel, and machines will exceed 500ZB by 2020. Although traditional centralized cloud computing can use its powerful computing power to process large amounts of data, network congestion and delay may occur for some sensitive data that needs to be processed in real time. The emergence of edge computing has solved this problem very well. In edge computing, most of the computation is done close to the source of the data. Edge ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L9/3066H04L63/0435H04L63/0807H04L63/083H04L63/105
Inventor 周福才吴淇毓冯达李鲍
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products