Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Time domain-based encryption and strategy updating method for edge environment

An encryption method and time domain technology, applied in the field of ciphertext policy attribute base encryption method and policy update field, can solve the problems of system crash and long distribution time for obtaining a private key, and achieve the effect of reducing computational pressure

Inactive Publication Date: 2020-03-27
HANGZHOU DIANZI UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So this structure will undoubtedly cause some problems
First of all, it has a performance bottleneck. If a large number of users send a private key distribution request to an authority at the same time, the time for these users to obtain the private key will be much longer than the average private key distribution time.
Secondly, there is also a single point of failure in security, since this authority knows the private parameters of all attributes, when it suffers malicious intrusion, the attacker can make any private key he wants, causing the whole system to crash

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time domain-based encryption and strategy updating method for edge environment
  • Time domain-based encryption and strategy updating method for edge environment
  • Time domain-based encryption and strategy updating method for edge environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Such as figure 1 As shown, the components of the present invention include:

[0081] Central Authority (CA): CA is a trusted participant. It is not responsible for distributing any attribute public and private keys, but only responsible for the setting of system public parameters and the registration of users and attribute authorities.

[0082] Cloud: Cloud provides the function of permanently storing the ciphertext for all users in the system, and is also responsible for distributing the updated secret key of the old ciphertext to all storage nodes that have cached the old ciphertext. In this patent, it is assumed that it is semi-honest, that is, it will correctly execute the request sent by the user or edge node, but will be curious about the content of the user's stored information.

[0083] Attribute Authority (AA): Each AA will be assigned a set of attributes in its domain. These attributes can exist in two states, general attributes and time attributes. AA is responsib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a time domain-based encryption and strategy updating method for an edge environment. The method specifically comprises a system initialization process, a user registration process, a data encryption process, a user private key generation process and a ciphertext decryption process. Considering that time is an important factor in practical application, time information is added into an attribute-based encryption method, so that data access control can be more flexible. And secondly, due to the distributed computing and storage resource structure of the edge computing, the architecture of a multi-authorization mechanism and the characteristics of outsourcing decryption can be matched, the computing pressure of the terminal equipment is well shared, the energy loss ofthe equipment is reduced, and the attribute-based encryption system is safer and more reliable. The invention further provides an efficient dynamic strategy updating method, so that a data owner doesnot need to redeem the ciphertext from the network and then encrypt and publish the ciphertext again, the old ciphertext can be updated, and the confidentiality of the data is ensured.

Description

Technical field [0001] The invention relates to the technical field of computer information security, in particular to a ciphertext strategy attribute-based encryption method for data collection and sharing in an edge computing environment and a strategy update method thereof. Background technique [0002] With the development of the Internet of Things and the popularization of 5G networks, there will be more and more terminal devices scattered at the edge of the network, and these devices will generate massive amounts of data and bring new computing and security challenges. In addition, more and more user demands have promoted the development of complex applications and services with low latency, such as augmented reality, virtual reality, intelligent transportation and smart cities. In order to meet the requirements of the above-mentioned applications and improve the user experience, edge computing is proposed as a new distributed processing computing paradigm to solve the abov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0428H04L63/20
Inventor 李尤慧子董泽勇贾刚勇蒋从锋万健
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products