Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data sharing method, device and system, client and storage medium

A data sharing and client-side technology, applied in the field of cloud computing security, can solve problems such as user information leakage and affecting data sharing security

Active Publication Date: 2020-05-15
CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD +1
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing CP-ABE mechanism usually adopts a central multi-attribute institution data sharing system and a non-central multi-attribute institution data sharing system, and a central multi-attribute institution data sharing system includes a Certificate Authority (CertificateAuthority, CA) and multiple attribute agencies (Attribute Authority, AA), multiple AAs manage a class of attributes that do not cross each other, distribute private keys to the attributes within their authority, and assign attribute private keys to users according to the user public key generated by the CA. However, this requires the CA to be completely trusted. Once the CA is not trusted, if it is compromised, the entire data sharing system will be paralyzed, and the attacker will obtain the user public keys of all users, resulting in the leakage of user information; In the attribute organization data sharing system, if CA is not set, multiple AAs do not need to consider the user's user public key when generating the user's attribute private key, and there will be cases where multiple users conspire to attack, that is, multiple users who do not have decryption authority The attribute private key can be used in combination to decrypt the encrypted data, which affects the security of data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method, device and system, client and storage medium
  • Data sharing method, device and system, client and storage medium
  • Data sharing method, device and system, client and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 A schematic structural diagram of a data sharing system provided by an embodiment of the present invention, including at least two CA11, client 12, at least two AA13 and cloud server 14:

[0043] The client 12 is configured to send a registration request to any target CA11 of the at least two CA11s, wherein the registration request includes an attribute set of the user of the client 12;

[0044] The target CA11 is used to receive the registration request sent by the client 12, generate the user public key of the user according to the attribute set and the preset random algorithm, and send the user public key to the Client 12;

[0045] The client 12 is further configured to receive the user public key sent by the target CA11, and send the user public key and attribute set to the at least two AA13;

[0046] The at least two AAs13 are used to receive the user public key and attribute set sent by the client 12, and according to the private key corresponding to ea...

Embodiment 2

[0065] In order to facilitate the dynamic addition and deletion of attributes and enhance the practicability of the data sharing system, such as Figure 4 As shown, the system also includes: an attribute control server 15;

[0066] The attribute control server 15 is further configured to receive a first update request for adding a first attribute; determine a first target category corresponding to the first attribute according to a pre-saved attribute-category comparison table, and identify the at least two Whether there is a first target AA13 that manages the attributes corresponding to the first target category in each AA13; if yes, add the first attribute to the first target AA13; if not, create and manage the first target category The first target AA13 of the corresponding attribute, and add the first attribute to the first target AA13.

[0067] The attribute control server 15 is further configured to receive a second update request for deleting a second attribute, determ...

Embodiment 3

[0074] Based on the above examples, such as Figure 5 As shown, the embodiment of the present application provides a data sharing method, and the specific steps include:

[0075] S501: Send a registration request to any target CA among the at least two certificate authority CAs in the data sharing system, wherein the registration request includes an attribute set of the user of the client, so that the target CA according to the attribute set and a preset random algorithm to generate the user public key of the user.

[0076] S502: Send the user public key and the attribute set to at least two attribute agencies AA of the data sharing system, so that the at least two AAs can use the private key corresponding to each attribute included in the user attribute set, the The user public key and the preset key generation algorithm are used to generate the attribute private key of the user.

[0077] S503: According to the attribute private key, decrypt the shared file stored in the cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sharing method, device and system, a client and a storage medium. The system comprises at least two CAs, the client, at least two AAs and a cloud server, wherein the client is used for sending a registration request to any target CA in the at least two CAs, wherein the registration request comprises an attribute set of a user of the client; the target CA is used forgenerating a user public key of the user according to the attribute set and a preset random algorithm; the client is also used for sending the user public key and the attribute set to the at least twoAAs; the at least two AAs are used for generating an attribute private key of the user according to the private key corresponding to each attribute contained in the attribute set, the user public keyand a preset key generation algorithm; and the client is also used for decrypting a shared file which is encrypted by adopting an attribute access structure satisfied by the attribute set of the userand stored in the cloud server according to the attribute private key. The system is used for improving the safety and practicability of data sharing.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a data sharing method, device, client, storage medium and system. Background technique [0002] Cloud storage is a data outsourcing storage service technology derived and developed from cloud computing, which enables users to remotely store and access data in cloud storage anytime and anywhere on demand. Cloud storage has attracted widespread attention due to its commercial advantages of low cost, easy-to-use interface and high scalability. With the rapid development of computers, the Internet and wireless networks, massive amounts of data are generated every day, and cloud storage provides an effective solution for the storage and processing of massive data. However, the cloud server used to store data is not completely trusted, and usually, the data holder only allows its authorized visitors to access the data stored in the cloud server, so the data stored in the cloud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0428H04L63/0823H04L63/083H04L9/0863H04L9/0869
Inventor 程超
Owner CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products