Cloud storage data encryption method and system and storage medium

A technology for data encryption and cloud storage, applied in digital transmission systems, transmission systems, and key distribution, which can solve problems such as the need to improve the efficiency of encryption and decryption

Active Publication Date: 2020-10-02
WUHAN UNIV +7
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the existing technology can meet the user access control requirements in the cloud storage environment to a certain extent, such methods need to further implement more fine-grained user access control, and the encryption and decryption efficiency needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data encryption method and system and storage medium
  • Cloud storage data encryption method and system and storage medium
  • Cloud storage data encryption method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Embodiment 1. In order to overcome the deficiencies of traditional encryption schemes in the cloud storage environment, this embodiment proposes a cloud storage data encryption method, which includes the following steps: the trusted key generation center initializes public parameters, and the public parameters include elliptic curve parameters, Hash function, primary public key, secondary public key and attribute public key set; trusted key generation center generates user private key for each user;

[0083] Encryption users generate public parameters according to the trusted key generation center, use attribute encryption to encrypt the data they want to obtain encrypted ciphertext, and store the encrypted ciphertext in the cloud. user access control tree;

[0084] The decryption user decrypts the encrypted ciphertext according to his own user attributes.

[0085] In this embodiment, the trusted key generation center (KGC) invokes this module to initialize the master ...

Embodiment 2

[0117]Embodiment 2. This embodiment provides a cloud storage data encryption method, including the following steps: encrypting the public parameters generated by the user according to the user access control tree constructed based on the preset user access control policy and the trusted key generation center initialization , use the attribute encryption method to encrypt the data to be encrypted to obtain encrypted ciphertext, so that the decryption user who conforms to the user access control tree can decrypt the encrypted ciphertext according to the user private key generated for him by the trusted key generation center.

[0118] In this embodiment, the trusted key generation center initializes the elliptic curve parameters (F p , p, q, P) and hash function H, where F p is a field of prime numbers characterized by p, p is a prime number, q is the order of the base point P, P is the base point on the elliptic curve, and its order is a prime number;

[0119] The trusted key g...

Embodiment 3

[0144] Embodiment 3. Corresponding to the cloud storage data encryption method provided in Embodiment 1, this embodiment provides a cloud storage data encryption system, such as figure 1 Shown include: system initialization module, user key generation module, data encryption module and data decryption module;

[0145] The system initialization module is used for the trusted key generation center to initialize public parameters, and the public parameters include elliptic curve parameters, hash functions, primary public keys, auxiliary public keys, and attribute public key sets;

[0146] The user key generation module is used for the trusted key generation center to generate a user private key for each decryption user;

[0147]The data encryption module is used for encrypting users to construct a user access control tree based on a preset user access control strategy; the encrypted user generates public parameters and user access control trees according to the trusted key genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud storage data encryption method and system and a storage medium. An encryption user initializes a generated public parameter according to a user access control tree constructed based on a preset user access control strategy and a trusted key generation center, and encrypts the data to be encrypted by using an attribute encryption mode to obtain an encrypted ciphertext, so that a decryption user conforming to the user access control tree decrypts the encrypted ciphertext according to a user private key generated by the trusted key generation center for the decryption user. According to the method, the use of a bilinear pair in an attribute-based encryption system (ABE) is canceled, the efficiency of an attribute-based encryption algorithm can be improved to agreater extent, and the high-efficiency requirement in a cloud storage environment is met.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to the technical field of cloud storage data encryption, and relates to a cloud storage data encryption method and system based on attribute encryption. Background technique [0002] Cloud storage is a new concept extended and derived from the concept of cloud computing. It refers to the collection of a large number of different types of storage devices in the network through application software through functions such as cluster applications, grid technology, or distributed file systems. Work together to provide a system for data storage and business access functions to ensure data security and save storage space. The ideas and concepts of cloud storage services are attractive to both enterprise users and individual users, but the security issues have also aroused users' concerns. Data encryption technology in cloud storage is one of the key technologies to ensure dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L63/0428H04L67/1097H04L63/10H04L9/0861
Inventor 何德彪罗敏陈泌文季洪涵马军张宏杰蒙金有贺建伟施佳锋刘红军管荑林琳刘新于灏王振华张双莹梁野邵立嵩王景王春艳苏达李航
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products