Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data sharing method and related equipment

A technology of data sharing and equipment, applied in the direction of file metadata retrieval, special data processing applications, file access structure, etc., can solve the problems of high search complexity, low sharing efficiency, low efficiency, etc., to ensure sharing efficiency and security and privacy effects

Active Publication Date: 2021-02-02
HUAWEI TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still problems of low sharing efficiency and poor security in the process of ciphertext storage and sharing
For example, when the data owner stores multiple shared data on the cloud server, and the data user needs to obtain the desired target shared data from the above multiple shared data, he needs to search from a large number of encrypted shared data, resulting in The search complexity is high and the efficiency is low; and, because the shared data has been encrypted, the data user needs to obtain the corresponding decryption key from the data owner to decrypt it, which leads to the decryption key of the shared data being lost during transmission and There is a risk that data users may be leaked, and ultimately, the security of users' shared data is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method and related equipment
  • Data sharing method and related equipment
  • Data sharing method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0200] Mode 1, the first device uses the second key and the target index plaintext, uses a trapdoor generation algorithm to generate the query trapdoor, and sends the query trapdoor to the second device, and the second device The query trapdoor sent by the first device is received, wherein the target index plaintext is an index plaintext corresponding to the target index ciphertext, and the second key is a symmetric key. Alternatively, the first device uses the first private key and the target index plaintext, uses a trapdoor generation algorithm to generate the query trapdoor, and sends the query trapdoor to the second device, and the second key is the first public key of the first device, and the first private key is a private key corresponding to the second key. That is, in the embodiment of the present invention, for the encryption of the index plaintext, a symmetric key can be used, and then the corresponding query trapdoor can also use the same symmetric key; or, for the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data sharing method and related equipment, which can be specifically applied to an intelligent vehicle and an unmanned vehicle to realize remote safety diagnosis of the vehicle, and comprises the following steps: a server receives a file set sent by first equipment, wherein the file set comprises N ciphertext files, N index ciphertexts and N first key ciphertexts; the server receives a query trap door sent by a second device, finds a matched target index ciphertext from the N index ciphertexts according to the query trap door, and determines a corresponding target ciphertext file and a target first key ciphertext; and the server re-encrypts the target first key ciphertext by using the proxy re-encryption key to obtain a target first key re-encryption ciphertext, and sends the target ciphertext file and the target first key re-encryption ciphertext to the second equipment. The invention can be applied to multiple technical fields of intelligent driving, smart home, cloud storage file sharing and the like, and is used for realizing data security access in the corresponding fields.

Description

technical field [0001] The invention relates to the technical field of data sharing, in particular to a data sharing method and related equipment. Background technique [0002] With the rapid development of Internet technology, a large number of enterprises and individuals choose to store data on cloud servers. Cloud storage service can provide users with huge computing resources, storage space and flexible sharing mode. Its convenient, fast and on-demand network access method enables users to access resources anytime and anywhere, so that users can greatly save local resources. Storage resources and local data management and system maintenance overhead. However, due to the remote nature of cloud storage services, the security issues it brings have also attracted people's attention. It is usually difficult for users to control cloud service providers and even some unauthorized and illegal users to access stored data, and it is impossible to guarantee user privacy and data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/14G06F16/13
CPCH04L63/045H04L63/0471H04L63/0478G06F16/13G06F16/148
Inventor 雷哈娜·雅思敏杨艳江魏卓于海
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products