Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for performing security statistical analysis by using fully homomorphic encryption in cloud computing environment

A technology of fully homomorphic encryption and cloud computing environment, applied in the field of security statistical analysis, can solve the problems of statistical analysis of data, loss of advantages, no features of ciphertext, etc., to achieve the effect of ensuring calculation accuracy

Active Publication Date: 2021-05-14
SUN YAT SEN UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]In recent years, with the influx of massive data and the development of the times, various businesses require more data storage space and stronger data processing capabilities. In terms of data processing, a single computing engine can no longer meet the needs of users, and cloud computing and big data technology have emerged as the times require. With the rapid development of cloud computing and big data technology, the storage space and computing power of cloud servers make data processing in the cloud Mining and statistical processing become possible, but how to ensure the privacy and security of users under the cloud service model has become the primary problem in its promotion and application
[0003] In order to prevent data leakage, encrypting data and then storing it on a cloud platform is recognized as the most effective method, but this brings a new problem: The encrypted ciphertext has no characteristics, and the cloud platform cannot effectively process it, losing its advantages in big data processing. Once the data is decrypted, it is very easy to cause privacy data leakage, and even bring serious catastrophic consequences. , in the process of data mining and statistical analysis in the cloud, it is necessary to ensure the privacy of the data, but also to ensure its accuracy. As a key means to solve this problem, the fully homomorphic encryption technology is a Encryption algorithms that operate but can still restore plaintext, such as a Chinese patent (publication number: CN109327304A) on February 12, 2019, disclosed a lightweight homomorphic encryption method for privacy protection in cloud computing. The calculation is realized under the cloud environment, which effectively solves the problem of data uploading to the server in the cloud environment, and the cloud is not trustworthy. However, while ensuring privacy, the data cannot be statistically analyzed, so the accuracy of the calculation results cannot be determined, and the accuracy of the data calculation cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing security statistical analysis by using fully homomorphic encryption in cloud computing environment
  • Method for performing security statistical analysis by using fully homomorphic encryption in cloud computing environment
  • Method for performing security statistical analysis by using fully homomorphic encryption in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Such as figure 1 The flow diagram of the method for performing security statistical analysis using fully homomorphic encryption in the cloud computing environment shown, see figure 1 ,include:

[0065] S1. Specify the user clients participating in the security statistical analysis;

[0066] S2. Generate and save the public key pk and private key sk locally, inform the cloud server of the public key pk, and inform the private server of the private key sk;

[0067] The process of generating the public key pk and private key sk locally is:

[0068] S21. Set positive integers q and t, wherein, q indicates that the ciphertext modulus is used to reduce the coefficient of the ciphertext polynomial; t indicates that the plaintext modulus is used to reduce the coefficient of the plaintext polynomial; q>>t;

[0069] S22. Order [q / t], define R=Z / (X n +1), R q = Z q [x] / (X n +1) and R t = Z t [x] / (X n +1); where Z represents a polynomial with integer coefficients, Z q [x...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for carrying out security statistical analysis by using fully homomorphic encryption in a cloud computing environment, relates to the technical field of cloud computing information security, and solves the problem of how to carry out statistical calculation and ensure data calculation precision under the condition that a cloud end is not credible during calculation outsourcing. On the basis of a three-party system formed by a local, a user client and a cloud server, firstly, the user client participating in security statistical analysis is determined, and from the perspective of privacy protection, homomorphic encryption is carried out on statistical data of the user client based on a multiplication protocol, an addition protocol and an integer comparison protocol of fully homomorphic encryption, data are encrypted and uploaded to a cloud server, the data in a ciphertext state is directly calculated in a cloud environment, calculation is completed under the condition that privacy is not leaked, corresponding statistic analysis, statistic result inspection and unary linear regression fitting are obtained, real calculation outsourcing is achieved, and the calculation precision is guaranteed based on the fully homomorphic encryption technology.

Description

technical field [0001] The present invention relates to the technical field of cloud computing information security, and more specifically, relates to a method for security statistical analysis using fully homomorphic encryption in a cloud computing environment. Background technique [0002] In recent years, with the influx of massive data and the development of the times, various businesses require more data storage space and stronger data processing capabilities. In terms of data processing, a single computing engine can no longer meet the needs of users. Cloud computing and big data technology emerged as the times require. With the rapid development of cloud computing and big data technology, the storage space and computing power of cloud servers make it possible to perform data mining and statistical processing in the cloud, but how to ensure The privacy and security of users has become the primary issue in its promotion and application. [0003] In order to prevent dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06G06F21/60
CPCH04L9/008H04L63/0428G06F21/602
Inventor 陈小璐郑培嘉刘红梅方艳梅骆伟祺
Owner SUN YAT SEN UNIV