Efficient remote service attack resistant outsourcing data storage and access method

A technology for outsourcing data and remote services, which is applied in the field of outsourcing data storage and access to efficiently resist remote service attacks, and can solve problems such as difficulty in resisting malicious remote server attacks, high communication overhead, and large client computing workloads.

Active Publication Date: 2021-05-28
JINAN UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These schemes can achieve the above goals to a certain extent, but some of them still have shortcomings such as large communication overhead, large amount of calculation on the client side, difficulty in resisting attacks from malicious remote servers, and difficulty in implementation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient remote service attack resistant outsourcing data storage and access method
  • Efficient remote service attack resistant outsourcing data storage and access method
  • Efficient remote service attack resistant outsourcing data storage and access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] The present invention provides an outsourced data storage and access method that is highly effective against remote service attacks, such as figure 1 shown, including the following steps:

[0039] set up is a key generation function of a special additive homomorphic encryption scheme, κ is a security parameter, ε pk (s, m) is an encryption function, is the decryption function, where s is an encryption and decryption parameter whose type is a positive integer, m and c are the plaintext to be encrypted and the ciphertext to be decrypted respectively, pk and sk are the public key and private key of the additive homomorphic encryption scheme respectively key; the special additive homomorphic encryption scheme for Construction; let H() be a secure hash function with strong anti-collision; Encode ecc () and Decode ecc () is the coding function and the decoding function of the error correction code;

[0040] In practical applications, the security parameter λ can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient remote service attack resistant outsourcing data storage and access method, which comprises the following steps that: a data owner encrypts data by adopting a preset addition homomorphic encryption scheme, and outsources and stores the data in a remote server; the data owner generates an access vector, encrypts the access vector and sends the encrypted access vector to the remote server; the remote server operates the outsourcing data according to the encrypted access vector and returns an operation result to the data owner; and the data owner decrypts the operation result to obtain correct data. According to the invention, the malicious remote server can be effectively prevented from acquiring the content of the outsourced data, and the access mode of the data is hidden. Compared with the prior art, the method has the advantages that the communication traffic and the calculation amount of a data owner are greatly reduced; and secondly, the method has relatively high security and privacy protection, can resist malicious attacks of a remote server, and protects an access mode generated when a data owner accesses the data while protecting the data content.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to an outsourced data storage and access method that can efficiently resist remote service attacks. Background technique [0002] With the continuous development of cloud technology, outsourcing and storing data on remote cloud servers can effectively reduce local storage overhead. In order to protect the security of the data, the data is generally protected by technologies such as encryption before being outsourced and stored on a remote server. Although technologies such as encryption can protect the content of the data, when the data user accesses the data, the remote server will obtain access mode information such as the location information and frequency of the data accessed by the data user. When the remote server obtains enough access pattern information, it can infer the information of the data based on some prior knowledge, and even restore the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCH04L9/008H04L9/0861H04L63/0428H04L63/1408H04L63/1441
Inventor 翁健刘家男温靖航李明杨安家谭武征
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products