A load-balanced private data sharing method

A privacy data and load balancing technology, which is applied in the direction of electronic digital data processing, digital data information retrieval, special data processing applications, etc., can solve the problems of increasing node load and processing time, and achieve the effect of avoiding congestion

Active Publication Date: 2022-06-17
NANKAI UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme encourages nodes to participate in the re-encryption process through the token mining mechanism, which has nothing to do with the re-encryption process itself, which increases the node load and processing time in vain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A load-balanced private data sharing method
  • A load-balanced private data sharing method
  • A load-balanced private data sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0059] In the embodiment, it is assumed that there are six participating nodes A, B, C, D, E, and F. In a data sharing process, A is the data owner, F is the data requester, and B, C, D, and E are nodes that perform re-encryption tasks. The following takes the data request from F to A as an example. figure 1 The privacy data sharing steps shown are explained:

[0060] 1. A, B, C, D, E, F are initialized, each node generates node level, node information table, task queue, num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A load-balanced private data sharing method. The data sharing steps include: (1) All participating nodes generate public-private key pairs and join the IPFS network (2) The data owner uploads the data to the IPFS network after double encryption (3) After the data requester receives a response to the data owner's request Send a formal request; (4) The data owner generates multiple packet re-encryption keys after receiving the formal request, and distributes them to neighboring nodes according to the state of the neighboring nodes; (5) The neighboring nodes forward the received data again or Perform re-encryption calculations, and send the results to the data requester; (6) After the data requester accumulates multiple results, he downloads the data from the IPFS network and decrypts it to obtain the plaintext. The node status is determined by the node threshold and the current task queue length of the node. The present invention realizes the secret sharing of data and at the same time solves the problem of excessive load of a single node in the process of re-encryption, and realizes overall encryption load balance.

Description

technical field [0001] The invention belongs to the technical field of proxy re-encryption and load balancing in cloud computing, and particularly relates to a dynamic threshold algorithm, threshold proxy re-encryption and an interplanetary file system. Background technique [0002] The rapid development of cloud computing makes people have a convenient data sharing and storage platform. Using cloud computing, teams can share data while saving a lot of local storage resources and avoiding long-term maintenance. However, cloud data is out of the direct control of the data owner, and there are security risks. For data security, data access control must be implemented. The easiest way is to take symmetric encryption and distribute public symmetric keys to internal members through a key management authority. However, due to changes in internal members, keys need to be changed frequently, and cloud data needs to be re-encrypted. And once a single member key is leaked, all dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1008H04L67/1097G06F9/48G06F9/50G06F16/182
CPCH04L63/045H04L67/1008H04L67/1097G06F9/5083G06F9/4881G06F16/182
Inventor 张建忠李建斌徐敬东刘松蒲凌君
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products