Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Content sharing privacy protection method for resisting collusion attacks

A privacy protection and content technology, applied in the field of privacy protection, can solve the problems of low cache privacy risk and content request delay, less consideration to prevent network attacks such as collusion, and inability to resist collusion attacks, etc., to achieve low cache privacy risk and Content request delay, suitable for privacy protection, and the effect of reducing CCN energy consumption

Active Publication Date: 2021-10-08
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0031] Aiming at the technical problem that the existing content sharing privacy protection methods seldom consider preventing network attacks such as collusion and cannot resist collusion attacks, the present invention proposes a content sharing privacy protection method against collusion attacks, which has hidden strategies and attribute revocation Content sharing scheme (PCSAC) to resist collusion attacks; under the premise of ensuring user privacy in the CCN system, it has a high cache hit rate, low cache privacy risk and content request delay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content sharing privacy protection method for resisting collusion attacks
  • Content sharing privacy protection method for resisting collusion attacks
  • Content sharing privacy protection method for resisting collusion attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] In order to overcome the security flaws of the Shahriar scheme and improve its execution efficiency, the present invention proposes a privacy protection method for content sharing that can resist collusion attacks. First, the scheme model is given, such as image 3 Shown, and then give the specific construction method, and finally, whether it can resist collusion attack is given a security proof.

[0077] Such as image 3 As shown, the entity of the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a content sharing privacy protection method for resisting collusion attacks, which is used for solving the problem that the existing content sharing privacy protection method rarely considers prevention of network attacks such as collusion and cannot resist collusion attacks. The method comprises the following steps of: a responsibility tracing list and a public and private key pair of a user are generated; the publisher formulates an LSSS access strategy, and encrypts the content to generate a ciphertext; a consumer requests content, executes a key generation algorithm to generate a private key, and performs auditing and responsibility investigation in a responsibility investigation list; the ciphertext cloud server verifies the identity of the consumer and then downloads a ciphertext from the cloud service routing node; the attribute authorization center audits the leaked private key and the responsibility investigation list, updates the responsibility investigation list and deletes the secret value; and the attribute authorization center calculates and updates the key, and the consumer and the publisher update the ciphertext. According to the method, the cache hit rate of the routing node can be improved, the cache privacy risk and the content request time delay are relatively low, and the CCN energy consumption is reduced.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular to a content sharing privacy protection method against collusion attacks. Background technique [0002] In order to solve the inherent security problems in CCN (Content-Centric Network), more and more information security scholars have begun to use cryptographic technology to apply it to the CCN architecture. But different from the traditional network, these technologies must start from protecting the content itself and be designed as a flexible and scalable access control mechanism to meet the needs of CCN. Therefore, attribute-based encryption technology has become one of the most ideal technologies in the fine-grained access control mechanism of CCN. Zhang et al. proposed a CP-ABE (ciphertext-based attribute encryption) scheme to hide the access structure, which supports access tree strategies, and proved that the scheme is replay-safe (RCCA) under chosen ciphertext a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/06H04L63/0428H04L63/08H04L63/101H04L63/1441H04L9/0825H04L9/0891Y02D30/70
Inventor 张建伟孙海燕吴作栋蔡增玉朱亮梁树军崔梦梦彭中原陈曦
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products