CN106789082A - Cloud storage medical data based on wireless body area network is in batches from auditing method - Google Patents
Cloud storage medical data based on wireless body area network is in batches from auditing method Download PDFInfo
- Publication number
- CN106789082A CN106789082A CN201710017610.6A CN201710017610A CN106789082A CN 106789082 A CN106789082 A CN 106789082A CN 201710017610 A CN201710017610 A CN 201710017610A CN 106789082 A CN106789082 A CN 106789082A
- Authority
- CN
- China
- Prior art keywords
- medical data
- user
- audit
- area network
- body area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
The invention belongs to field of information security technology, and in particular to the cloud storage medical data based on wireless body area network is in batches from auditing method.The security of the cryptographic algorithm of the inventive method design is based on discrete logarithm difficult problem, it can be ensured that malice Cloud Server can not produce the audit certification response message of forgery to cheat cloud user by auditing verification process.In auditing method, cloud user linearly recognizes device using linear homomorphism aggregate signature algorithm construction homomorphism, can be with the integrality of the multiple medical data files of mass simultaneous audit, and audit process does not need the larger Bilinear map computing of computing cost, it is particularly well-suited to need lightweight amount of calculation, limited storage space is, it is necessary to efficiently realize the application scenarios of wireless body area network.
Description
Technical field
The invention belongs to field of information security technology, and in particular to the cloud storage medical data based on wireless body area network is in batches
From auditing method.
Background technology
With radio communication, low-power consumption it is integrated, it is sensor technology develop rapidly, radio sensing network starts extensive use
In every field such as intelligent grid, medical treatment & health, Industry Controls.As an important application of wireless sensor network, wirelessly
Body area network has been increasingly subject to the attention of academia and medical field.Wireless body area network using sensor node collect patient heart rate,
The medical informations such as pulse, body temperature.These medical datas need to be also needed to while treatment in time to obtain anti-in time from doctor
Feedback.Due to being stored, being processed, the limited resource restriction such as energy supply, to reach these purposes by traditional wireless body area network
It is extremely difficult.Accordingly, it would be desirable to wireless body area network and cloud computing platform are integrated and store and processes real-time medical data.
Cloud auxiliary wireless body area network is equipped with powerful based on cloud computing and storage resource, and medical treatment transducer is implanted into patient
Body surface and periodically collect and health medical treatment information and cloud auxiliary medical system be sent to by mobile device or internet.
Once receiving these data, cloud auxiliary medical system sends data to related medical worker and does clinical diagnosis and be stored in
Cloud storage system.Additionally, the household of patient also again may be by cloud auxiliary medical system retrieval relevant health state with relatives
Information.For many chronic diseases, medical worker is to analyzing in detail that substantial amounts of data are carried out aiding in realizing correctly examining
It is disconnected.Once receiving the instruction of medical worker, cloud accessory system is based on the powerful computing resource of cloud come effectively, promptly using it
Complete assigned task.
The health medical treatment data on Cloud Server are stored in, can be as the basis of doctor's clinical diagnosis.Although cloud storage
Service brings many convenient advantages, more easily such as cost benefit, data access.But possess these advantages in cloud storage
While, it brings new security threat to the outsourcing medical data of patient simultaneously.Once these medical datas are attacked
The malice of the person of hitting is distorted, and can all cause the clinical misdiagnosis of doctor to cause conditions of patients to aggravate even have dead danger, therefore
The integrality of the health medical treatment data on Cloud Server becomes increasingly important.For to medical data integrality and security
Consider, patient needs to use an integrality audit program to ensure that the medical data of patient can be correctly on Cloud Server
Storage.Current typical cloud storage data integrity audit program, due to the Bilinear map computing for needing computing cost very big, and
It is not suitable for the application scenarios of the wireless body area network of cloud auxiliary.Therefore the cloud with secret protection performance of design lightweight is aided in
The medical data integrity security audit program of wireless body area network is a significant research work.
The content of the invention
It is an object of the present invention to provide a kind of cloud storage medical data batch suitable for wireless body area network from auditing party
Method.
The technical scheme is that:Cloud storage medical data batch based on wireless body area network is from auditing method, and it is special
Levy and be, comprise the following steps:
A. system initialization:System carries out piecemeal treatment to medical data file and obtains multiple medical data blocks, and generates
The public private key pair of signature algorithm;Generate the public and private key that lightweight signature is carried out for the identity to medical data file simultaneously
Right, system chooses a lightweight symmetric encipherment algorithm and its symmetric key again;
B. signature is produced:User calls pseudorandom number generator and pseudo-random function to produce each medical data block first
The matching factor of homomorphism message authentication code, and using the number with identical signature algorithm calculating homomorphism message authentication code in step a
Word is signed, while the identity to different medical data files calculates digital signature generation medical data files-designated respectively
Sign, and multiple medical data files are carried out into symmetric cryptography;Finally by these digital signature and the ciphertext of medical data file
Cloud Server is sent to, and these data are deleted in local client;
C. audit certification is produced:One audit challenge information is produced by user, and challenge information is sent to Cloud Server;
After Cloud Server receives audit challenge information, the polymerization audit certification response message of multiple medical data files is produced, and returned
To user;
D. audit certification checking:After the audit certification response message that user is polymerized, using with identical in step a
The key authentication of the public key and symmetric encipherment algorithm of signature algorithm this polymerization audit certification response message validity.
Further, the specific method of the step a is:
A1. medical data file F is divided into n medical data block, this n medical data block is further separated into Z respectivelyq
(ZqMould q residual class rings, q is prime number) in k element;F is expressed as:
A2. user chooses(ZpIt is mould p residual class rings, p is prime number), meet gq≡ 1mod p, randomly choose private
Key x, meets 1<x<Q, calculates public key y=gxmod p;User chooses a lightweight symmetric encipherment algorithmSymmetric key is set
It is τ, and chooses a light weight digital signature algorithm SSig, its public private key pair is (spk, ssk);
A3. system produces pseudorandom number generatorPseudo-random function PRF:Kprf×I→Zq, wherein
Kprg, KprfThe private key set of respectively PRG and PRF, I is the index index set of each data block in file;System is selected at random
Symmetric key is taken to skp=(skprg,skprf), wherein skprg∈Kprg, skprf∈Kprf。
Further, the specific method of the step b is:
B1. forL is the sum of medical data file,It is the medical data reference number of a document of current selected, gives
Fixed each medical data fileComprising n medical data block, each of which medical data blockMedical recordsIdentity beIn order to ensure medical data
The uniqueness of file identity mark, user calls a light weight digital signature algorithm SSig to calculateLabel
B2. user produces random vector respectively using pseudorandom number generator PRG and pseudo-random function PRFRandom numberUser calculates medical data
BlockHomomorphism message authentication codeThen, user utilizes private key x
CalculateDigital signature it is as follows:
B21. randomly chooseCalculate
B22. calculate
B23. homomorphism message authentication code is exportedDigital signatureThe collection for defining these signatures is combined into
B3. for 1≤l≤L, each medical data file is givenIn order to ensure the doctor of user
The confidentiality of data file is treated, user calls symmetric encipherment algorithmSymmetric key is τ, willEncryption
ForThenIt is encrypted as
B4. user sendsTo Cloud Server, and these information are deleted in client's local side.
Further, the specific method of the step c is:
C1. user fetches each medical data file label firstAnd using public key spk checking signaturesValidity;After the validity for having verified label, user produces audit challenge information as follows:
C11. randomly select one from { 1,2 ..., n } and contain the c subset of element
C12. for eachUser produces corresponding random value βj∈Zq, end user's transmission audit challenge letter
BreathTo Cloud Server;
C2. once receiving audit challenge informationCloud Server produces audit certification response message
It is as follows:
C21. combined information block is calculatedWherein θ ∈ { 1 ..., k }, obtain
C22. aggregate signature is calculated
C23. Cloud Server sendsAs audit certification response message to user.
Further, the specific method of the step d is:
D1. for eachCalculate
D2. calculateWherein 1
≤ θ≤k,
D3. equation is verifiedWhether set up, if so, then audit certification response is effective, if
Not into then audit certification invalid response.
Beneficial effects of the present invention are that the security of the cryptographic algorithm of the inventive method design is asked based on discrete logarithm difficulty
Topic, it can be ensured that malice Cloud Server can not produce the audit certification response message of forgery to cheat cloud user by auditing verification mistake
Journey.In auditing method, cloud user linearly recognizes device using linear homomorphism aggregate signature algorithm construction homomorphism, can be examined with mass simultaneous
The integrality of the multiple medical data files of meter, and audit process does not need the larger Bilinear map computing of computing cost, especially
Lightweight amount of calculation, limited storage space are applicable to, it is necessary to efficiently realize the application scenarios of wireless body area network.
Specific embodiment
Technical scheme is described below in detail:
Step of the invention is divided into four parts:
System initialization:System carries out piecemeal treatment to medical data file, and generates Schnorr modification signature algorithms
Public private key pair, generates the public private key pair that lightweight signature is carried out for the identity to medical data file, and system is chosen again
One lightweight symmetric encipherment algorithm and its symmetric key.
Signature produces step:User calls pseudorandom number generator and pseudo-random function to produce each medical data block first
Homomorphism message authentication code matching factor, and the numeral of homomorphism message authentication code is calculated using Schnorr modifications signature algorithms
Signature, while the identity to different medical data files calculates digital signature generation medical data file label respectively,
And multiple medical data files are carried out into symmetric cryptography.Finally the ciphertext of these digital signature and medical data file is sent
To Cloud Server, and these data are deleted in local client.
Audit certification produces step:In order to medical data of the mass simultaneous audit outsourcing storage on Cloud Server
Integrality, user produces an audit challenge information, and challenge information is sent into Cloud Server.Cloud Server receives challenge letter
After breath, the polymerization audit certification response message of multiple medical data files is produced, and return to user.
Audit certification verification step:User is obtained after the audit certification response message of this polymerization, is become using Schnorr
The key authentication of the public key and symmetric encipherment algorithm of type signature algorithm this polymerization audit certification response message validity.
An instantiation explanation given below:
The technical problems to be solved by the invention are, it is adaptable to which the cloud storage medical data integrality of wireless body area network is in batches
From auditing method.
This includes following basic step from auditing method in batches:Setup, SigGen, ProofGen, VerifyProof.
Setup:Including three below sub-step:
(1) medical data file F is divided into n medical data block, this n medical data block is further separated into Z respectivelyq
In k element.F is expressed as follows:
(2) user choosesMeet gq≡ 1 (modp), randomly chooses private key x, meets 1<x<Q, calculates public key y
=gxmod p.Then user chooses a lightweight symmetric encipherment algorithm(setting symmetric key is τ), and choose a light weight
Level Digital Signature Algorithm SSig, its public private key pair is (spk, ssk).
(3) system produces pseudorandom number generatorPseudo-random function PRF:Kprf×I→Zq, wherein
Kprg, KprfThe private key set of respectively PRG and PRF, I is the index index set of each data block in file.Then system with
Machine chooses symmetric key to skp=(skprg,skprf), wherein skprg∈Kprg, skprf∈Kprf。
SigGen:User produces the L digital signature of medical data file simultaneously, and produces this L medical data text
The ciphertext of part is as follows:
(1) forGive each medical data fileComprising n medical data block,
Each of which medical data blockMedical recordsIdentity beIn order to ensure the uniqueness of medical data file identity mark, user calls a light weight digital signature algorithm SSig to count
CalculateLabel
(2) user produces random vector respectively using pseudorandom number generator PRG and pseudo-random function PRFRandom numberUser calculates medical data
BlockHomomorphism message authentication codeThen, user utilizes private key x
CalculateDigital signature it is as follows:
(2a) is randomly choosedCalculate
(2b) is calculated
(2c) exports homomorphism message authentication codeDigital signatureThe collection for defining these signatures is combined into
(3) for 1≤l≤L, each medical data file is givenIn order to ensure the doctor of user
The confidentiality of data file is treated, user calls symmetric encipherment algorithm(symmetric key is τ) willEncryption
ForSoIt is encrypted as
Finally, user sendsTo Cloud Server, and these information are deleted in client's local side.
ProofGen:User produces audit challenge information, and, to this generation audit certification response message, step is such as Cloud Server
Under:
(1) user fetches each medical data file label firstAnd using public key spk checking signaturesValidity.After the validity for having verified label, user produces audit challenge information as follows:
(1a) randomly selects one and contains the c subset of element from { 1,2 ..., n }
(1b) is for eachUser produces corresponding random value βj∈Zq, end user's transmission audit challenge letter
BreathTo Cloud Server.
(2) once receiving audit challenge informationCloud Server produces audit certification response message
It is as follows:
(2a) calculates combined information blockWherein θ ∈ { 1 ..., k }, so obtain
(2b) calculates aggregate signature
(2c) Cloud Server sendsAs audit certification response message to user.
VerifyProof:User verifies the validity of audit certification response message in accordance with the following steps:
(1) for eachCalculate
(2) calculateWherein 1
≤ θ≤k,
(3) equation is verifiedWhether set up.
Audit certification verification process correctness is as follows:
This spline equationSet up.
Forward position application scenarios of the present invention based on wireless body area network and cloud computing, it is poly- by futuramic secure digital
Signature algorithm is closed, that is, designs and improve Schnorr Digital Signature Algorithms for linear homomorphism aggregate signature algorithm, and further construct
Lightweight audit program, enables to be effectively applicable to the wireless body area network of cloud auxiliary, helps patient's checking storage in cloud auxiliary
The integrality of the health data of medical system, and effective detection goes out whether cloud medical data is tampered, so as to prevent facing for doctor
Bed mistaken diagnosis.The security of the cryptographic algorithm of inventive method design is based on discrete logarithm difficult problem, it can be ensured that malice cloud takes
Business device can not produce the audit certification response message of forgery to cheat cloud user by auditing verification process.In auditing method, cloud
User linearly recognizes device using linear homomorphism aggregate signature algorithm construction homomorphism, can be with the multiple medical data files of mass simultaneous audit
Integrality, and audit process does not need the larger Bilinear map computing of computing cost, is particularly well-suited to need lightweight meter
Calculation amount, limited storage space are, it is necessary to efficiently realize the application scenarios of wireless body area network.
Claims (5)
1. the cloud storage medical data based on wireless body area network is in batches from auditing method, it is characterised in that comprise the following steps:
A. system initialization:System carries out piecemeal treatment to medical data file and obtains multiple medical data blocks, and generates signature
The public private key pair of algorithm;The public private key pair that lightweight signature is carried out for the identity to medical data file is generated simultaneously,
System chooses a lightweight symmetric encipherment algorithm and its symmetric key again;
B. signature is produced:User calls pseudorandom number generator and pseudo-random function to produce the homomorphism of each medical data block first
The matching factor of message authentication code, and signed using the digital of homomorphism message authentication code is calculated with identical signature algorithm in step a
Name, while the identity to different medical data files calculates digital signature generation medical data file label respectively, and
Multiple medical data files are carried out into symmetric cryptography;Finally the ciphertext of these digital signature and medical data file is sent to
Cloud Server, and delete these data in local client;
C. audit certification is produced:One audit challenge information is produced by user, and challenge information is sent to Cloud Server;Cloud takes
After business device receives audit challenge information, the polymerization audit certification response message of multiple medical data files is produced, and return to use
Family;
D. audit certification checking:After the audit certification response message that user is polymerized, signed using with identical in step a
The key authentication of the public key and symmetric encipherment algorithm of algorithm this polymerization audit certification response message validity.
2. it is according to claim 1 based on wireless body area network cloud storage medical data batch from auditing method, its feature
It is that the specific method of the step a is:
A1. medical data file F is divided into n medical data block, this n medical data block is further separated into Z respectivelyqIn k
Individual element;F is expressed as:
A2. user choosesMeet gqThe mod p of ≡ 1, randomly choose private key x, meet 1<x<Q, calculates public key y=
gxmod p;User chooses a lightweight symmetric encipherment algorithmSetting symmetric key is τ, and chooses a lightweight numeral
Signature algorithm SSig, its public private key pair is (spk, ssk);
A3. system produces pseudorandom number generator PRG:Pseudo-random function PRF:Kprf×I→Zq, wherein Kprg,
KprfThe private key set of respectively PRG and PRF, I is the index index set of each data block in file;System randomly selects right
Claim key to skp=(skprg,skprf), wherein skprg∈Kprg, skprf∈Kprf。
3. it is according to claim 2 based on wireless body area network cloud storage medical data batch from auditing method, its feature
It is that the specific method of the step b is:
B1. forL is the sum of medical data file,It is the medical data reference number of a document of current selected, gives every
One medical data fileComprising n medical data block, each of which medical data blockMedical recordsIdentity beIn order to ensure medical data
The uniqueness of file identity mark, user calls a light weight digital signature algorithm SSig to calculateLabel
B2. user produces random vector respectively using pseudorandom number generator PRG and pseudo-random function PRFRandom numberUser calculates medical data
BlockHomomorphism message authentication codeThen, user utilizes private key x
CalculateDigital signature it is as follows:
B21. randomly chooseCalculate
B22. calculate
B23. homomorphism message authentication code is exportedDigital signatureThe collection for defining these signatures is combined into
B3. for 1≤l≤L, each medical data file is givenIn order to ensure the medical number of user
According to the confidentiality of file, user calls symmetric encipherment algorithmSymmetric key is τ, willIt is encrypted asThenIt is encrypted as
B4. user sendsTo Cloud Server, and these information are deleted in client's local side.
4. it is according to claim 3 based on wireless body area network cloud storage medical data batch from auditing method, its feature
It is that the specific method of the step c is:
C1. user fetches each medical data file label firstAnd using public key spk checking signatures's
Validity;After the validity for having verified label, user produces audit challenge information as follows:
C11. randomly select one from { 1,2 ..., n } and contain the c subset of element
C12. for eachUser produces corresponding random value βj∈Zq, end user's transmission audit challenge informationTo Cloud Server;
C2. once receiving audit challenge informationCloud Server produces audit certification response message as follows:
C21. combined information block is calculatedWherein θ ∈ { 1 ..., k }, obtain
C22. aggregate signature is calculated
C23. Cloud Server sendsAs audit certification response message to user.
5. it is according to claim 4 based on wireless body area network cloud storage medical data batch from auditing method, its feature
It is that the specific method of the step d is:
D1. for eachCalculate
D2. calculateWherein 1≤θ≤
K,
D3. equation is verifiedWhether set up, if so, then audit certification response is effective, if not into
, then audit certification invalid response.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710017610.6A CN106789082A (en) | 2017-01-11 | 2017-01-11 | Cloud storage medical data based on wireless body area network is in batches from auditing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710017610.6A CN106789082A (en) | 2017-01-11 | 2017-01-11 | Cloud storage medical data based on wireless body area network is in batches from auditing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106789082A true CN106789082A (en) | 2017-05-31 |
Family
ID=58947471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710017610.6A Pending CN106789082A (en) | 2017-01-11 | 2017-01-11 | Cloud storage medical data based on wireless body area network is in batches from auditing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789082A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
CN107592311A (en) * | 2017-09-18 | 2018-01-16 | 西南石油大学 | Towards the cloud storage medical treatment big data lightweight batch auditing method of wireless body area network |
CN108650097A (en) * | 2018-04-28 | 2018-10-12 | 上海扈民区块链科技有限公司 | A kind of efficient aggregation number endorsement method |
CN108712259A (en) * | 2018-05-02 | 2018-10-26 | 西南石油大学 | Identity-based acts on behalf of the efficient auditing method of cloud storage for uploading data |
CN109639420A (en) * | 2019-01-02 | 2019-04-16 | 西南石油大学 | Based on block chain technology can anonymous Identity the public auditing method of medical cloud storage |
CN110851878A (en) * | 2019-11-20 | 2020-02-28 | 南京邮电大学 | Accountability medical data storage method based on block chain |
CN111414630A (en) * | 2020-03-05 | 2020-07-14 | 北京远盟普惠健康科技有限公司 | Data security processing method and processing system for accurate physical examination |
CN111931249A (en) * | 2020-09-22 | 2020-11-13 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
CN111931201A (en) * | 2020-07-15 | 2020-11-13 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN112564911A (en) * | 2020-11-23 | 2021-03-26 | 重庆大学 | Identity-based cloud server computing correctness verification method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023044A (en) * | 2014-01-01 | 2014-09-03 | 电子科技大学 | Cloud-storage data lightweight-level public auditing method with privacy protection |
CN104038493A (en) * | 2014-06-10 | 2014-09-10 | 电子科技大学 | Bilinear pairing-free cloud storage data security audit method |
CN105791321A (en) * | 2016-05-03 | 2016-07-20 | 西南石油大学 | Cloud storage data common auditing method possessing secret key leakage resistance characteristic |
CN105978695A (en) * | 2016-05-03 | 2016-09-28 | 西南石油大学 | Batch self-auditing method for cloud storage data |
-
2017
- 2017-01-11 CN CN201710017610.6A patent/CN106789082A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023044A (en) * | 2014-01-01 | 2014-09-03 | 电子科技大学 | Cloud-storage data lightweight-level public auditing method with privacy protection |
CN104038493A (en) * | 2014-06-10 | 2014-09-10 | 电子科技大学 | Bilinear pairing-free cloud storage data security audit method |
CN105791321A (en) * | 2016-05-03 | 2016-07-20 | 西南石油大学 | Cloud storage data common auditing method possessing secret key leakage resistance characteristic |
CN105978695A (en) * | 2016-05-03 | 2016-09-28 | 西南石油大学 | Batch self-auditing method for cloud storage data |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483585B (en) * | 2017-08-18 | 2020-03-10 | 西安电子科技大学 | Efficient data integrity auditing system and method supporting safe deduplication in cloud environment |
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
CN107592311A (en) * | 2017-09-18 | 2018-01-16 | 西南石油大学 | Towards the cloud storage medical treatment big data lightweight batch auditing method of wireless body area network |
CN108650097A (en) * | 2018-04-28 | 2018-10-12 | 上海扈民区块链科技有限公司 | A kind of efficient aggregation number endorsement method |
CN108650097B (en) * | 2018-04-28 | 2021-03-09 | 上海扈民区块链科技有限公司 | Efficient digital signature aggregation method |
CN108712259A (en) * | 2018-05-02 | 2018-10-26 | 西南石油大学 | Identity-based acts on behalf of the efficient auditing method of cloud storage for uploading data |
CN108712259B (en) * | 2018-05-02 | 2020-12-22 | 西南石油大学 | Identity-based cloud storage efficient auditing method capable of uploading data by proxy |
CN109639420A (en) * | 2019-01-02 | 2019-04-16 | 西南石油大学 | Based on block chain technology can anonymous Identity the public auditing method of medical cloud storage |
CN109639420B (en) * | 2019-01-02 | 2021-05-25 | 西南石油大学 | Medical cloud storage public auditing method capable of anonymizing identity based on block chain technology |
CN110851878A (en) * | 2019-11-20 | 2020-02-28 | 南京邮电大学 | Accountability medical data storage method based on block chain |
CN110851878B (en) * | 2019-11-20 | 2022-10-11 | 南京邮电大学 | Accountable medical data storage method based on block chain |
CN111414630A (en) * | 2020-03-05 | 2020-07-14 | 北京远盟普惠健康科技有限公司 | Data security processing method and processing system for accurate physical examination |
CN111414630B (en) * | 2020-03-05 | 2020-11-20 | 北京远盟普惠健康科技有限公司 | Data security processing method and processing system for accurate physical examination |
CN111931201A (en) * | 2020-07-15 | 2020-11-13 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN111931201B (en) * | 2020-07-15 | 2023-06-16 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN111931249A (en) * | 2020-09-22 | 2020-11-13 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
CN111931249B (en) * | 2020-09-22 | 2021-01-08 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
CN112564911A (en) * | 2020-11-23 | 2021-03-26 | 重庆大学 | Identity-based cloud server computing correctness verification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789082A (en) | Cloud storage medical data based on wireless body area network is in batches from auditing method | |
Sun et al. | Blockchain-based secure storage and access scheme for electronic medical records in IPFS | |
CN107592311B (en) | Cloud storage medical treatment big data lightweight batch auditing method towards wireless body area network | |
Khatoon et al. | Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment | |
Zhou et al. | PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system | |
CN104038349B (en) | Effective and verifiable public key searching encryption method based on KP-ABE | |
Ying et al. | A lightweight policy preserving EHR sharing scheme in the cloud | |
CN104135473B (en) | A kind of method that identity base broadcast enciphering is realized by the attribute base encryption of Ciphertext policy | |
Yang et al. | A blockchain-assisted verifiable outsourced attribute-based signcryption scheme for EHRs sharing in the cloud | |
CN107635018B (en) | Cross-domain medical cloud storage system supporting emergency access control and safe deduplication | |
CN105978854A (en) | Intelligent medical service method based on undistinguishable confusion | |
CN111107094B (en) | Lightweight ground-oriented medical Internet of things big data sharing system | |
CN108171066A (en) | The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection | |
CN112133396B (en) | Medical data sharing method and device, electronic equipment and medium | |
CN115065679B (en) | Electronic health record sharing model, method, system and medium based on blockchain | |
Xie et al. | Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care | |
Qian et al. | Profile matching for IoMT: A verifiable private set intersection scheme | |
CN111083150A (en) | Identity authentication and data security transmission method under medical sensor network environment | |
CN109117672A (en) | Carry out the hiding cloud storage Data Audit method of sensitive information | |
Obiri et al. | Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable | |
Gupta et al. | Secure data authentication and access control protocol for industrial healthcare system | |
CN103281180B (en) | User is protected to access the bill generation method of privacy in a kind of network service | |
Lin et al. | Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems | |
Ali et al. | Anonymous aggregate fine-grained cloud data verification system for smart health | |
CN117725620A (en) | Classification result disclosure verification privacy protection method and system based on decision tree |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |
|
WD01 | Invention patent application deemed withdrawn after publication |