CN115484095B - Fine granularity access control method based on blockchain in cloud-edge cooperative environment - Google Patents

Fine granularity access control method based on blockchain in cloud-edge cooperative environment Download PDF

Info

Publication number
CN115484095B
CN115484095B CN202211116020.6A CN202211116020A CN115484095B CN 115484095 B CN115484095 B CN 115484095B CN 202211116020 A CN202211116020 A CN 202211116020A CN 115484095 B CN115484095 B CN 115484095B
Authority
CN
China
Prior art keywords
access control
data
edge
stage
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211116020.6A
Other languages
Chinese (zh)
Other versions
CN115484095A (en
Inventor
张世文
杨益彬
何家毅
李梦玲
梁伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University of Science and Technology
Original Assignee
Hunan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University of Science and Technology filed Critical Hunan University of Science and Technology
Priority to CN202211116020.6A priority Critical patent/CN115484095B/en
Publication of CN115484095A publication Critical patent/CN115484095A/en
Application granted granted Critical
Publication of CN115484095B publication Critical patent/CN115484095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based fine granularity access control method in cloud-edge cooperative environment, which comprises the following steps: a system initialization stage; an encryption stage; a transaction generation stage; a trapdoor generation stage; a search stage; and (3) a decryption stage. In the cloud-edge cooperative environment, an authority center generates a primary test part key and a symmetric key, then sends different part keys to an edge server and a data user respectively, and sends the symmetric key to an edge node. According to the method, a part of secret keys are used by a user to generate search trapdoors and are sent to the corresponding edge servers, secret values are recovered in a consensus network by using a threshold secret sharing technology, and a final private key is generated under the condition of meeting access control, so that multi-authority generation of the private key is realized, and the security of the private key is effectively protected. In addition, in the cloud-edge cooperative environment, the edge server is utilized to carry out the operations of encrypting data, decrypting data and searching and matching, so that the computing cost of a user is obviously reduced.

Description

Fine granularity access control method based on blockchain in cloud-edge cooperative environment
Technical Field
The invention relates to the field of data encryption, in particular to a fine granularity access control method based on a blockchain in a cloud-edge cooperative environment.
Background
Cloud computing is the most important development and implementation of several technologies in the field of today's social networking. Including distributed computing, parallel computing, virtualization, etc. Cloud computing has the characteristics of strong computing power, good expandability, low price and the like. With the growing maturity and rapid development of cloud computing technology, users with limited resources store data in the cloud, and can enjoy efficient and rapid file storage and query services with low cost, so that local management overhead is greatly reduced while high-quality data services are enjoyed, but the problems of safety and privacy become an important challenge, and how to ensure high-quality data services and ensure data safety at the same time becomes a key problem to be solved in cloud computing.
Edge computing refers to a new service model in which data or tasks can be computed and executed on the edge side of the network near the source of the data. Because of the contradiction between inherent characteristics of cloud computing and everything interconnection, the centralized computing processing mode of the cloud computing is simply relied on, application program operation and mass data processing which are insufficient for the perception of the internet of things as the background are realized, and the cloud computing model cannot effectively solve the problems of cloud center load, transmission bandwidth, data privacy protection and the like. Therefore, the edge calculation is generated, and the problem of big data processing of the cloud center and the network edge can be effectively solved by combining the edge calculation with the existing cloud calculation centralized processing model. One advantage of edge computing is that it breaks through the limitation of terminal hardware, so that mobile terminals and other portable devices participate in service computing in a large number, and mobile data access, intelligent load balancing and low management cost are realized.
Searchable encryption is a cryptographic primitive that supports a user to search on ciphertext according to a keyword. The method mainly aims to solve the problem that a user performs data query on encrypted cloud data, in a searchable encryption mechanism, firstly, a data owner encrypts and stores plaintext data to a cloud server according to an encryption algorithm of the data owner, when the data user wants to acquire the data on the cloud server, credentials required by retrieval are sent to cloud service, the cloud server performs retrieval matching in the cloud server according to the sent credentials, if the matching is successful, a query result is returned to the data user in a ciphertext mode, and the data user receives the returned result and decrypts the data locally.
Blockchain is a specific data structure formed by combining data blocks in a chain manner according to time sequence, and is guaranteed in a cryptographically non-tamperable and non-counterfeitable way to remove a centralized public general ledger. The technology of different fields and disciplines such as p2p network, cryptography, consensus algorithm and motivation mechanism are combined together. The generation of the local account book is performed through the cryptography algorithm, the anonymity of the account is ensured, the consensus among different nodes is realized through the distributed consistency algorithm, the falsification of the historical data by malicious users is prevented, the reference dependence among the blocks is generated through the hash algorithm, and the advantages of historical traceability and the like are realized.
Threshold secret sharing is a simple and practical key sharing regime. The proposal is a (t, n) threshold secret sharing proposal, which divides the secret value s into n parts, and when any t or more than t are known, the secret value s can be recovered.
In the cloud-edge collaborative environment, most of the existing searchable encryption schemes give users the encryption and decryption operations with high cost, but the computing power of the users in real life is limited, so that the searching efficiency is low. Meanwhile, most of the schemes at present often adopt a single authorization mechanism to generate the private key, thus easily causing the leakage of the private key and having low efficiency, so that compared with a single authorization model, the most important challenge is that a plurality of entities authorize cooperation to generate the private key, and the traceability and the safety of the private key are ensured.
Disclosure of Invention
In order to solve the technical problems, the invention provides a fine granularity access control method based on a blockchain under a cloud-edge cooperative environment, which is simple in algorithm, safe and efficient.
The technical scheme for solving the technical problems is as follows: a fine granularity access control method based on a block chain in a cloud edge cooperative environment comprises the following steps:
Step one, initializing;
Step two, encryption stage: the data owner formulates an access control policy and uploads the access control policy and corresponding data to the corresponding edge server. And then the edge server encrypts and uploads the data to the cloud server, and simultaneously sends the keyword ciphertext and the access control strategy to other edge nodes.
Step three, transaction generation phase: the edge server sends out request of consignment transaction, and each node in consensus network responds to become consignment calculation node. The edge node then generates a transaction and broadcasts the transaction to other nodes in the blockchain network.
Step four, trapdoor generation: the user generates a search trapdoor according to the keywords to be searched.
Step five, searching: after receiving the trapdoor sent by the user, the edge server firstly checks whether the access control matrix is satisfied, if the attribute set is verified not to satisfy the access control matrix, the process is stopped, otherwise, the process is continued to be executed. If the access control matrix is satisfied, checking whether corresponding data is contained, if so, acquiring the corresponding data from Cong Yun server, otherwise, returning to 0.
Step six, decryption stage: when the submitted trapdoor meets the access control policy, each node in the blockchain calculates the secret value in a multiparty and cooperative manner. And a final private key decryption is obtained, and then the data is returned to the corresponding data user.
In the above fine granularity access control method based on blockchain in cloud-edge cooperative environment, in the first step, the specific steps in the system initialization stage are as follows:
AC selects as input the set of attributes Atts. The AC selects a bilinear pair e, G 0×G0→G1, where G 0、G1 is the group of order q and G 0、g1 is its generator. Selecting a secure hash function H: Randomly selecting a, alpha, K, K,/> Where K is a symmetric key, generating a system public key/>Partial private key SK 1=(K1,K2), where/> SK 1 is sent to the DU. Generate partial private key SK 2=(Kx,K3), where/>Where x ε Atts, send SK 2 to EU. Global parameter gp= (a, H, g 0,g1,G0,G1) is generated.
In the above fine granularity access control method based on blockchain in cloud-edge cooperative environment, in the second step, the specific steps of the encryption stage are as follows:
DO formulates an access control policy (M, ρ), upload (M, ρ) and data F to corresponding edge servers, where ρ represents row-specific attributes and M is an M n matrix. EU random selection Randomly selecting w-1 elements a i generates a polynomial f (x) =s+a 1x+…+aw-1xw-1 of w-1 degree. Sub i=f(xi is calculated next). S is divided into n parts, and the threshold value is w. Then randomly select a vector/>And/>Calculation/> Then calculate/>At the same time randomly select beta,/>Keyword ciphertext/> Wherein/>The keyword ciphertext and the access control policy are sent to other edge nodes. The encrypted data is generated and uploaded to a cloud server.
In the above fine granularity access control method based on the blockchain in the cloud-edge cooperative environment, in the third step, the specific steps of the transaction generation stage are as follows:
EU sends out request for consignment calculation, each node of consensus network responds to become consignment calculation node, then generated gamma i is encrypted by public key of each node in block chain to generate a transaction TS= { CNaddr, E (gamma j),τj }, wherein CNaddr is represented as address list of consignment calculation node in network, and tau j is defined as a variable EU broadcasts the transaction to other nodes in the blockchain network, and the entrusted node acquires gamma i from the transaction and then keeps the transaction.
In the above fine granularity access control method based on blockchain in cloud-edge cooperative environment, in the fourth step, the trapdoor generation stage comprises the following specific steps:
DU is first randomly selected according to the keyword w' to be searched Generation/>Wherein the method comprises the steps of Random selection R c∈G0 further randomizes to generate T 2=SK1·Rc, commit T w=(T1,T2).
In the above fine granularity access control method based on the blockchain in the cloud-edge cooperative environment, the specific steps in the search stage are as follows:
After the EU receives the DU to search for trapdoor T w, it checks whether access control matrix M is satisfied, if it verifies that the set of attributes Atts does not satisfy access matrix M, the process is aborted, otherwise the process continues. And according to the satisfied access control matrix M, then acquiring a symmetric key K, continuing to calculate whether T 1×C1=C2 is satisfied by the received trapdoor T w, if so, acquiring corresponding data CT from the cloud server, otherwise, returning to 0.
The correctness is as follows:
If w=w', then the equation holds.
In the above fine granularity access control method based on the blockchain in the cloud-edge cooperative environment, in the sixth step, the specific steps of the decryption stage are as follows:
After the submitted trapdoor meets the access control matrix M, the gamma j nodes in the blockchain apply for calculation and then the multi-party cooperative calculation s is carried out after the application of the threshold value w nodes.
Wherein the method comprises the steps ofS is then returned to the corresponding EU. After the final private key is obtained, decryption is carried out, and the data F is returned to the corresponding data user.
The decryption process is as follows:
And finally, returning the data F wanted by the user to the corresponding data user.
The invention has the beneficial effects that:
1. The invention provides a fine granularity access control scheme based on a blockchain in a cloud-edge cooperative environment. The scheme comprises a data owner, an edge server, a blockchain, an authority center, a cloud server and a data user. Detailed definitions of the correlation algorithm are further given in terms of the system model. In our model, after the authority center generates all initial parameters and distributes the corresponding keys to the corresponding entities, the data owners can cooperate with the corresponding trusted edge servers, then the edge servers encrypt data and related keywords, then ciphertext is uploaded to the cloud servers, and the ciphertext keywords are distributed to other edge servers for data user inquiry. If a legal data user wants to search related data according to the corresponding keyword, a trapdoor can be generated according to the keyword and part of keys to be searched and sent to the corresponding edge server, and then the edge server finishes searching through the trapdoor and obtains the final key. And finally, matching the corresponding data and meeting the access control, returning the corresponding ciphertext from the cloud server, and finally decrypting and returning the ciphertext to the data user.
2. According to the invention, under the cloud-edge cooperative environment, the safe multiparty calculation of the block chain consensus network is realized by utilizing the threshold secret sharing technology, the generation of multiple authorized mechanisms of the private key is realized, and the safety privacy of the private key is effectively protected.
3. According to the cloud edge collaborative environment, encryption, decryption and search operations are performed by using the edge server, so that the computing cost of a user is effectively reduced.
Drawings
In order to more clearly illustrate the present invention, a system model diagram will be attached.
FIG. 1 is a flow chart of the present invention.
Fig. 2 is a system model diagram of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and examples.
As shown in fig. 2, fig. 2 is a system model, a cloud server is defined as a "honest and curious" semi-trusted entity, and an edge server is defined as a trusted entity.
As shown in fig. 1, a fine granularity access control method based on a blockchain in a cloud-edge cooperative environment mainly includes five stages: an initialization stage, an encryption stage, a transaction generation stage, a trapdoor generation stage and a search stage; and (3) a decryption stage. The detailed steps are as follows:
step one: an initialization stage:
the system initialization stage comprises the following specific steps:
AC selects as input the set of attributes Atts. The AC selects a bilinear pair e, G 0×G0→G1, where G 0、G1 is the group of order q and G 0、g1 is its generator. Selecting a secure hash function H: Randomly selecting a, alpha, K, K,/> Where K is a symmetric key, generating a system public key/>Partial private key SK 1=(K1,K2), where/> SK 1 is sent to the DU. Generate partial private key SK 2=(Kx,K3), where/>Where x ε Atts, send SK 2 to EU. Global parameter gp= (a, H, g 0,g1,G0,G1) is generated.
Step two: encryption stage:
the encryption stage comprises the following specific steps:
DO formulates an access control policy (M, ρ), upload (M, ρ) and data F to corresponding edge servers, where ρ represents row-specific attributes and M is an M n matrix. EU random selection Randomly selecting w-1 elements a i generates a polynomial f (x) =s+a 1x+…+aw-1xw-1 of w-1 degree. Sub i=f(xi is calculated next). S is divided into n parts, and the threshold value is w. Then randomly select a vector/>And/>Calculation/> Then calculate/>At the same time randomly select beta,/>Keyword ciphertext/> Wherein/>The keyword ciphertext and the access control policy are sent to other edge nodes. The encrypted data is generated and uploaded to a cloud server.
Step three: transaction generation phase:
the specific steps of the transaction generation stage are as follows:
EU sends out request for consignment calculation, each node of consensus network responds to become consignment calculation node, then generated gamma i is encrypted by public key of each node in block chain to generate a transaction TS= { CNaddr, E (gamma j),τj }, wherein CNaddr is represented as address list of consignment calculation node in network, and tau j is defined as a variable EU broadcasts the transaction to other nodes in the blockchain network, and the entrusted node acquires gamma i from the transaction and then keeps the transaction.
Step four: trapdoor generation:
the specific steps of the trap generation stage are as follows:
DU is first randomly selected according to the keyword w' to be searched Generation/>Wherein the method comprises the steps of Random selection R c∈G0 further randomizes to generate T 2=SK1·Rc, commit T w=(T1,T2).
Step five: searching:
the specific steps of the searching stage are as follows:
After the EU receives the DU to search for trapdoor T w, it checks whether access control matrix M is satisfied, if it verifies that the set of attributes Atts does not satisfy access matrix M, the process is aborted, otherwise the process continues. And according to the satisfied access control matrix M, then acquiring a symmetric key K, continuing to calculate whether T 1×C1=C2 is satisfied by the received trapdoor T w, if so, acquiring corresponding data CT from the cloud server, otherwise, returning to 0.
The correctness is as follows:
If w=w', then the equation holds.
Step six: decryption:
The decryption stage comprises the following specific steps:
After the submitted trapdoor meets the access control matrix M, the gamma j nodes in the blockchain apply for calculation and then the multi-party cooperative calculation s is carried out after the application of the threshold value w nodes.
Wherein the method comprises the steps ofS is then returned to the corresponding EU. After the final private key is obtained, decryption is carried out, and the data F is returned to the corresponding data user.
The decryption process is as follows:
And finally, returning the data F wanted by the user to the corresponding data user.

Claims (1)

1. A fine granularity access control method based on a block chain in a cloud edge cooperative environment is characterized by comprising the following steps:
Step one, initializing;
step two, encryption stage: the data owner formulates an access control strategy, uploads the access control strategy and corresponding data to a corresponding edge server, and then the edge server uploads the data to a cloud server in an encrypted manner, and simultaneously sends a keyword ciphertext and the access control strategy to other edge nodes;
Step three, transaction generation phase: the edge server sends out a request for entrusting a transaction, each node in the consensus network responds to become an entrusting calculation node, and then the edge node generates a transaction and broadcasts the transaction to other nodes in the blockchain network;
Step four, trapdoor generation: the user generates a search trapdoor according to the keywords to be searched;
step five, searching: after the edge server receives the trapdoor sent by the user, firstly checking whether the user attribute set meets the access control matrix, if the user attribute set is verified not to meet the access control matrix, stopping the process, otherwise, continuing to execute; if the access control matrix is met, checking whether corresponding data are contained, if so, acquiring the corresponding data from the cloud server, otherwise, returning to 0;
step six, decryption stage: when the submitted trapdoor meets the access control strategy, each node in the blockchain calculates a secret value in a multiparty way in a cooperative manner, obtains a final private key for decryption, and then returns the data to the corresponding data user;
In the first step, the specific steps of the system initialization stage are as follows:
AC selects as input the set Atts of attributes, AC selects a bilinear pair e, G 0×G0→G1, where G 0、G1 is the group of order q, G 0、g1 is its generator, and selects the secure hash function H: Randomly selecting a, alpha, K, K,/> Where K is a symmetric key, generating a system public key/>Partial private key SK 1=(K1,K2), where/> Transmit SK 1 to DU, generate partial private key SK 2=(Kx,K3), where/>Wherein x is Atts, sending SK 2 to EU, generating global parameter gp= (a, H, g 0,g1,G0,G1);
in the second step, the specific steps of the encryption stage are as follows:
DO formulates an access control policy (M, ρ), uploads (M, ρ) and data F to corresponding edge servers, where ρ represents row assignment attribute, M is an M n matrix, EU randomly selects Randomly selecting w-1 elements a i to generate a polynomial f (x) =s+a 1x+…+aw-1xw-1 of w-1 times, then calculating sub i=f(xi), dividing s into n parts, wherein the threshold value is w, and then randomly selecting a vector/>And/>Calculation/> Then calculate/>At the same time randomly select beta,/>Keyword ciphertext/> Wherein/>Sending the keyword ciphertext and the access control strategy to other edge nodes, and uploading encrypted data to a cloud server, wherein the encrypted data is generated by ciphertext CT=F.PK;
In the third step, the specific steps of the transaction generation stage are as follows:
EU sends out request for consignment calculation, each node of consensus network responds to become consignment calculation node, then generated gamma i is encrypted by public key of each node in block chain to generate a transaction TS= { CNaddr, E (gamma j),τj }, wherein CNaddr is represented as address list of consignment calculation node in network, and tau j is defined as a variable EU broadcasts the transaction to other nodes in the blockchain network, and the entrusted node acquires gamma i from the transaction and then keeps the transaction;
In the fourth step, the trapdoor generation stage comprises the following specific steps:
DU is first randomly selected according to the keyword w' to be searched Generation/>Wherein/> Random selection of R c∈G0 further randomization to generate T 2=SK1·Rc, submission of T w=(T1,T2);
In the fifth step, the specific steps of the searching stage are as follows:
After EU sends DU to search trapdoor T w, check whether to meet the access control matrix M first, if verify that user attribute set Atts does not meet the access matrix M, then the process is stopped, otherwise the procedure continues, according to the access control matrix M met, then obtain symmetric key K, continue to calculate T 1×C1=C2 for received trapdoor T w whether it is true, if so, the cloud server returns the corresponding data CT, otherwise returns 0;
The correctness is as follows:
if w=w', then the equation holds;
in the sixth step, the specific steps of the ciphertext decrypting stage are as follows:
When the submitted trapdoor meets the access control matrix M, the node application with gamma j in the blockchain calculates s in a multi-way cooperative way after the application of the node application with the threshold value w,
Wherein the method comprises the steps ofS is returned to the corresponding EU to obtain the final private key, then the final private key is decrypted, the data F is returned to the corresponding data user,
The decryption process is as follows:
And finally, returning the data F wanted by the user to the corresponding data user.
CN202211116020.6A 2022-09-14 2022-09-14 Fine granularity access control method based on blockchain in cloud-edge cooperative environment Active CN115484095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211116020.6A CN115484095B (en) 2022-09-14 2022-09-14 Fine granularity access control method based on blockchain in cloud-edge cooperative environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211116020.6A CN115484095B (en) 2022-09-14 2022-09-14 Fine granularity access control method based on blockchain in cloud-edge cooperative environment

Publications (2)

Publication Number Publication Date
CN115484095A CN115484095A (en) 2022-12-16
CN115484095B true CN115484095B (en) 2024-05-07

Family

ID=84392491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211116020.6A Active CN115484095B (en) 2022-09-14 2022-09-14 Fine granularity access control method based on blockchain in cloud-edge cooperative environment

Country Status (1)

Country Link
CN (1) CN115484095B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556495A (en) * 2020-03-19 2020-08-18 西安电子科技大学 Multi-user searchable encryption method and encryption system in Internet of vehicles environment
CN112543099A (en) * 2020-11-25 2021-03-23 南京邮电大学 Certificateless searchable encryption method based on edge calculation
WO2022007889A1 (en) * 2020-07-08 2022-01-13 浙江工商大学 Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
CN114398650A (en) * 2021-12-16 2022-04-26 西安电子科技大学 Searchable encryption system and method supporting multi-keyword subset retrieval
CN114640458A (en) * 2022-03-28 2022-06-17 湖南科技大学 Fine-grained multi-user secure searchable encryption method in cloud-edge collaborative environment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111901573A (en) * 2020-08-17 2020-11-06 泽达易盛(天津)科技股份有限公司 Fine granularity real-time supervision system based on edge calculation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556495A (en) * 2020-03-19 2020-08-18 西安电子科技大学 Multi-user searchable encryption method and encryption system in Internet of vehicles environment
WO2022007889A1 (en) * 2020-07-08 2022-01-13 浙江工商大学 Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
CN112543099A (en) * 2020-11-25 2021-03-23 南京邮电大学 Certificateless searchable encryption method based on edge calculation
CN114398650A (en) * 2021-12-16 2022-04-26 西安电子科技大学 Searchable encryption system and method supporting multi-keyword subset retrieval
CN114640458A (en) * 2022-03-28 2022-06-17 湖南科技大学 Fine-grained multi-user secure searchable encryption method in cloud-edge collaborative environment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Plane Segmentation of Point Cloud Data Using Split and Merge Based Method;Burak Kaleci;《2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)》;20191216;全文 *
云计算中基于属性的可搜索加密电子病历***;李晓蓉;宋子夜;任婧怡;徐磊;许春根;;计算机科学;20171115(S2);全文 *
基于多边缘服务器的个性化搜索隐私保护方法;张强;《通信学报》;20190225;全文 *
面向物联网的边云协同实体搜索方法;王汝言;刘宇哲;张普宁;亢旭源;李学芳;;计算机工程;20200815(08);全文 *

Also Published As

Publication number Publication date
CN115484095A (en) 2022-12-16

Similar Documents

Publication Publication Date Title
CN111835500B (en) Searchable encryption data secure sharing method based on homomorphic encryption and block chain
Zhang et al. Data security and privacy-preserving in edge computing paradigm: Survey and open issues
Zhang et al. Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
Li et al. Full verifiability for outsourced decryption in attribute based encryption
CN112019591B (en) Cloud data sharing method based on block chain
CN110224986B (en) Efficient searchable access control method based on hidden policy CP-ABE
CN110474893B (en) Heterogeneous cross-trust domain secret data secure sharing method and system
Li et al. KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage
CN108418681B (en) Attribute-based ciphertext retrieval system and method supporting proxy re-encryption
Wang et al. Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage
Wang et al. Secure channel free id-based searchable encryption for peer-to-peer group
Li et al. Privacy-preserving data utilization in hybrid clouds
Li et al. Attribute-based keyword search and data access control in cloud
Li et al. Enabling efficient and secure data sharing in cloud computing
Baseri et al. Privacy preserving fine-grained location-based access control for mobile cloud
Chen et al. Dual-server public-key authenticated encryption with keyword search
Zhang et al. Identity-based encryption with keyword search from lattice assumption
Ling et al. Group id-based encryption with equality test
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
Zhang et al. A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse
Sun et al. A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting
Ali et al. Authorized attribute-based encryption multi-keywords search with policy updating
Wang et al. Secure and efficient encrypted keyword search for multi-user setting in cloud computing
CN115834067A (en) Ciphertext data sharing method in edge cloud collaborative scene
Yan et al. Secure and efficient big data deduplication in fog computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant