Batch resource sharing method for untrusted cloud centers based on exclusive OR operation and chaos

A resource sharing and resource technology, applied in the field of cloud security, can solve problems such as increased difficulty of key management, reduce the possibility of guessing and cracking, and reduce the difficulty of key management

Inactive Publication Date: 2019-02-01
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, if batch resources are shared, one resource corresponds to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch resource sharing method for untrusted cloud centers based on exclusive OR operation and chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Client A shares batch resources with client B by using an algorithm based on XOR encryption and chaos theory. The batch resources are the string "ab" and the string "cd" respectively.

[0045] A method for sharing resources in batches in an untrustworthy cloud center based on XOR operation and chaos, comprising the following steps:

[0046] 1. Client A encrypts batch resources [S 1 ,S 2 ], and upload to the cloud center

[0047] Client A maps the shared string resource to a numeric array S 1 = {0x61,0x62}, S 2 ={0x63,0x64}, the mapping method is to take the ascii code of the string and convert it to hexadecimal;

[0048] 1.1: Client A is the batch resource [S 1 ,S 2 ] to generate the corresponding initial key as [k 11 ,k 12 ],k 11 =(M=0x8b3c, u=3.5699457, x=0.5, n=16), k 12=(M=0x497f, u=3.5699457, x=0.5, n=16), where u, x, n are random numbers, the value range of u is 3.5699456=1, M is a randomly generated bit string of n bits;

[0049] 1.2 Client A calls the ch

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an untrusted cloud center batch resource sharing method based on exclusive OR operation and chaos. Client A encrypts the resource Si with the initial key k1i, and then uploadsthe encrypted resource to the cloud center. When the client A creates a target key k2, the process key is calculated according to the initial key and the target key k2. Client A uses an asymmetric keyencryption algorithm to obtain the encrypted key PBK; The client A sends the process key and the PBK to the cloud center. The cloud center records a resource sharing list; The cloud center queries the resource sharing list, and sends the key PBK corresponding to the batch resource to the client B. After obtaining the PBK and the encrypted resource from the cloud center, the client B decrypts thePBK with its own private key to obtain the target key k2, and decrypts the target key k2 to obtain the decrypted shared resource. The invention solves the problem of high algorithm complexity and highclient pressure when encrypting resource sharing.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products