[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112135278A - D2D communication privacy protection method facing 5G - Google Patents

D2D communication privacy protection method facing 5G Download PDF

Info

Publication number
CN112135278A
CN112135278A CN202011071111.3A CN202011071111A CN112135278A CN 112135278 A CN112135278 A CN 112135278A CN 202011071111 A CN202011071111 A CN 202011071111A CN 112135278 A CN112135278 A CN 112135278A
Authority
CN
China
Prior art keywords
ciphertext
data
communication
cloud server
privacy protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011071111.3A
Other languages
Chinese (zh)
Inventor
肖辉
曹亮
刘魁
刘寨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sunsheen Technology Co ltd
Original Assignee
Chengdu Sunsheen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sunsheen Technology Co ltd filed Critical Chengdu Sunsheen Technology Co ltd
Priority to CN202011071111.3A priority Critical patent/CN112135278A/en
Publication of CN112135278A publication Critical patent/CN112135278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a 5G-oriented D2D communication privacy protection method, which comprises the following steps: establishing a communication network and verifying identity; the 5G device A encrypts data by using a private key to obtain a ciphertext c 1; the 5G device A encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2; the 5G device A sends the ciphertext c2 and the processing method to the cloud server; the cloud server processes and stores the ciphertext c2 by using a processing method provided by the 5G device A; the cloud server sends the processed ciphertext to the 5G device B; and the 5G equipment B decrypts the ciphertext to obtain a result. The invention uses the homomorphic encryption technology to realize that a plurality of ciphertexts are calculated and then decrypted, and a decryption party does not need to decrypt each cipher text and cost high calculation cost, thereby not only reducing communication cost, but also transferring calculation tasks; meanwhile, even if the encrypted information is acquired by the platform side or other users, the original information of the data cannot be known, and the encrypted information can only be decrypted and encrypted by two communication sides.

Description

D2D communication privacy protection method facing 5G
Technical Field
The invention relates to the technical field of 5G computing security management, in particular to a D2D communication privacy protection method facing 5G.
Background
With the continuous development of communication technology, people have entered the 5G era. The communication in the 5G era is the communication between people and people, between people and objects, between objects and objects, so the 5G era is also the era of interconnection of everything, for example, routers, air conditioners, automobiles, refrigerators, televisions, even washing machines and the like can be on the internet. D2D communication is communication between devices, data transmission does not need to be relayed by a base station, and terminals can directly communicate with each other; the standardization organization 3GPP has already listed the D2D (device to device) technology in the development framework of the new generation mobile communication system, becoming one of the key technologies of the fifth generation mobile communication (5G). Due to the explosive growth of data, the problems of data security and privacy protection are highlighted day by day, and various privacy disclosure events sound police clocks for enterprises and users. The popularization of networks and digital life also enables hackers to obtain information of others more easily, and means which are difficult to track and prevent are provided, however, the existing laws and regulations still do not establish a perfect management system, and the current technical means can not solve the problems thoroughly. Therefore, in a big data environment, data security and privacy protection are important issues that cannot be ignored. The privacy protection of the 5G network for the user can be divided into several types, such as identity protection, location information protection, service information protection, and the like. The main measures of the traditional privacy protection include data encryption, privacy protection for restricting release, access control, transmission protection and the like, the data still has the danger of being leaked and stolen, and the behavior that a third-party service provider cannot really fulfill trust responsibility to supervise and guard against self-theft also can exist.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a 5G-oriented D2D communication privacy protection method.
The purpose of the invention is realized by the following technical scheme:
a privacy protection method for D2D communication facing 5G comprises the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
Further, the step S1 includes the following sub-steps:
s101, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s102, the 5G device B decrypts the data, encrypts the data and sends the encrypted data to the 5G device A;
s103, the 5G device A decrypts the data;
s104, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
and S105, if the decrypted data is different from the original data, the identity authentication fails, and the communication is finished.
Further, the private key is owned only by 5G device a and 5G device B.
Further, the public key is provided by the cloud server, and an asymmetric encryption mechanism is adopted.
Further, the processing method uses a private key or a public key for encryption before sending to the cloud server.
Further, the S7 includes the following sub-steps:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
The invention has the beneficial effects that: the homomorphic encryption technology is utilized to realize that a decryption party obtains a result, but does not need to obtain the information of each ciphertext, a plurality of ciphertexts are decrypted after being calculated, and each ciphertext does not need to be decrypted to cost high calculation cost, so that the communication cost can be reduced, and the calculation task can be transferred; the identity identification, the position information protection, the service information and the like of the mobile phone are encrypted through homomorphic encryption calculation, even if the information is acquired by a platform side or other users, the original information of the data cannot be known, and the encrypted information can only be decrypted and encrypted by two communication sides.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is an authentication flow diagram of the present invention.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, embodiments of the present invention will now be described with reference to the accompanying drawings.
In this embodiment, as shown in fig. 1, a method for protecting privacy of D2D communication facing 5G includes the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
In this embodiment, the private key is owned only by the 5G device a and the 5G device B.
In this embodiment, the public key is provided by a cloud server and an asymmetric encryption mechanism is adopted.
In this embodiment, the processing method uses a private key or a public key for encryption before sending to the cloud server.
In this embodiment, the S7 includes the following sub-steps:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
In this embodiment, as shown in fig. 2, the device authentication includes the following steps:
s1001, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s1002, the 5G device B decrypts the data, encrypts the data again and sends the encrypted data to the 5G device A;
s1003, the 5G device A decrypts the data;
s1004, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
s1005, if the decrypted data is different from the original data, the authentication fails, and the communication is ended.
In the embodiment, the actual use condition of the private data in the 5G network adopts privacy enhancement calculation from the aspects of data acquisition and transmission, data desensitization, data encryption, security baseline establishment, data release protection and the like, and supports a safe, flexible and on-demand privacy protection mechanism.
In the embodiment, the cloud data storage based on the homomorphic encryption technology adopts an asymmetric encryption mechanism, the public key and the homomorphic encryption algorithm provided by a cloud service provider are used for encrypting data, and then the data are transmitted and submitted to a cloud data center through ciphertext, and the cloud data center stores cloud user data to storage equipment in a cloud environment; in cloud data encryption storage, a private key is owned only by a data owner cloud user, so that only the data owner user can decrypt data in a cloud environment.
In the whole cloud computing environment, the cloud data center transmits, stores, retrieves, updates and calculates the ciphertext information, so that the confidentiality of cloud data is ensured; because the data is presented in a ciphertext mode in the cloud environment, data information cannot be disclosed even if the data is intercepted by an illegal user; by adopting a data encryption strategy of an asymmetric encryption mechanism, a decryption private key is only owned by data, and a cloud service provider of a data control manager cannot crack data information, so that a monitoring and self-theft behavior that a third-party service provider cannot really fulfill trust responsibility is avoided; meanwhile, the computing capacity and the storage capacity of the current hardware equipment are fully realized, and the equipment does not generate obvious time delay due to complex operation.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (6)

1. A privacy protection method for D2D communication facing 5G is characterized by comprising the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
2. The 5G-oriented D2D communication privacy protection method according to claim 1, wherein the step S1 includes the following sub-steps:
s101, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s102, the 5G device B decrypts the data, encrypts the data and sends the encrypted data to the 5G device A;
s103, the 5G device A decrypts the data;
s104, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
and S105, if the decrypted data is different from the original data, the identity authentication fails, and the communication is finished.
3. The 5G-oriented D2D communication privacy protection method of claim 1, wherein the private key is owned by only 5G device A and 5G device B.
4. The privacy protection method for 5G-oriented D2D communication according to claim 1, wherein the public key is provided by a cloud server and an asymmetric encryption mechanism is adopted.
5. The privacy protection method for 5G-oriented D2D communication according to claim 1, wherein the processing method is to encrypt with a private key or a public key before sending to a cloud server.
6. The 5G-oriented D2D communication privacy protection method of claim 1, wherein the S7 includes the sub-steps of:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
CN202011071111.3A 2020-10-09 2020-10-09 D2D communication privacy protection method facing 5G Pending CN112135278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011071111.3A CN112135278A (en) 2020-10-09 2020-10-09 D2D communication privacy protection method facing 5G

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011071111.3A CN112135278A (en) 2020-10-09 2020-10-09 D2D communication privacy protection method facing 5G

Publications (1)

Publication Number Publication Date
CN112135278A true CN112135278A (en) 2020-12-25

Family

ID=73843909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011071111.3A Pending CN112135278A (en) 2020-10-09 2020-10-09 D2D communication privacy protection method facing 5G

Country Status (1)

Country Link
CN (1) CN112135278A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113505390A (en) * 2021-07-12 2021-10-15 东莞理工学院 Cross-service provider epidemic situation data comparison method based on homomorphic encryption

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969446A (en) * 2010-11-02 2011-02-09 北京交通大学 Mobile commerce identity authentication method
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
WO2016112954A1 (en) * 2015-01-12 2016-07-21 Nec Europe Ltd. Method and system for providing encrypted data
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server
US20190394019A1 (en) * 2018-06-20 2019-12-26 Clemson University System And Method For Homomorphic Encryption
US20200177366A1 (en) * 2019-06-18 2020-06-04 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection
CN111641603A (en) * 2020-05-15 2020-09-08 北京青牛技术股份有限公司 Privacy set intersection data interaction method and system based on homomorphic encryption

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969446A (en) * 2010-11-02 2011-02-09 北京交通大学 Mobile commerce identity authentication method
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
WO2016112954A1 (en) * 2015-01-12 2016-07-21 Nec Europe Ltd. Method and system for providing encrypted data
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server
US20190394019A1 (en) * 2018-06-20 2019-12-26 Clemson University System And Method For Homomorphic Encryption
US20200177366A1 (en) * 2019-06-18 2020-06-04 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection
CN111641603A (en) * 2020-05-15 2020-09-08 北京青牛技术股份有限公司 Privacy set intersection data interaction method and system based on homomorphic encryption

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113505390A (en) * 2021-07-12 2021-10-15 东莞理工学院 Cross-service provider epidemic situation data comparison method based on homomorphic encryption

Similar Documents

Publication Publication Date Title
EP1025675B1 (en) Security of data connections
CN103339911B (en) Allow the encrypted message that the access of authorized side sends from mobile device
EP1394982A1 (en) Methods and apparatus for secure data communication links
CN112671798A (en) Service request method, device and system in Internet of vehicles
CN109361663B (en) Method, system and device for accessing encrypted data
CN101170413B (en) A digital certificate and private key acquisition, distribution method and device
KR20160123558A (en) Apparatus and method for Mobile Trusted Module based security of Short Message Service
AU2013269845A1 (en) Method for tracking a mobile device onto a remote displaying unit
CN104243452A (en) Method and system for cloud computing access control
CN112911588A (en) Lightweight narrowband Internet of things secure transmission method and system
US20220124074A1 (en) Method and apparatus for encrypted communication
CN111698263A (en) Beidou satellite navigation data transmission method and system
CN105471896A (en) Agent method, device and system based on SSL (Secure Sockets Layer)
CN112135278A (en) D2D communication privacy protection method facing 5G
CN115835194B (en) NB-IOT terminal safety access system and access method
CN111698203A (en) Cloud data encryption method
CN101388801B (en) Legal listening method, system and server
CN112906032B (en) File secure transmission method, system and medium based on CP-ABE and block chain
CN112069487B (en) Intelligent equipment network communication safety implementation method based on Internet of things
CN113765900A (en) Protocol interaction information output transmission method, adapter device and storage medium
CN112019553A (en) Data sharing method based on IBE/IBBE
CN117955735B (en) Data security access control method, system and storage medium
CN118041695B (en) Information interaction method, device, electronic equipment, storage medium and program product
Jain “Sec-KeyD” an efficient key distribution protocol for critical infrastructures
CN111431846A (en) Data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201225

RJ01 Rejection of invention patent application after publication