CN112135278A - D2D communication privacy protection method facing 5G - Google Patents
D2D communication privacy protection method facing 5G Download PDFInfo
- Publication number
- CN112135278A CN112135278A CN202011071111.3A CN202011071111A CN112135278A CN 112135278 A CN112135278 A CN 112135278A CN 202011071111 A CN202011071111 A CN 202011071111A CN 112135278 A CN112135278 A CN 112135278A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- data
- communication
- cloud server
- privacy protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000003672 processing method Methods 0.000 claims abstract description 11
- 230000008569 process Effects 0.000 claims abstract description 4
- 230000007246 mechanism Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 abstract description 6
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000586 desensitisation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a 5G-oriented D2D communication privacy protection method, which comprises the following steps: establishing a communication network and verifying identity; the 5G device A encrypts data by using a private key to obtain a ciphertext c 1; the 5G device A encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2; the 5G device A sends the ciphertext c2 and the processing method to the cloud server; the cloud server processes and stores the ciphertext c2 by using a processing method provided by the 5G device A; the cloud server sends the processed ciphertext to the 5G device B; and the 5G equipment B decrypts the ciphertext to obtain a result. The invention uses the homomorphic encryption technology to realize that a plurality of ciphertexts are calculated and then decrypted, and a decryption party does not need to decrypt each cipher text and cost high calculation cost, thereby not only reducing communication cost, but also transferring calculation tasks; meanwhile, even if the encrypted information is acquired by the platform side or other users, the original information of the data cannot be known, and the encrypted information can only be decrypted and encrypted by two communication sides.
Description
Technical Field
The invention relates to the technical field of 5G computing security management, in particular to a D2D communication privacy protection method facing 5G.
Background
With the continuous development of communication technology, people have entered the 5G era. The communication in the 5G era is the communication between people and people, between people and objects, between objects and objects, so the 5G era is also the era of interconnection of everything, for example, routers, air conditioners, automobiles, refrigerators, televisions, even washing machines and the like can be on the internet. D2D communication is communication between devices, data transmission does not need to be relayed by a base station, and terminals can directly communicate with each other; the standardization organization 3GPP has already listed the D2D (device to device) technology in the development framework of the new generation mobile communication system, becoming one of the key technologies of the fifth generation mobile communication (5G). Due to the explosive growth of data, the problems of data security and privacy protection are highlighted day by day, and various privacy disclosure events sound police clocks for enterprises and users. The popularization of networks and digital life also enables hackers to obtain information of others more easily, and means which are difficult to track and prevent are provided, however, the existing laws and regulations still do not establish a perfect management system, and the current technical means can not solve the problems thoroughly. Therefore, in a big data environment, data security and privacy protection are important issues that cannot be ignored. The privacy protection of the 5G network for the user can be divided into several types, such as identity protection, location information protection, service information protection, and the like. The main measures of the traditional privacy protection include data encryption, privacy protection for restricting release, access control, transmission protection and the like, the data still has the danger of being leaked and stolen, and the behavior that a third-party service provider cannot really fulfill trust responsibility to supervise and guard against self-theft also can exist.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a 5G-oriented D2D communication privacy protection method.
The purpose of the invention is realized by the following technical scheme:
a privacy protection method for D2D communication facing 5G comprises the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
Further, the step S1 includes the following sub-steps:
s101, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s102, the 5G device B decrypts the data, encrypts the data and sends the encrypted data to the 5G device A;
s103, the 5G device A decrypts the data;
s104, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
and S105, if the decrypted data is different from the original data, the identity authentication fails, and the communication is finished.
Further, the private key is owned only by 5G device a and 5G device B.
Further, the public key is provided by the cloud server, and an asymmetric encryption mechanism is adopted.
Further, the processing method uses a private key or a public key for encryption before sending to the cloud server.
Further, the S7 includes the following sub-steps:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
The invention has the beneficial effects that: the homomorphic encryption technology is utilized to realize that a decryption party obtains a result, but does not need to obtain the information of each ciphertext, a plurality of ciphertexts are decrypted after being calculated, and each ciphertext does not need to be decrypted to cost high calculation cost, so that the communication cost can be reduced, and the calculation task can be transferred; the identity identification, the position information protection, the service information and the like of the mobile phone are encrypted through homomorphic encryption calculation, even if the information is acquired by a platform side or other users, the original information of the data cannot be known, and the encrypted information can only be decrypted and encrypted by two communication sides.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is an authentication flow diagram of the present invention.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, embodiments of the present invention will now be described with reference to the accompanying drawings.
In this embodiment, as shown in fig. 1, a method for protecting privacy of D2D communication facing 5G includes the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
In this embodiment, the private key is owned only by the 5G device a and the 5G device B.
In this embodiment, the public key is provided by a cloud server and an asymmetric encryption mechanism is adopted.
In this embodiment, the processing method uses a private key or a public key for encryption before sending to the cloud server.
In this embodiment, the S7 includes the following sub-steps:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
In this embodiment, as shown in fig. 2, the device authentication includes the following steps:
s1001, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s1002, the 5G device B decrypts the data, encrypts the data again and sends the encrypted data to the 5G device A;
s1003, the 5G device A decrypts the data;
s1004, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
s1005, if the decrypted data is different from the original data, the authentication fails, and the communication is ended.
In the embodiment, the actual use condition of the private data in the 5G network adopts privacy enhancement calculation from the aspects of data acquisition and transmission, data desensitization, data encryption, security baseline establishment, data release protection and the like, and supports a safe, flexible and on-demand privacy protection mechanism.
In the embodiment, the cloud data storage based on the homomorphic encryption technology adopts an asymmetric encryption mechanism, the public key and the homomorphic encryption algorithm provided by a cloud service provider are used for encrypting data, and then the data are transmitted and submitted to a cloud data center through ciphertext, and the cloud data center stores cloud user data to storage equipment in a cloud environment; in cloud data encryption storage, a private key is owned only by a data owner cloud user, so that only the data owner user can decrypt data in a cloud environment.
In the whole cloud computing environment, the cloud data center transmits, stores, retrieves, updates and calculates the ciphertext information, so that the confidentiality of cloud data is ensured; because the data is presented in a ciphertext mode in the cloud environment, data information cannot be disclosed even if the data is intercepted by an illegal user; by adopting a data encryption strategy of an asymmetric encryption mechanism, a decryption private key is only owned by data, and a cloud service provider of a data control manager cannot crack data information, so that a monitoring and self-theft behavior that a third-party service provider cannot really fulfill trust responsibility is avoided; meanwhile, the computing capacity and the storage capacity of the current hardware equipment are fully realized, and the equipment does not generate obvious time delay due to complex operation.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (6)
1. A privacy protection method for D2D communication facing 5G is characterized by comprising the following steps:
s1, establishing a communication network and verifying the identity;
s2, the 5G device A uses the private key to homomorphically encrypt the target data to obtain a ciphertext c 1;
s3, the 5G device A homomorphically encrypts the ciphertext c1 by using the public key to obtain a ciphertext c 2;
s4, the 5G device A sends the ciphertext c2 and the processing method to the cloud server;
s5, the cloud server processes and stores the ciphertext c2 by using the processing method provided by the 5G device A;
s6, the cloud server sends the processed ciphertext to the 5G device B;
and S7, the 5G device B decrypts the ciphertext to obtain a result.
2. The 5G-oriented D2D communication privacy protection method according to claim 1, wherein the step S1 includes the following sub-steps:
s101, the 5G device A encrypts original data and sends the encrypted original data to the 5G device B;
s102, the 5G device B decrypts the data, encrypts the data and sends the encrypted data to the 5G device A;
s103, the 5G device A decrypts the data;
s104, if the decrypted data is the same as the original data, the identity authentication is successful, and the communication starts;
and S105, if the decrypted data is different from the original data, the identity authentication fails, and the communication is finished.
3. The 5G-oriented D2D communication privacy protection method of claim 1, wherein the private key is owned by only 5G device A and 5G device B.
4. The privacy protection method for 5G-oriented D2D communication according to claim 1, wherein the public key is provided by a cloud server and an asymmetric encryption mechanism is adopted.
5. The privacy protection method for 5G-oriented D2D communication according to claim 1, wherein the processing method is to encrypt with a private key or a public key before sending to a cloud server.
6. The 5G-oriented D2D communication privacy protection method of claim 1, wherein the S7 includes the sub-steps of:
s701, the 5G device B decrypts the ciphertext by using the public key to obtain a ciphertext c 3;
s702, the 5G device B decrypts the ciphertext c3 with the private key to obtain the data result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011071111.3A CN112135278A (en) | 2020-10-09 | 2020-10-09 | D2D communication privacy protection method facing 5G |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011071111.3A CN112135278A (en) | 2020-10-09 | 2020-10-09 | D2D communication privacy protection method facing 5G |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112135278A true CN112135278A (en) | 2020-12-25 |
Family
ID=73843909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011071111.3A Pending CN112135278A (en) | 2020-10-09 | 2020-10-09 | D2D communication privacy protection method facing 5G |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112135278A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113505390A (en) * | 2021-07-12 | 2021-10-15 | 东莞理工学院 | Cross-service provider epidemic situation data comparison method based on homomorphic encryption |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969446A (en) * | 2010-11-02 | 2011-02-09 | 北京交通大学 | Mobile commerce identity authentication method |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103491094A (en) * | 2013-09-26 | 2014-01-01 | 成都三零瑞通移动通信有限公司 | Rapid identity authentication method based on C/S mode |
CN104079574A (en) * | 2014-07-02 | 2014-10-01 | 南京邮电大学 | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment |
WO2016112954A1 (en) * | 2015-01-12 | 2016-07-21 | Nec Europe Ltd. | Method and system for providing encrypted data |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
US20190394019A1 (en) * | 2018-06-20 | 2019-12-26 | Clemson University | System And Method For Homomorphic Encryption |
US20200177366A1 (en) * | 2019-06-18 | 2020-06-04 | Alibaba Group Holding Limited | Homomorphic data encryption method and apparatus for implementing privacy protection |
CN111641603A (en) * | 2020-05-15 | 2020-09-08 | 北京青牛技术股份有限公司 | Privacy set intersection data interaction method and system based on homomorphic encryption |
-
2020
- 2020-10-09 CN CN202011071111.3A patent/CN112135278A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969446A (en) * | 2010-11-02 | 2011-02-09 | 北京交通大学 | Mobile commerce identity authentication method |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103491094A (en) * | 2013-09-26 | 2014-01-01 | 成都三零瑞通移动通信有限公司 | Rapid identity authentication method based on C/S mode |
CN104079574A (en) * | 2014-07-02 | 2014-10-01 | 南京邮电大学 | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment |
WO2016112954A1 (en) * | 2015-01-12 | 2016-07-21 | Nec Europe Ltd. | Method and system for providing encrypted data |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
US20190394019A1 (en) * | 2018-06-20 | 2019-12-26 | Clemson University | System And Method For Homomorphic Encryption |
US20200177366A1 (en) * | 2019-06-18 | 2020-06-04 | Alibaba Group Holding Limited | Homomorphic data encryption method and apparatus for implementing privacy protection |
CN111641603A (en) * | 2020-05-15 | 2020-09-08 | 北京青牛技术股份有限公司 | Privacy set intersection data interaction method and system based on homomorphic encryption |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113505390A (en) * | 2021-07-12 | 2021-10-15 | 东莞理工学院 | Cross-service provider epidemic situation data comparison method based on homomorphic encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1025675B1 (en) | Security of data connections | |
CN103339911B (en) | Allow the encrypted message that the access of authorized side sends from mobile device | |
EP1394982A1 (en) | Methods and apparatus for secure data communication links | |
CN112671798A (en) | Service request method, device and system in Internet of vehicles | |
CN109361663B (en) | Method, system and device for accessing encrypted data | |
CN101170413B (en) | A digital certificate and private key acquisition, distribution method and device | |
KR20160123558A (en) | Apparatus and method for Mobile Trusted Module based security of Short Message Service | |
AU2013269845A1 (en) | Method for tracking a mobile device onto a remote displaying unit | |
CN104243452A (en) | Method and system for cloud computing access control | |
CN112911588A (en) | Lightweight narrowband Internet of things secure transmission method and system | |
US20220124074A1 (en) | Method and apparatus for encrypted communication | |
CN111698263A (en) | Beidou satellite navigation data transmission method and system | |
CN105471896A (en) | Agent method, device and system based on SSL (Secure Sockets Layer) | |
CN112135278A (en) | D2D communication privacy protection method facing 5G | |
CN115835194B (en) | NB-IOT terminal safety access system and access method | |
CN111698203A (en) | Cloud data encryption method | |
CN101388801B (en) | Legal listening method, system and server | |
CN112906032B (en) | File secure transmission method, system and medium based on CP-ABE and block chain | |
CN112069487B (en) | Intelligent equipment network communication safety implementation method based on Internet of things | |
CN113765900A (en) | Protocol interaction information output transmission method, adapter device and storage medium | |
CN112019553A (en) | Data sharing method based on IBE/IBBE | |
CN117955735B (en) | Data security access control method, system and storage medium | |
CN118041695B (en) | Information interaction method, device, electronic equipment, storage medium and program product | |
Jain | “Sec-KeyD” an efficient key distribution protocol for critical infrastructures | |
CN111431846A (en) | Data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201225 |
|
RJ01 | Rejection of invention patent application after publication |