[go: up one dir, main page]

CN106993052A - A service competition method based on cloud platform under privacy protection - Google Patents

A service competition method based on cloud platform under privacy protection Download PDF

Info

Publication number
CN106993052A
CN106993052A CN201710315850.4A CN201710315850A CN106993052A CN 106993052 A CN106993052 A CN 106993052A CN 201710315850 A CN201710315850 A CN 201710315850A CN 106993052 A CN106993052 A CN 106993052A
Authority
CN
China
Prior art keywords
server
service
demand
cloud platform
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710315850.4A
Other languages
Chinese (zh)
Inventor
李龙
古天龙
常亮
李晶晶
宁黎华
刘华东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN201710315850.4A priority Critical patent/CN106993052A/en
Publication of CN106993052A publication Critical patent/CN106993052A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0621Electronic shopping [e-shopping] by configuring or customising goods or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种隐私保护下基于云平台的服务竞争方法,包括系统准备阶段、服务需求生成与提交阶段、服务竞争与筛选阶段、服务交付与验收阶段,该方法能够在保证服务需求方隐私安全的前提下,完成包含服务需求的发布、服务提供商的选定、服务流程的协商、订单状态跟踪、服务交付与验收等过程的全周期性工作。本发明能够实现对服务需求的访问控制、保证服务需求方隐私安全、提高服务效率与质量、实现对服务过程的全周期管控且整体具有较好的可扩展性。

The invention discloses a service competition method based on a cloud platform under privacy protection, including a system preparation stage, a service demand generation and submission stage, a service competition and screening stage, and a service delivery and acceptance stage. The method can ensure the privacy of the service demander Under the premise of safety, complete the full-cycle work including the release of service requirements, selection of service providers, negotiation of service processes, order status tracking, service delivery and acceptance. The present invention can realize the access control to the service demand, guarantee the privacy and safety of the service demander, improve the service efficiency and quality, realize the full-cycle control of the service process, and have better scalability as a whole.

Description

A kind of service competition method based on cloud platform under secret protection
Technical field
The present invention relates to computer techno-stress technical field, and in particular to the service based on cloud platform under a kind of secret protection Competing method.
Background technology
With Internet of Things, internet+, the fast development of the science and technology such as intelligence manufacture, and living standard by Step is improved, requirement more and more higher of the people to quality of the life, also more focuses on the personalization in life so that " customization " becomes A kind of life style and attitude, it is small to personal belongings such as clothing, cup, jewellery, decorate greatly, wedding is planned, can enter to house Row personalized customization.All kinds of customization versions, limited edition commodity also emerge in an endless stream, and have not only been related to virtual goodses but also including physical goods.
Manufactured along with cloud, intelligence manufacture, the proposition of the advanced concept such as service orientation type enterprise, Personalized service steps Gone out a bigger step, public users can not only customize simple articles for daily use, basic service for life, it might even be possible to compared with High performance-price ratio, which customizes unique automobile product, research equipment, health diagnosis and treatment instrument etc., has the article of high scientific and technological content.
The continuous popularization of Personalized service, can promote to vie each other between enterprise.Be different from traditional technology competition, Price competition, advertising promotion competition etc., the service competition brought by personalized customization are a kind of brand-new competing under market economy Form is striven, it is enterprise for the real needs for meeting client, the trust for targetedly winning high-quality user, lifting user Satisfaction, the market competition for expanding business impact power and carrying out.It was verified that the outstanding representation in service competition is enterprise Dominate the market the magic weapon of commanding elevation, is the strategic choice in enterprise operation.
In existing personalized customization method, what is often maintained between demand for services side and service provider is a kind of a pair One relation, i.e., the form such as provide by means of the network promotion, advertisement, after the foundation of demand for services side and corresponding service provider is contacted, Clear and definite customized demand is provided and service details are further discussed.For example, by taking the designing and producing of resume as an example, demand for services side Relevant design service provider and printing service provider are required to look up, needs to include in after getting in touch with them there is provided resume Detailed content, discussion design style and the problems such as expense, carry out processing and fabricating after reaching an agreement.
The above-mentioned prominent question existed in the prior art following aspects:
One is that demand for services side generally requires to disclose the customized demand comprising privacy information to a certain extent, causes privacy Safety can not ensure;
Two be service provider's limited amount that demand for services side can be inquired and the good and bad jumbled together, and service quality can not be protected Card;
Three, which are the absence of party intermediary, carries out the work such as corresponding work is consulted, contradiction reconciles.
The content of the invention
In view of the shortcomings of the prior art, problem solved by the invention is how to set up one kind to realize to demand for services The secret protection of side, meet the personalized service demand of demand for services side, and with higher efficiency of service and service quality Service competition method.
In order to solve the above technical problems, the technical scheme that provides of the present invention is to be based on cloud platform service under a kind of secret protection The service competition method of device, this method can be completed to include demand for services on the premise of demand for services side's personal secrets are ensured Issue, the selected of service provider, the negotiation of service procedure, order status tracking, the process such as service offering and examination it is complete Periodic duty, including such as the next stage:
(1) the system preparatory stage, mainly comprising demand for services side's server, service provider server in cloud platform service Registration on device and trusted authorization central server, trusted authorization central server runs the processes such as attribute base encryption policy;Tool Body is comprised the following steps:
1) demand for services side's server completes to register in cloud platform server;
2) service provider server completes to register in cloud platform server;
3) trusted authorization central server is set up secure communication with demand for services side's server, service provider server and led to Road, and run the Setup algorithms in attribute base encryption policy, generation system public key PK, master key MK.
(2) demand for services generation and presentation stage, mainly formulate demand for services comprising demand for services side's server, formulate and visit Control strategy AP is asked, demand for services is encrypted and cloud platform server is uploaded to;Specifically comprise the following steps:
1) demand for services side's server formulates detailed demand for services, and is expressed as data M with plaintext version;
2) demand for services side's server formulates access control policy AP;
3) demand for services side's server obtains the system public key PK at trusted authorization center;
4) the Encrypt algorithms in demand for services side's server operation attribute base encryption policy, by means of access control plan The demand for services data M of plaintext version is encrypted slightly AP, obtains the demand for services data CT of ciphertext form;
5) the demand for services data CT of ciphertext form is uploaded to cloud platform server by demand for services side's server.
(3) service competition and screening stage, mainly comprising service provider server download service demand and attempt decryption, Decide whether to participate in service competition, demand for services side's server sieves all service provider servers for participating in competition Select and be uploaded to cloud platform server with winning competitor's negotiation formulation service plan, vital document and carry out the process such as backing up;Tool Body is comprised the following steps:
1) service provider server provides attribute set S and gives trusted authorization central server;
2) the Keygen algorithms in trusted authorization central server operation attribute base encryption policy, are service according to set S Provider server generation private key SK;
3) private key SK is sent to service provider server by trusted authorization central server;
4) service provider server passes through cloud platform server downloading data CT;
5) the Decrypt algorithms in service provider server operation attribute base encryption policy, by means of private key SK logarithms It is decrypted according to CT, and if only if when attribute set S meets AP successful decryption and the demand for services M for obtaining plaintext version.If solution Close success, then proceed competition, otherwise terminate competition process;
6) service provider server checks demand for services M, and decides whether to participate in service competition.If participating in competition, Continue next step operation, otherwise terminate competition process;
7) service provider server formulates service plan according to demand for services;
8) service plan is uploaded to cloud platform server by service provider server;
9) demand for services side's server receives all service plans that service provider server is submitted, and chooses the best alternatives The service provider server for winning competition is selected, and bulletin is issued via cloud platform server;
10) the service provider server login cloud platform server for participating in competition checks bulletin, if winning current competitive, Then continue next step operation, otherwise terminate competition process;
11) service provider server for winning current competitive is consulted to formulate detailed clothes with demand for services side's server Business scheme simultaneously signs service contract;
12) demand for services side's server and service provider server respectively by the service plan produced in negotiations process, The vital documents such as agreement contract are uploaded to cloud platform server archive.
(4) service offering and acceptance phase, mainly provide phase comprising service provider server according to given service scheme It should service, cloud platform server carries out management and control, demand for services side's server to service process and the process such as service carried out an acceptance inspection;Tool Body is comprised the following steps:
1) demand for services side's server down payment and real-time tracking order status;
2) service provider server progressively provides respective service according to given service scheme, and enters in cloud platform server Row real-time status updates;
3) cloud platform server carries out management and control to service provider server, such as sampling check for quality, progress supervision;
4) service provider server completes to service according to given service scheme, and carrying out registration in cloud platform server takes out Inspection;
5) service provider server is delivered the service that examination passes through;
6) demand for services side's server closes remaining fund after confirming;
7) demand for services side's server services in cloud platform server registers and completes and service is scored.
So far, competitive service terminates.
As a further improvement on the present invention, after service terminates, in the event of Transaction Disputes, demand for services side's server With any one party in service provider server, it can initiate to appeal by cloud platform server, and in demand for services side's clothes It is engaged in after device, service provider server and cloud platform server tripartite deliberation, is made the award by cloud platform server.
Access control to demand for services can be realized using technical scheme, ensure demand for services side's server Personal secrets, Standard Service design, improve efficiency of service and quality, shorten service cycle, realize complete period management and control, control user Demand, reduction operation cost of enterprises, enhancing enterprise competitiveness, promotion industry development, and it is overall with preferable scalability.
Brief description of the drawings
Fig. 1 is the system structural framework figure of the present invention;
Fig. 2 is the block schematic illustration for being used for realizing the attribute base encryption policy of secret protection in the present invention;
Fig. 3 is flow chart of the present invention;
Fig. 4 is flow chart of the embodiment of the present invention.
Embodiment
The embodiment to the present invention is further described with reference to the accompanying drawings and examples, but is not to this hair Bright restriction.
Fig. 1 shows the service competition system based on cloud platform under a kind of secret protection, including:Demand for services side is serviced Device, cloud platform server, service provider server, trusted authorization central server, system are ensureing the demand for services side On the premise of server personal secrets, the issue comprising demand for services, the selected of service provider server, service procedure are completed Negotiation, order status tracking, service offering with check and accept etc. process complete period sex work.
Fig. 2 shows the attribute base encryption policy for realizing secret protection, includes following algorithm:
(1) Setup algorithms, are performed, primary operational by trusted authorization central server:Generation system public key PK and master key MK;
(2) Encrypt algorithms, are performed, primary operational by demand for services side's server:
1) the system public key PK of trusted authorization central server generation is obtained;
2) corresponding access structure is generated according to pre-defined access control policy;
3) cryptographic operation to the demand for services data M of plaintext version is further completed based on the access structure;
4) the ciphertext form demand for services data CT of generation is uploaded to cloud platform server;
(3) Keygen algorithms, are performed, primary operational by trusted authorization central server:
1) the attribute set S that provider server is provided is received;
2) private key for user SK is generated according to attribute set S;
(4) Decrypt algorithms, are performed by service provider server, primary operational:
1) service provider server obtains the demand for services data CT of ciphertext form from cloud platform server;
2) decryption to ciphertext form demand for services data CT is completed according to owned private key SK, obtains plaintext version Demand for services data M.
Fig. 3 shows flow chart of the present invention, a kind of service competition method based on cloud platform server under secret protection, should Method can be completed comprising the issue of demand for services, service provider on the premise of demand for services side's personal secrets are ensured The complete period sex work of the processes such as the selected, negotiation of service procedure, order status tracking, service offering and examination, including it is as follows Stage:
(1) the system preparatory stage, mainly comprising demand for services side's server, service provider server in cloud platform service Registration on device and trusted authorization central server, trusted authorization central server runs the processes such as attribute base encryption policy;Tool Body is comprised the following steps:
1) demand for services side's server completes to register in cloud platform server;
2) service provider server completes to register in cloud platform server;
3) trusted authorization central server is set up secure communication with demand for services side's server, service provider server and led to Road, and run the Setup algorithms in attribute base encryption policy, generation system public key PK, master key MK.
(2) demand for services generation and presentation stage, mainly formulate demand for services comprising demand for services side's server, formulate and visit Control strategy AP is asked, demand for services is encrypted and cloud platform server is uploaded to;Specifically comprise the following steps:
1) demand for services side's server formulates detailed demand for services, and is expressed as data M with plaintext version;
2) demand for services side's server formulates access control policy AP;
3) demand for services side's server obtains the system public key PK at trusted authorization center;
4) the Encrypt algorithms in demand for services side's server operation attribute base encryption policy, by means of access control plan The demand for services data M of plaintext version is encrypted slightly AP, obtains the demand for services data CT of ciphertext form;
5) the demand for services data CT of ciphertext form is uploaded to cloud platform server by demand for services side's server.
(3) service competition and screening stage, mainly comprising service provider server download service demand and attempt decryption, Decide whether to participate in service competition, demand for services side's server sieves all service provider servers for participating in competition Select and be uploaded to cloud platform server with winning competitor's negotiation formulation service plan, vital document and carry out the process such as backing up;Tool Body is comprised the following steps:
1) service provider server provides attribute set S and gives trusted authorization central server;
2) the Keygen algorithms in trusted authorization central server operation attribute base encryption policy, are service according to set S Provider server generation private key SK;
3) private key SK is sent to service provider server by trusted authorization central server;
4) service provider server passes through cloud platform server downloading data CT;
5) the Decrypt algorithms in service provider server operation attribute base encryption policy, by means of private key SK logarithms It is decrypted according to CT, and if only if when attribute set S meets AP successful decryption and the demand for services M for obtaining plaintext version.If solution Close success, then proceed competition, otherwise terminate competition process;
6) service provider server checks demand for services M, and decides whether to participate in service competition.If participating in competition, Continue next step operation, otherwise terminate competition process;
7) service provider server formulates service plan according to demand for services;
8) service plan is uploaded to cloud platform server by service provider server;
9) demand for services side's server receives all service plans that service provider server is submitted, and chooses the best alternatives The service provider server for winning competition is selected, and bulletin is issued via cloud platform server;
10) the service provider server login cloud platform server for participating in competition checks bulletin, if winning current competitive, Then continue next step operation, otherwise terminate competition process;
11) service provider server for winning current competitive is consulted to formulate detailed clothes with demand for services side's server Business scheme (this process may be carried out repeatedly) simultaneously signs service contract;
12) demand for services side's server and service provider server respectively by the service plan produced in negotiations process, The vital documents such as agreement contract are uploaded to cloud platform server archive.
(4) service offering and acceptance phase, mainly provide phase comprising service provider server according to given service scheme It should service, cloud platform server carries out management and control, demand for services side's server to service process and the process such as service carried out an acceptance inspection;Tool Body is comprised the following steps:
1) demand for services side's server down payment and real-time tracking order status;
2) service provider server progressively provides respective service according to given service scheme, and enters in cloud platform server Row real-time status updates;
3) cloud platform server carries out management and control to service provider server, such as sampling check for quality, progress supervision;
4) service provider server completes to service according to given service scheme, and carrying out registration in cloud platform server takes out Inspection;
5) service provider server is delivered the service that examination passes through;
6) demand for services side's server closes remaining fund after confirming;
7) demand for services side's server services in cloud platform server registers and completes and service is scored.
So far, competitive service terminates.
Embodiment:
It is each in service competition system so that enterprise B is by competing medicine equipment customization processing service of the completion to user A as an example The data interaction of individual inter-entity as shown in figure 4, under the secret protection service competition based on cloud platform be divided into four-stage:
(1) the system preparatory stage
1) demand for services side's server such as user A completes to register in cloud platform server;
2) service provider server such as enterprise B completes to register in cloud platform server;
3) trusted authorization central server is set up secure communication with demand for services side's server, service provider server and led to Road, and run the generation system public key of the Setup algorithms in attribute base encryption policy PK, master key MK.
(2) demand for services generation and presentation stage
1) user A formulates detailed demand for services, such as purposes of the medicine equipment, size, applicable crowd, Material Processing Deng, and data M is expressed as with plaintext version;
2) user A formulates access control policy AP, such as:Possessing medicine equipment production qualification ∧, ((client is full by listed company ∨ Meaning degree>90% ∧ registered capitals>5000000 yuan));
3) user A obtains the system public key PK at trusted authorization center;
4) user A runs the Encrypt algorithms in attribute base encryption policy, by means of control strategy AP to plaintext version Demand for services data M is encrypted, and obtains the demand for services data CT of ciphertext form;
5) the demand for services data CT of ciphertext form is uploaded to cloud platform server by user A;
(3) service competition and screening stage
1) service provider server provides attribute set S and gives trusted authorization central server;
2) the Keygen algorithms in trusted authorization central server operation attribute base encryption policy, according to attribute set S, be Service provider server generation private key SK;
3) private key SK is sent to service provider server by trusted authorization central server;
4) service provider server passes through cloud platform server downloading data CT;
5) the Decrypt algorithms in service provider server operation attribute base encryption policy, by means of private key SK logarithms It is decrypted according to CT, and if only if when attribute set S meets AP successful decryption and the demand for services M for obtaining plaintext version.
By taking enterprise B as an example, its attribute possessed is (to possess medicine equipment production qualification, CSAT=98%, registration Fund=8,000,000 yuan), it is clear that the access control policy AP of user A formulations, therefore successful decryption are met, proceeds competition;And The attribute that enterprise C possesses is (not possessing medicine equipment production qualification, CSAT=5%, registered capital=500,000 yuan), nothing Method meets the access control policy AP of user A formulations, therefore decryption failure, terminates competition process;
The process can cross the privacy information (individual such as name, sex, morbid state and home address for ensureing user A Information, the sequence information such as medicine equipment species, quantity and parameter) the poor enterprise C of credit worthiness is not leaked to, so that in certain journey Ensure the information security of user on degree.
6) service provider server checks demand for services M, and decides whether to participate in service competition.If participating in competition, Continue next step operation, otherwise terminate competition process;
7) service provider server formulates medicine equipment customization processing scheme according to demand for services;
8) medicine equipment each formulated customization processing scheme is uploaded to cloud platform clothes by service provider server respectively Business device;
9) demand for services side's server receives all medicine equipments customization processing scheme that service provider server is submitted, And all service provider servers are ranked up to choose the best alternatives, that is, select the service provider's (vacation for winning competition It is set to enterprise B) and issue bulletin via cloud platform server;
Enterprise can participate in competition to get a profit, expand the reasons such as popularity, therefore, and this process ensure that flat There are enough enterprises to participate in competition on platform so that user can possess enough selections, and excite enterprise to a certain extent The creativity of industry, the competitiveness for strengthening enterprise.
Wherein, the sequencer procedure of all service provider servers can be scored by means of related mathematical theory, Highest scoring person wins competition.Such as:The service provider server i score function for participating in competition is:
Wherein, Si(hundred-mark system) is scored for the service plan that service provider server i is uploaded;CiTaken for service provider The conventional service quality of device i of being engaged in scores (being evaluated jointly by cloud platform server and conventional user), CmaxTo be serviced in similar service provider Quality score peak;TiThe punctual delivery rate serviced in the past for service provider server i, TmaxTo be taken in similar service provider The peak for punctual delivery rate of being engaged in.
10) the service provider server login cloud platform server for participating in competition checks bulletin, if winning current competitive, Then continue next step operation (enterprise B), otherwise terminate competition process (enterprise of all participations competition in addition to enterprise B);
11) enterprise B consults to formulate detailed service plan (this process may be carried out repeatedly) and sign clothes with user A Business contract;
12) vital documents such as the service plan produced in negotiations process, agreement contract are uploaded to by user A, enterprise B respectively Cloud platform server is achieved.
(4) service offering and acceptance phase
1) user A down payment and real-time tracking order status;
2) enterprise B progressively provides respective service according to given service scheme, and carries out real-time status in cloud platform server Update;
3) cloud platform server carries out management and control to enterprise B, such as sampling check for quality, progress supervision;
4) enterprise B is completed to service according to given service scheme, and registration sampling observation is carried out in cloud platform server;
5) enterprise B is delivered the service that examination passes through;
6) user A closes remaining fund after confirming;
7) user A is serviced in cloud platform server registers and is completed and service is scored.
So far, enterprise B is completed by competition and customizes processing service to user A medicine equipment.
Access control to demand for services can be realized using technical scheme, ensure demand for services side's server Personal secrets, Standard Service design, improve efficiency of service and quality, shorten service cycle, realize complete period management and control, control user Demand, reduction operation cost of enterprises, enhancing enterprise competitiveness, promotion industry development, and it is overall with preferable scalability.
Embodiments of the present invention are made that with detailed description above in association with accompanying drawing, but the present invention be not limited to it is described Embodiment.To those skilled in the art, without departing from the principles and spirit of the present invention, these are implemented Mode carries out various change, modification, replacement and modification and still fallen within protection scope of the present invention.

Claims (6)

1. a kind of service competition method based on cloud platform under secret protection, this method can ensure demand for services side's privacy peace On the premise of complete, complete the issue comprising demand for services, the selected of service provider, the negotiation of service procedure, order status with The complete period sex work of the process such as track, service offering and examination, it is characterised in that:Including such as next stage:
(1)The system preparatory stage, mainly comprising demand for services side's server, service provider server in cloud platform server and Registration on central server, trusted authorization central server runs the processes such as attribute base encryption policy;
(2)Demand for services is generated and presentation stage, and mainly formulating demand for services, formulation comprising demand for services side's server accesses control Strategy AP is made, demand for services is encrypted and cloud platform server is uploaded to;
(3)Service competition and screening stage, mainly include service provider server download service demand and attempt to decrypt, determine Whether participate in service competition, demand for services side's server all service provider servers for participating in competition are screened and Competitor's negotiation formulation service plan, vital document is won to be uploaded to cloud platform server and carry out the process such as backing up;
(4)Service offering and acceptance phase, mainly provide corresponding clothes comprising service provider server according to given service scheme Business, cloud platform server carry out management and control, demand for services side's server to service process and the process such as service carried out an acceptance inspection.
2. the service competition method based on cloud platform under secret protection according to claim 1, it is characterised in that:The rank Section(1)In, specifically comprise the following steps:
1)Demand for services side's server completes to register in cloud platform server;
2)Service provider server completes to register in cloud platform server;
3)Trusted authorization central server sets up secured communication channel with demand for services side's server, service provider server, And run the Setup algorithms in attribute base encryption policy, generation system public key PK, master key MK.
3. the service competition method based on cloud platform under secret protection according to claim 1, it is characterised in that:The rank Section(2)In, specifically comprise the following steps:
1)Demand for services side's server formulates detailed demand for services, and is expressed as the data M of plaintext version;
2)Demand for services side's server formulates access control policy AP;
3)Demand for services side's server obtains the system public key PK at trusted authorization center;
4)Encrypt algorithms in demand for services side's server operation attribute base encryption policy, by means of access control policy AP The demand for services data M of plaintext version is encrypted, the demand for services data CT of ciphertext form is obtained;
5)The demand for services data CT of ciphertext form is uploaded to cloud platform server by demand for services side's server.
4. the service competition method based on cloud platform under secret protection according to claim 1, it is characterised in that:The rank Section(3)In, specifically comprise the following steps:
1)Service provider server provides attribute set S and gives trusted authorization central server;
2)Keygen algorithms in trusted authorization central server operation attribute base encryption policy, are provided according to set S for service Business's server generation private key SK;
3)Private key SK is sent to service provider server by trusted authorization central server;
4)Service provider server passes through cloud platform server downloading data CT;
5)Decrypt algorithms in service provider server operation attribute base encryption policy, by means of private key SK to data CT It is decrypted, and if only if when attribute set S meets AP successful decryption and the demand for services M for obtaining plaintext version;If being decrypted into Work(, then proceed competition, otherwise terminate competition process;
6)Service provider server checks demand for services M, and decides whether to participate in service competition;If participating in competition, continue Next step is operated, and otherwise terminates competition process;
7)Service provider server formulates service plan according to demand for services;
8)Service plan is uploaded to cloud platform server by service provider server;
9)Demand for services side's server receives all service plans that service provider server is submitted, and chooses the best alternatives(I.e. The selected service provider server for winning competition)And issue bulletin via cloud platform server;
10)The service provider server login cloud platform server for participating in competition checks bulletin, if winning current competitive, after Continuous next step operation, otherwise terminates competition process;
11)The service provider server for winning current competitive is consulted to formulate detailed service side with demand for services side's server Case(This process may be carried out repeatedly)And sign service contract;
12)Demand for services side's server is with service provider server respectively by the service plan produced in negotiations process, agreement The vital documents such as contract are uploaded to cloud platform server archive.
5. the service competition method based on cloud platform under secret protection according to claim 1, it is characterised in that:The rank Section(4)In, specifically comprise the following steps:
1)Demand for services side's server down payment and real-time tracking order status;
2)Service provider server progressively provides respective service according to given service scheme, and is carried out in fact in cloud platform server When state update;
3)Cloud platform server carries out management and control to service provider server, such as sampling check for quality, progress supervision;
4)Service provider server is completed to service according to given service scheme, and registration sampling observation is carried out in cloud platform server;
5)Service provider server is delivered the service that examination passes through;
6)Demand for services side's server closes remaining fund after confirming;
7)Demand for services side's server services in cloud platform server registers and completes and service is scored.
6. the service competition method based on cloud platform under the secret protection according to any one of claim 1 to 5, its feature exists In:It is any one in demand for services side's server and service provider server in the event of Transaction Disputes after service terminates Side, can initiate to appeal by cloud platform server, and in demand for services side's server, service provider server and cloud platform After server tripartite confers, made the award by cloud platform server.
CN201710315850.4A 2017-05-08 2017-05-08 A service competition method based on cloud platform under privacy protection Pending CN106993052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710315850.4A CN106993052A (en) 2017-05-08 2017-05-08 A service competition method based on cloud platform under privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710315850.4A CN106993052A (en) 2017-05-08 2017-05-08 A service competition method based on cloud platform under privacy protection

Publications (1)

Publication Number Publication Date
CN106993052A true CN106993052A (en) 2017-07-28

Family

ID=59418766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710315850.4A Pending CN106993052A (en) 2017-05-08 2017-05-08 A service competition method based on cloud platform under privacy protection

Country Status (1)

Country Link
CN (1) CN106993052A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1218829A1 (en) * 2000-06-13 2002-07-03 Lucent Technologies Inc. Methods and apparatus for providing privacy-preserving global customization
CN102054248A (en) * 2009-10-28 2011-05-11 郑勇 Method and system for managing electronic decoration bidding and credit thereof
CN103763319A (en) * 2014-01-13 2014-04-30 华中科技大学 Method for safely sharing mobile cloud storage light-level data
CN104954447A (en) * 2015-05-29 2015-09-30 桂林电子科技大学 Mobile intelligent device security service implementation method and system supporting attribute based encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1218829A1 (en) * 2000-06-13 2002-07-03 Lucent Technologies Inc. Methods and apparatus for providing privacy-preserving global customization
CN102054248A (en) * 2009-10-28 2011-05-11 郑勇 Method and system for managing electronic decoration bidding and credit thereof
CN103763319A (en) * 2014-01-13 2014-04-30 华中科技大学 Method for safely sharing mobile cloud storage light-level data
CN104954447A (en) * 2015-05-29 2015-09-30 桂林电子科技大学 Mobile intelligent device security service implementation method and system supporting attribute based encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄保华等: ""云存储平台下基于属性的数据库访问控制策略"", 《计算机科学》 *

Similar Documents

Publication Publication Date Title
CN110135819B (en) Block chain-based third-party trusted data transaction system and method
AU755320B2 (en) Apparatus and process for verifying honest gaming transactions over a communications network
CN110211683B (en) Support vector machine medical data privacy training system based on block chain
CN107454114A (en) A kind of auction bidding method, server and readable storage medium storing program for executing
CN109074580A (en) Method and system for secure transfer of entities over a blockchain
JP2014512056A (en) Systems and methods for information security
KR20040013726A (en) Method and Apparatus for distributing contents through on-line
CN103918219A (en) Electronic content distribution based on secret sharing
CN103546581A (en) Cloud education system facing pre-school children
CN109658130A (en) It is recycled based on block chain and provides Coupon Method, device, equipment and storage medium
CN110380845A (en) Quantum secret communication alliance chain method of commerce based on group's pool of symmetric keys, system, equipment
CN109345331A (en) A Task Assignment Method for Crowd Sensing System with Privacy Protection
CN110210245A (en) A kind of medical data machine learning privacy training method based on block chain
CN109284623A (en) A management method for crowdsensing tasks based on user privacy protection
CN110490640A (en) Method, apparatus and system for object distribution processor
Puneeth et al. A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology
CN119301628A (en) Systems and platforms for creating and managing fractionalized non-fungible tokens
CN115147224A (en) Transaction data sharing method and device based on alliance chain
CN106993052A (en) A service competition method based on cloud platform under privacy protection
JP2002123772A5 (en)
CN106993053A (en) Service competition system based on cloud platform under privacy protection
Kakkar et al. Blockchain applications in various sectors beyond: bitcoin
Geng et al. Poster: Smart-contract based incentive mechanism for K-anonymity privacy protection in LBSs
Chung et al. Bidder-anonymous english auction scheme with privacy and public verifiability
Tso Untraceable and anonymous mobile payment scheme based on near field communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170728