Encryption and decryption method and device for a cloud computing key

A cloud computing and key technology, applied to key distribution, can solve problems such as poor user experience, consumption of system resources, and increased service response delay, achieving the effects of convenient management, ensuring security, and reducing service response delay

Active Publication Date: 2016-03-02
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the disadvantage of this approach is that it consumes system resources and greatly increases the service response delay, resulting in poor user experience. For large-scale users, it will put a lot of pressure on the key management of cloud computing service providers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device for a cloud computing key
  • Encryption and decryption method and device for a cloud computing key
  • Encryption and decryption method and device for a cloud computing key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The basic idea of ​​the present invention is: in the cloud computing service, a key with a longer life cycle is used to encrypt a key message with a shorter life cycle, so as to improve the security of key distribution.

[0034] The scheme of the present invention will be described in detail below by taking all three services provided by cloud computing, ie, IaaS, PaaS and SaaS, as examples.

[0035]The key with a long life cycle is a relative concept. For example, in the above three services, the life cycle of the IaaS key is generally several days to several months, and the life cycle of the PaaS key is generally several hours to several day, the life cycle of a SaaS key is only a few minutes or even a few seconds to a few hours. It can be seen that the life cycle of an IaaS key is longer than that of the other two, while the life cycle of a PaaS key is longer than that of a SaaS key; the life cycle Shorter keys are also a relative concept. For example, the life cycle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method and an encryption and decryption device for a cloud computing key. The method comprises that: a network side encrypts a key message with a relatively shorter life cycle by using a key with a relatively longer life cycle, and transmits the encrypted key message to a user side; and after receiving the key message, the user side decrypts the key message by using the key with the relatively longer life cycle to obtain a corresponding key. By the method and the device provided by the invention, highly-efficient and secure key distribution can be provided for cloud computing services of three levels such as an infrastructure as a service (IaaS), a platform as a service (PaaS) and software as a service (SaaS), system consumption is reduced, service response delay is shortened, the security of user data in different levels is ensured, and the life cycle of the key is more convenient to manage.

Description

technical field [0001] The invention relates to the field of cloud computing key management, in particular to a cloud computing key encryption and decryption method and device. Background technique [0002] 2009 is called the first year of "cloud computing" by the industry, and cloud computing is attracting people's attention. Whether it is Internet manufacturers, operators, communication manufacturers, or basic network operators, they all show great enthusiasm for cloud computing. Cloud computing in a narrow sense refers to the delivery and use mode of IT infrastructure, which refers to obtaining the required resources through the network in an on-demand and easy-to-expand manner; This service can be related to IT and software, the Internet, or any other service. It has unique functions such as ultra-large scale, virtualization, reliability and security. For network operators, it can greatly reduce operating costs and operation and maintenance costs, and achieve the purpos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 林兆骥李媛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products