Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe access method of cloud storage system

A cloud storage system and secure access technology, applied in the field of computer storage technology and information security, which can solve the problems of complex key management and distribution

Active Publication Date: 2014-06-04
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] The present invention proposes a secure access method for a cloud storage system, which solves the problem of complex key management and distribution existing in the existing secure access method, so as to prevent external attackers from intruding into the storage system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method of cloud storage system
  • Safe access method of cloud storage system
  • Safe access method of cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The present invention is further described below in conjunction with embodiment and accompanying drawing.

[0096] Such as figure 1 As shown, the embodiment of the present invention includes a client process, an authentication end process, and a storage end process, respectively running on the client host, the authentication end host, and the storage end host of the distributed file system.

[0097] The client generates a unique master key MK and public parameter PK for each user based on the attribute password mechanism; the authenticator loads the user attribute library, file attribute library and attribute key library.

[0098] The specific processing procedures of creating a file request, reading and writing a file request, deleting a file request and rights management request will be further described below in conjunction with the embodiments.

[0099] A. If figure 2 As shown, the client process includes the following steps:

[0100] (A1) The client starts; con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safe access method of a cloud storage system, which belongs to the technical field of storage technology and information safety of computer, and solves the problem that secret key is complex to manage and dispense in safe access methods in prior arts. The method of the invention comprises a client progress, an authentication terminal progress and a storage terminal process. The client generates a main secret key and public parameters for each user based on an attribute password mechanism; the authentication terminal loads a user attribute database, a file attribute database and an attribute secret key database. In the invention, attributes of definite user, file and file operation type form an access control string to decide the access right of the user to the file, and thus problems of fine-grained access control and large scale user dynamic expansion in the complex cloud storage system can be solved, thereby greatly reducing the access control expenditure of the cloud storage system and providing an access control mechanism which is flexible, effective and safe for the safe access to the storage system.

Description

technical field [0001] The invention belongs to the field of computer storage technology and information security technology, and in particular relates to a method for safely accessing a cloud storage system. Background technique [0002] Cloud storage system is a new concept extended and developed from the concept of cloud computing. For users, cloud storage system does not refer to a specific device, but a collection of many storage devices and servers. body. Users use the cloud storage system not to use a certain storage device, but to use a data access service brought by the entire cloud storage system. [0003] While the cloud storage system brings convenience, the trust in the equipment service provider of the cloud storage system has also become a concern for users. The fundamental goal of cloud storage system security is to ensure the security of stored data, that is, the confidentiality, integrity and availability of data. How to make users believe that their pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 周可李春花陈杰雷栋梁李坦申爱花刘相文罗芳
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products