Safety authentication method of cloud storage system

A cloud storage system and security authentication technology, applied in the transmission system, electrical components, etc., can solve the problems of huge authentication consumption and complicated authentication process, and achieve the effect of efficient file access, reliable file access, and cost reduction

Active Publication Date: 2012-07-11
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The invention proposes a security authentication method for a cloud storage system, which solves the problems of complex authentication process and huge authentication consumption in the existing security authentication met

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method of cloud storage system
  • Safety authentication method of cloud storage system
  • Safety authentication method of cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The invention describes a security authentication method and implementation of a cloud storage system, and is implemented in a distributed file system.

[0059] The present invention is further described below in conjunction with embodiment and accompanying drawing.

[0060] Such as figure 1 As shown, the embodiment of the present invention includes a client process, an authentication end process and a storage end process, respectively running on the client host, the authentication end host, and the storage end host of the distributed file system; User ID, the authentication end loads the access control library;

[0061] A. If figure 2 As shown, the client process includes the following steps:

[0062] (A1) The client randomly generates an access request serial number R0, sends it to the storage terminal, waits for the return information from the storage terminal, and after receiving the return information from the storage terminal, judges whether the information is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety authentication method of a cloud storage system, belonging to the field of storage technology and information security technology of computers. The method solves the problems that the existing safety authentication methods are complex in authentication process and great in authentication consumption, and aims at providing simple, flexible and efficient authentication with high expandability and high safety for service safety of a cloud storage system, so as to prevent invasion of external or internal attackers to the storage system. The method comprises a client process, an authentication end progress and a storage end progress; the client loads the user identifiers of all login users, and the authentication end loads an access control library. The method checks whether the operation authorization of the user is legal by calculating the verifying identifier, the storage end does not need to maintain the access control library any longer, and verification on the access request of the user can be completed with simple calculation, thereby greatly reducing expense of the storage system on access control, and providing flexible, safe, reliable and efficient file access for users having operation authorization in the large-scale cloud storage system.

Description

technical field [0001] The invention belongs to the field of computer storage technology and information security technology, and in particular relates to a security authentication method for a cloud storage system. Background technique [0002] Cloud storage system is a new concept extended and developed from the concept of cloud computing. For users, cloud storage system does not refer to a specific device, but a collection of many storage devices and servers. body. The fundamental goal of cloud storage system security is to ensure the security of stored and accessed data, so before authorizing users to access data, cloud storage systems should authenticate the user's identity. When a user accesses a data object, by querying the access control list of the data object on the authentication side, if the user's access control item can be found and has the permission to request the operation, the user will be granted access to the data, otherwise the user's access will be den...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 周可李春花陈杰雷栋梁罗芳申爱花李坦刘相文
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products