Method for protecting privacy data of users in cloud environment

A technology for user privacy and data protection, applied in encryption devices with shift registers/memory, transmission systems, electrical components, etc., can solve problems such as cloud platform users not knowing the service process, user loss, and cloud service distrust, etc. To achieve the effect of alleviating the problem of distrust of the cloud platform, alleviating the problem of distrust, and friendly user experience

Inactive Publication Date: 2012-09-05
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) User data in most cloud products still exists in clear text, and user authentication, multi-machine remote backup, and secure network transmission protocols (SSH, SSL) are simply used to maintain the most basic security of user data;
[0006] (2) Some cloud platforms such as amazon S3, Kingsoft Express, etc. allow users to choose to encrypt data stored in the cloud, but the key is also generated, distributed and managed by the cloud, and the control of the data is still in the cloud. One of the main reasons why users do not trust cloud services;
[0007] (3) Since the cloud platform is an open and multi-user environment, the cloud service provider cannot guarantee the security of the cloud environment. If the user's data is directly stored in the cloud, it may be exploited by malicious programs in various ways. stolen, thereby causing losses to users;
[0008] (4) Due to the characteristics of the cloud platform, the user does not know the specific service process, so when the user submits the computing task to the cloud service provider he trusts, the cloud service provider may entrust the task to other clouds for one reason or another. The service provider returns the result to the user, which may also cause the leakage of user privacy data in the process;
[0009] (5) In the traditional cryptographic algorithm, once the other party knows the decryption key in the symmetric cryptographic algorithm, the other party can use the key to decrypt all the data encrypted with the key; and in the public key cryptographic algorithm, the other party knows the decryption key, that is, the private key. The key can also decrypt all the user's information, and the public key cryptography algorithm needs to encrypt the data used by multiple users multiple times, which is what the user does not want to see

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy data of users in cloud environment
  • Method for protecting privacy data of users in cloud environment
  • Method for protecting privacy data of users in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0063] Such as figure 1 As shown, in the cloud platform, the present invention provides privacy data protection services for users through the following framework:

[0064] Set multiple proxy re-encryption nodes according to the needs and scale of the cloud platform, and even deploy proxy re-encryption services on each node. At the same time, several proxy re-encryption key storage nodes are designed to store user-authorized re-encryption keys. Provide security plug-ins on the client and other platforms that need to call the data access interface. The security plug-in can provide encryption, decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting the privacy data of users in a cloud environment. The method comprises the following steps that: a cloud platform receives a user request, and judges whether the user request is a data uploading request or a data reading request; if the user request is a data reading request, the cloud platform searches corresponding data according to an identifier of to-be-read data in the data reading request, and judges whether the data is a ciphertext; if the data is a ciphertext, the cloud platform searches whether the user is authorized in a re-encryption key server; if the user is authorized, the cloud platform re-encrypts the data into a ciphertext (can be decrypted by the user) by using a proxy re-encryption service and a re-encryption key corresponding to the user, and issues the ciphertext to the user; the user decrypts the ciphertext by using a decryption key of the user and a decryption interface of a safety plugin so as to obtain plaintext data; and the user calls a corresponding application program interface to carry out modification on uploaded data by using a client plug-in. According to the invention, the application demands of user data on the cloud platform are not affected while the privacy data of the users is protected,.

Description

technical field [0001] The invention belongs to the field of computer security, and more specifically relates to a method for protecting user privacy data in a cloud environment. Background technique [0002] With the rapid development of cloud computing, more and more enterprises and users have invested in the wave of cloud computing. However, the popularization of cloud computing has encountered obstacles. The reason is that concerns about cloud computing security are generally considered It is the primary obstacle preventing cloud computing from rapidly deploying applications in the short term. An IDC survey on cloud services shows that 74.6% of enterprise chief information officers or IT directors rank security as the number one concern when considering the use of cloud computing for enterprises. [0003] Among the various issues of cloud security, data security is closely related to the interests of users and is the most concerned issue for users. Once the data is hand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
Inventor 金海陈宏武邹德清徐鹏羌卫中
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products