Method for realizing secure network backup system under cloud storage environment

An implementation method and cloud storage technology, applied in the transmission system, electrical components, etc., can solve the problems of destroying data security and reducing system efficiency

Active Publication Date: 2012-09-19
TSINGHUA UNIV
View PDF3 Cites 126 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method seems to be very safe and appropriate, but it brings new disadvantages to the system: shared users must wait until the shared data owner goes online to obtain access rights, which greatly reduces the efficiency of the system, and at the same time affects the sys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure network backup system under cloud storage environment
  • Method for realizing secure network backup system under cloud storage environment
  • Method for realizing secure network backup system under cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0104] Step 1: System initialization.

[0105] The client computer, hereinafter referred to as the client, is equipped with a data encryption and decryption module, a data integrity verification module, a local monitoring module, a folder sharing module and a protocol communication module;

[0106] The server is equipped with: identity verification module, storage control module, access control module, version control module and directory metadata management module, among which:

[0107] The directory metadata management module is used to query and update directory metadata, including: directory type, owner username, absolute path, access control list, number of authorized users, and key generation way, wherein the access control list includes: user names and corresponding key ciphertexts, the key ciphertexts are encrypted using the corresponding user's public key, and the corresponding user can use their own private key to decrypt;

[0108] The cloud storage server is here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing a secure network backup system under a cloud storage environment, belonging to the technical field of storage security. The method is characterized in that a system architecture is invented in a trust network of a network backup system under the cloud storage environment, a trust domain is established in a server according to a user requirement, and then identity authentication is performed by using a public key infrastructure (PKI), so that the non-deceptiveness and non-repudiation of a user are guaranteed; a Hash algorithm is used to calculate a Hash value of a file, a key and an advanced encryption standard (AES) algorithm are used for data encryption, and then the ciphertext of the file is uploaded to a file server in a cloud storage area, so that the confidentiality and the completeness of data are guaranteed; a synchronization manner based on a directory tree is used to increase the synchronization efficiency and the confidentiality of the system; a hierarchical key management manner is used to reduce the management burden of the system while guaranteeing data security; a version control function is provided to guarantee the continuity of the version of the file; and encryption key selection manners of many levels of granularity are provided to increase the flexibility of the system.

Description

technical field [0001] The implementation method of the secure network disk system under the cloud storage environment belongs to the field of storage security, and particularly relates to the technical fields of security access control, data synchronization, key distribution management, and file management. Background technique [0002] With the rapid development of cloud computing technology, cloud storage has gradually received widespread attention and application. File owners can upload their confidential files to cloud storage, which will be managed uniformly by cloud storage service providers. The network disk system is convenient. It is a typical application of cloud storage. Through the network disk system, file owners can authorize other users to use their own files, and realize collaborative work among users through sharing and data synchronization. [0003] Although the network disk system can use cloud storage as a medium to conveniently realize collaborative wo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 舒继武傅颖勋
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products