Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud storage and aggregation architecture and its data storage and aggregation method

A technology of data storage and aggregation method, which is applied in the computer field to achieve the effect of data security

Inactive Publication Date: 2014-10-15
SHANGHAI JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of these existing technologies can guarantee the absolute security of the database and immunity from intrusion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage and aggregation architecture and its data storage and aggregation method
  • Cloud storage and aggregation architecture and its data storage and aggregation method
  • Cloud storage and aggregation architecture and its data storage and aggregation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and embodiments, but the protection scope of the present invention should not be limited thereby.

[0025] The first option: in figure 1 , the user on the left stores the user's data in multiple different storage clouds (middle part) after being divided by the user. Each storage cloud gets a user's data block. Each storage cloud is independent of each other, and it is not allowed to communicate with each other to conspire to detect user data information, so each cloud cannot know the complete user data.

[0026] In terms of data aggregation: In this architecture, an independent and trusted third-party server (right part) distributes keys for each storage cloud (r 1 , r 2 ,...,r n ). Each storage cloud gets a key, and the sum of all the keys is zero, using c im to represent each private key.

[0027] Σ i = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses cloud storage and aggregation architecture and a data storage and aggregation method by using the same. The cloud storage and aggregation architecture comprises users for partitioning data or encrypting the data through aggregation servers, independent storage clouds for storing and locally aggregating the data, third-party credible servers for performing key distribution on the storage clouds and data aggregation servers for performing total aggregation on the received data and decrypting results. By the cloud storage and aggregation architecture and the data storage and aggregation method by using the same, the security of the data in the storage clouds of the user is guaranteed, and the user cannot know the data condition of the storage clouds when the aggregation servers aggregate the data.

Description

technical field [0001] The invention belongs to the field of computers and relates to network data storage technology, in particular to a cloud storage and aggregation architecture and a data storage and aggregation method thereof. Background technique [0002] At present, data cloud storage and data aggregation technologies are becoming more and more important in scientific research and practical applications. In data cloud storage applications, it is inevitable to encounter the challenge of privacy leakage. Traditionally, when an individual user stores sensitive information on a local server, the individual user must trust that the server's hardware and software are safe and reliable. In terms of data security protection, there are already many mature technologies, such as access control, intrusion detection and data access policy and so on. However, none of these existing technologies can guarantee the absolute security and intrusion immunity of the database. For examp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 朱浩瑾曹珍富肖承欣贾巍巍
Owner SHANGHAI JIAOTONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More