Method for realizing secure transmission of data in cloud storage system

A cloud storage system and data security technology, applied in transmission systems and key distribution, can solve problems such as multi-resources, system throughput performance impact, unsuitable for large data transmission environments, etc., to achieve the effect of ensuring privacy

Inactive Publication Date: 2013-01-02
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the characteristics of the asymmetric algorithm, the data encryption and decryption process may consume a lot of resources, and at the same time,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure transmission of data in cloud storage system
  • Method for realizing secure transmission of data in cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The method of the present invention is described in detail below with reference to the accompanying drawings.

[0016] A method for a data security transmission policy in a cloud storage system relates to the security and efficiency of the cloud storage system during transmission. The specific steps of the data security transmission method are as follows:

[0017] (1) During actual data transmission, symmetric or asymmetric algorithms can be used to encrypt data according to the size of the transmitted data. When a large amount of data is transmitted, in order to ensure throughput, the data is encrypted and decrypted using a symmetric algorithm. For a small amount of data, asymmetric algorithms can be used. Symmetric algorithm encrypts data;

[0018] (2) When the symmetric algorithm is used, the key is randomly created before data transmission, and the asymmetric algorithm is used to encrypt and decrypt the key for the negotiation and exchange process of the key, so a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing the secure transmission of data in a cloud storage system. According to the method, when in the actual data transmission, the data are subjected to encryption through a symmetric algorithm or an asymmetric algorithm according to the size of the transmitted data volume; when mass data are transmitted, the data are subjected to encryption and decryption through the symmetric algorithm in order to ensure the throughput; and when a small amount of data are transmitted, the data are subjected to encryption and decryption through the asymmetric algorithm. The method is applied in the cloud storage system, so as to ensure the security of the data when the data are transmitted between a user and a cloud storage service system, thereby ensuring the privacy of the data of the user and realizing the real data security.

Description

technical field [0001] The present invention relates to computer applications, in particular to a method for secure data transmission in a cloud storage system. Background technique [0002] Cloud storage systems, especially those that provide public cloud storage, have good bandwidth and data storage security, but data may be eavesdropped or modified during transmission. When the symmetric algorithm is easy to be cracked, how to ensure the safe transmission of data on the public cloud storage system platform, the asymmetric encryption algorithm is a good choice. However, due to the characteristics of the asymmetric algorithm, the data encryption and decryption process may consume a lot of resources, and at the same time have a relatively large impact on the throughput performance of the system, which is not suitable for the transmission environment of large data volumes. [0003] By combining the asymmetric algorithm and the symmetric algorithm, the present invention guara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08
Inventor 张在贵
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products