Method for cloud storage security control

A technology of security control and cloud storage, applied in the field of cloud storage, which can solve the problem of low security of private keys

Active Publication Date: 2013-08-07
北京书生信息技术有限公司
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a cloud storage security control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for cloud storage security control
  • Method for cloud storage security control
  • Method for cloud storage security control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0018] figure 1 It is a flowchart of a storage method provided by an embodiment of the present invention. In this embodiment, the storage key is used to encrypt the data file; at the same time, two different encryption methods are used to encrypt the storage key to form a personal key (personal key) and a data key (data key); The key of the user to whom the file belongs is the decryption key, and the storage key can be obtained after decrypting the personal key; the storage key can be obtained after decrypting the data key with the data file before encryption as the decryption key; Data files, personal keys and data keys. The method also includes:

[0019] Step 101: Before storing the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for cloud storage security control, which is used for solving the problems that since shared storage is commonly adopted during the storage in the prior art, and service providers need to control private keys, the security of private keys is low. The method comprises the steps of encrypting a private key issued to each user through two different encryption modes, so as to form a first cryptographic key and a second cryptographic key, storing the first cryptographic key and the second cryptographic key, receiving answers to security problems input by the user after decryption failure of the first cryptographic key through user passwords, deciphering the second cryptographic key through the answers to the security problems, so as to obtain a clear cryptographic key, resetting the user passwords, and encrypting the clear cryptographic key obtained by deciphering the answers to the security problems, so as to form a new first cryptographic key to be stored.

Description

technical field [0001] The invention relates to the field of cloud storage, in particular to a method for cloud storage security control. Background technique [0002] With the development of science and technology, cloud storage has increasingly become a trend, and various cloud storage technologies emerge in endlessly. In order to ensure the security of cloud storage data, various encryption methods are usually used to ensure data security. For example, through Asymmetric key encryption is used to ensure the security of data. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is kept secretly by the user, that is, the private key. . The message sender uses the public key to encrypt, and the message receiver uses the private key to decrypt. [0003] In the process of implementing the embodiments of the present invention, the inventors found that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/08
CPCG06F21/6209G06F2221/2131H04L9/0822H04L9/0863H04L9/0891H04L9/3226
Inventor 王东临
Owner 北京书生信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products