Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A file security access control method based on cloud computing technology

A security access control and file access technology, applied in the field of information security, can solve the problems of unable to manage files and ensure that file information is not leaked, and achieve the effect of ensuring security and ensuring security

Active Publication Date: 2016-04-27
北京万智千鸿科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current file security management system is limited to the scope of the local area network, and the file operation management and monitoring of the host must be connected to the local area network, and it is impossible to manage the security of files sent to customers, and cannot guarantee that file information will not be leaked. Can not fully meet the needs of the current business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file security access control method based on cloud computing technology
  • A file security access control method based on cloud computing technology
  • A file security access control method based on cloud computing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] reference figure 1 , The specific process of a file security access control method based on cloud computing technology is as follows:

[0036] Step 1: Visitor A with access authority recommends visitor B who is not permitted, and informs visitor B of B’s recommendation information;

[0037] Step 2: Visitor B obtains the recommendation information and sends an application review to the cloud server to request access to the file;

[0038] Step 3: After the cloud receives the request information, it first verifies the referrer A’s access qualification, if A does not have the access qualification, it ends; otherwise, proceed to step 4;

[0039] Step 4: Authenticate the identity of visitor B, and require the pre-set license certifier to authenticate visitor B. If the license authentication judgement is not passed according to the document confidentiality policy, it ends; otherwise, go to step 5. ;

[0040] Step 5: Visitor B performs Hash operation on referrer A's visit signature and ...

Embodiment 2

[0043] The visitor recommendation information chain shown in this embodiment is as follows figure 2 As shown, after the visitor B obtains the recommended information, he applies for the access authority to the server, and the server conducts review. Each recommendation information is broadcast to the entire network, and the verified information data is added to the recommendation information chain recognized by the entire network using a distributed time stamp algorithm. The recommended information has the signature of the recommender A, which enables the server to verify the authenticity of the information if necessary; if the visitor B violates the law, the signature can be used to hold the visitor B and his recommender A accountable; When the visitor B has a problem, the information can be used to know the recommender of B and the person recommended by B, so that they can be assessed, avoiding the problem from being enlarged, and ensuring information security.

Embodiment 3

[0045] This embodiment provides a brief schematic diagram of a user accessing cloud storage data, such as image 3 Shown. When a user applies for access to a cloud storage file or recommends a new user, he must first receive the qualification review of the cloud authorization server, and only after passing the review of the authorization server can he perform operations such as file access.

[0046] The user file access qualification involved in the present invention needs to be periodically reviewed on the cloud server to ensure the safety of important files. When the following two situations occur, the cloud server will review the user's access qualifications:

[0047] (1) When users apply to the cloud authorization server for access to important files stored in the cloud, avoid illegal users from accessing important files;

[0048] (2) When a user recommends a new user to the cloud authorization server, ensure that the user has the authority to recommend a new user.

[0049] The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for control over file safety access based on the cloud computing technology. The method comprises the following steps that an accessor A with the access authority recommends an accessor B without the access authority; the accessor B requests to obtain the file access authority; a cloud terminal receives and verifies the access authority of the recommender A; the identity of the accessor B is authenticated and permission authentication is conducted on the accessor B; the accessor B computes an access signature of the accessor B, and the access signature is verified by the cloud terminal; information of the accessor B is written into a file access chain table, and the accessor B obtains the file access authority. According to the method for control over file safety access based on the cloud computing technology, the purpose of access authority authentication in a distributed type environment is achieved through accessor identity authentication, accessor permission authentication and file access recording, and therefore it is ensured that data are not leaked.

Description

Technical field [0001] The invention belongs to the field of information security technology, and in particular relates to a file security access control method based on cloud computing technology. Background technique [0002] With the rapid development of the network and the continuous expansion of the capacity of hardware storage devices, the security of confidential files has become the most concerned issue of enterprises. Now many companies are purchasing various file encryption products. In information systems, data security has become a focus of attention, and it is also a necessary means for enterprises and institutions to protect digital intellectual property rights. With the expansion of the scale of enterprises and institutions, more and more branches in various regions are going out to work. The file security management and monitoring of enterprises and institutions is not limited to the internal LAN, but has been extended to the entire network. However, the current ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李志华李朋飞
Owner 北京万智千鸿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products