Ciphertext cloud storage method and system

A cloud storage and cloud storage server technology, applied in the field of information security, can solve the problems of not being able to update the user's key, not providing the client synchronization function and synchronization strategy, security vulnerabilities, etc.

Inactive Publication Date: 2014-02-19
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 121 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data is lost with the loss of the terminal. Even if the cloud synchronization solution is adopted, the data existing in the terminal in plain text will also pose a risk of leakage
[0006] 2) The risk of cloud service providers abusing permissions
[0008] 4) Risk of bankruptcy of cloud service providers
This method does not provide plaintext query, and the function is incomplete; it does not provide the docking function to the third-party cloud provider, and the cost is high; the key management function is weak, and the user's key cannot be updated, and it does not provide client key storage, acquisition, A series of solutions such as update and backup; does not provide client-side synchronization function and synchronization strategy, user files can only be encrypted once for cloud storage, and does not provide client-side file operation process based on transparent encryption and decryption functions; and the security of this solution has loopholes , because the same encryption key is used for the index word and the original text, and the index word is a simple keyword after word segmentation, it can be deciphered according to the frequency cryptanalysis, and the symmetric key can be obtained, so that the information of the original text can be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext cloud storage method and system
  • Ciphertext cloud storage method and system
  • Ciphertext cloud storage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, but the scope of the present invention is not limited in any way.

[0093] In an embodiment of the present invention, the cloud storage method to ciphertext is:

[0094] a) (User) Encrypt selected files on the client; for one or more files on one or more clients, the user, i.e. the data owner, may use the same or different cryptographic device units, on the client Transparently encrypt and decrypt it with the same or different keys; the client may be a variety of smart computing devices, including mobile smart terminals (such as smart phones, PADs, PDAs or other mobile smart devices) and traditional Internet access input devices (for example: laptops, PCs or servers, etc.);

[0095] b) Set the selected files to be synchronized to the cloud or saved to the local client in the form of plaintext or ciphertext; provide synchronization poli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a ciphertext cloud storage method and system. In the ciphertext cloud storage method system composed of at least one client terminal and a cloud terminal server, the ciphertext cloud storage method comprises the steps that (1) a user adopts a ciphertext and / or a plaintext to conduct data synchronism on the client terminal in the process of data storage and selects an encryption algorithm for the ciphertext; (2) authentication parameters provided based on the identity of the user is used for generating a master key, synchronous data of the ciphertext are encrypted on the client terminal through two-level keys comprising the master key and an encryption and decryption key, and the master key is backed up; (3) the ciphertext and a ciphertext index are synchronized on the client terminal and a cloud terminal, or a plaintext index is established after synchronous data of the plaintext are synchronized on the cloud terminal and the client terminal; (4) the plaintext and / or ciphertext is / are stored in a local private cloud storage server or in a storage server of a cloud storage provider according to a mount point requested by the user. By the adoption of the ciphertext cloud storage method and system, the data cannot be lost when the terminal is lost, if protection is inappropriate, only the ciphertext form of a file is damaged, and the ciphertext cloud storage system can dock with multiple cloud server providers.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for realizing encrypted storage of user data and query of plain and ciphertext in a cloud storage environment. Background technique [0002] With the emergence of smart phones, network access devices are increasingly diversified. These smart terminals connected to the network often have certain data acquisition, storage and processing capabilities. From the perspective of users, it has become normal to have multiple smart computing devices (such as PCs, notebooks, smartphones, tablets, etc.) at the same time, and how to maintain a unified view of user files among multiple heterogeneous terminals has become necessary need. [0003] At the same time, the increasing popularity of cloud computing provides a solution for users to realize data synchronization on heterogeneous platforms. Cloud computing is a new type of computing model, which can manage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈驰杨腾飞田雪王朝刚于晶申培松朱晓杰刘华骏黄超麟
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products