A ciphertext cloud storage method and system

A cloud storage and cloud storage server technology, applied in the field of information security, can solve the problems of cloud service provider failure, weak key management function, and inability to update user's key, etc.

Inactive Publication Date: 2016-06-08
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data is lost with the loss of the terminal. Even if the cloud synchronization solution is adopted, the data existing in the terminal in plain text will also pose a risk of leakage
[0006] 2) The risk of cloud service providers abusing permissions
[0008] 4) Risk of bankruptcy of cloud service providers
This method does not provide plaintext query, and the function is incomplete; it does not provide the docking function to the third-party cloud provider, and the cost is high; the key management function is weak, and the user's key cannot be updated, and it does not provide client key storage, acquisition, A series of solutions such as update and backup; does not provide client-side synchronization function and synchronization strategy, user files can only be encrypted once for cloud storage, and does not provide client-side file operation process based on transparent encryption and decryption functions; and the security of this solution has loopholes , because the same encryption key is used for the index word and the original text, and the index word is a simple keyword after word segmentation, it can be deciphered according to the frequency cryptanalysis, and the symmetric key can be obtained, so that the information of the original text can be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ciphertext cloud storage method and system
  • A ciphertext cloud storage method and system
  • A ciphertext cloud storage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, but the scope of the present invention is not limited in any way.

[0093] In an embodiment of the present invention, the cloud storage method to ciphertext is:

[0094] a) (user) encrypts selected files on the client; for one or more files in one or more clients, the user, i.e. the data owner, can use the same or different cryptographic device unit, on the client It is transparently encrypted and decrypted with the same or different keys; the client may be various intelligent computing devices, including mobile intelligent terminals (for example: smart phones, PADs, PDAs or other mobile intelligent devices) and traditional Internet access into the device (for example: laptop, PC or server, etc.);

[0095] b) Set the selected files to be synchronized to the cloud or saved to the local client in the form of plaintext or ciphertext; prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a ciphertext cloud storage method and system. In a system composed of at least one client and a cloud server, the storage method is as follows: 1) The user chooses to use ciphertext and / or plaintext for data synchronization in the data stored at the client , and select an encryption algorithm for the ciphertext; 2) Use the authentication parameters provided by the user to generate the master key, and use the two-level key of the master key + encryption and decryption key on the client to encrypt the data synchronized with the ciphertext and Back up the master key; 3) Synchronize the ciphertext and ciphertext index between the client and the cloud; or establish a plaintext index on the cloud after synchronizing the plaintext synchronization data between the cloud and the client; 4) Store the plaintext and / or ciphertext On the local private cloud storage server or according to the mount point requested by the user, it is stored on the cloud storage provider's storage server. In the present invention, data will not be lost if the terminal is lost, and only the cipher text form of the file will be lost if the protection is improper, and the storage system can be connected to multiple cloud service providers at the same time.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for realizing encrypted storage of user data and query of plain and ciphertext in a cloud storage environment. Background technique [0002] With the emergence of smart phones, network access devices are increasingly diversified. These smart terminals connected to the network often have certain data acquisition, storage and processing capabilities. From the perspective of users, it has become normal to have multiple smart computing devices (such as PCs, notebooks, smartphones, tablets, etc.) at the same time, and how to maintain a unified view of user files among multiple heterogeneous terminals has become necessary need. [0003] At the same time, the increasing popularity of cloud computing provides a solution for users to realize data synchronization on heterogeneous platforms. Cloud computing is a new type of computing model, which can manage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈驰杨腾飞田雪王朝刚于晶申培松朱晓杰刘华骏黄超麟
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products