Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud data safe deleting system and method without support of trusted third party

A cloud and data file technology, applied in the transmission system, electrical components, etc., can solve the problem of increasing the cost of hackers collecting keys or attacks, achieve encryption efficiency and data security improvement, get rid of single control, and key security protection Effect

Active Publication Date: 2014-02-19
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, SafeVanish cannot avoid jump attacks and sniffing attacks. All it does is increase the cost of hackers collecting keys or attacks, and it does not fundamentally solve the key security and data security issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data safe deleting system and method without support of trusted third party
  • Cloud data safe deleting system and method without support of trusted third party
  • Cloud data safe deleting system and method without support of trusted third party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

[0045] Such as figure 1 As shown, a system and method for secure deletion of cloud data without the support of a trusted third party is composed of a distributed hash table 100, a client 200, and a cloud 300. The details are as follows:

[0046] The distributed hash table 100 stores ciphertext fragments of data file decryption keys.

[0047] The client 200 is used for encrypting data files, decrypting ci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data safe deleting system and method without the support of a trusted third part. The system comprises a distributed hash table network, a user side and a cloud. The distributed hash table network is used for storing decryption key fragments. The user side is used for encrypting and decrypting files and deleting key information and comprises a file encryption module, a file decryption module, a key distribution and reorganization module, a local key information module and a file deletion module. The file encryption module and the file decryption module are used for encrypting and decrypting the files respectively; the key distribution and reorganization module is used for fragmenting and reorganizing keys; the local key information module is used for storing relevant key information; the file deletion module is used for deleting the key information. The cloud is provided with a data server and a key management server and used for storing data ciphertext information and key information and comprises the data server and the key management server, wherein the data server is used for storing file ciphertexts, and the key management server is used for managing key relevant information. The cloud data safe deleting system and method can be used for a cloud storage environment to protect data privacy of the user side.

Description

Technical field [0001] The invention belongs to the field of cloud storage data security, and specifically relates to a cloud data security deletion system and method without the support of a trusted third party. Background technique [0002] While cloud storage services bring convenience, they also cause widespread concerns about security on the client side. The ever-increasing dependence on network services on the client side causes personal data to be cached by a third party without the client’s knowledge or control. , Copying and archiving, people need to make sure that they do not put corporate data or any personal private information or other confidential information at risk. The inability of users to fully trust cloud service providers has become the most important obstacle to the popularization of cloud storage. Especially with the popularization of online computing such as random cloud computing, user-side data privacy protection is becoming an important challenge. When...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
Inventor 曾令仿陈俭喜冯丹夏之生贺娜娜齐一川王璞
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products