Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing data security boundary protection method

A technology of data security and border protection, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as lack, lack of customization, and easy damage to data integrity, and achieve good universality , Satisfy data confidentiality, improve the effect of invulnerability

Inactive Publication Date: 2014-03-05
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two methods can complete the verification of remote data very well, but they cannot be combined with data redundancy measures, resulting in the integrity of the data being easily destroyed, making the cloud data center unable to operate efficiently, and the initiation of data verification And the proof occupies a large system overhead of the client. In addition, POR only supports data encryption and verification, and is not customizable.
[0006] Therefore, the cloud computing system lacks a method to determine the security boundary combined with data redundancy, data encryption and remote data verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing data security boundary protection method
  • Cloud computing data security boundary protection method
  • Cloud computing data security boundary protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail in conjunction with the accompanying drawings and specific embodiments.

[0045] see figure 1As shown, a cloud computing data security boundary method described in the present invention takes the data interaction between the client computer and the cloud data center as the basic system model, and the client computer converts the data involved in the cloud service into unformatted data blocks The form is entrusted to the cloud data center for storage. By adopting the data block tree organization structure, it is convenient to use the metadata header information to verify the remote data block, which well ensures the security boundary of different data.

[0046] H(·):{0,1} * →{0,1} k Represents a one-way mapping function of any length to k bits in length.

[0047] Specifically include the following steps:

[0048] Step 1: The cloud server accepts the cloud service request instruction sent by the user, initiali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing data security boundary protection method. The cloud computing data security boundary protection method comprises the steps that a cloud service request instruction sent by a user is received, and a data structure and safety parameters of a system are initialized and sent to the user; the user generates a secret key message; the user sends a data storage request, the header information of the metadata of the data storage request is generated, and a cloud data center initializes a plain data append tree; the user generates and sends an encrypted data block to the cloud data center; the cloud data center maintains the plain data append tree in real time according to the serial number and version number of the data block; the user executes security boundary verification and append operation of data on the plain data append tree by utilizing the secret key information of the user. The cloud computing data center of a cloud server terminal not only provides the encryption, fault tolerance and security boundary maintenance functions for the data of the user, but also meets the confidentiality, integrity and survivability of the data.

Description

technical field [0001] The invention belongs to the field of data security in computer networks, and in particular relates to a method for encrypting and authenticating data using a tree-structured directory in a cloud computing system and ensuring a remote data security boundary. Background technique [0002] In the construction of modern enterprise informationization, traditional computers and local area networks can no longer meet the demand for increasing information volume, and the rising cloud computing technology provides a good solution, which can provide end users with flexible , customizable and low-cost storage and computing services. Therefore, individual and business users are gradually migrating their data to cloud systems. At the same time, the confidentiality, integrity and reliability of cloud data have gradually become the focus of attention. Although cloud computing has its advantages compared with traditional computing models, a series of security issue...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 杨晓元朱率率韩益亮张敏情钟卫东
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products