A cloud computing data security boundary protection method

A data security and boundary protection technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as lack of data, non-customizability, and easy damage to data integrity, and achieve good universality , Satisfy data confidentiality, improve the effect of invulnerability

Inactive Publication Date: 2016-06-29
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two methods can complete the verification of remote data very well, but they cannot be combined with data redundancy measures, resulting in the integrity of the data being easily destroyed, making the cloud data center unable to operate efficiently, and the initiation of data verification And the proof occupies a large system overhead of the client. In addition, POR only supports data encryption and verification, and is not customizable.
[0006] Therefore, the cloud computing system lacks a method to determine the security boundary combined with data redundancy, data encryption and remote data verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud computing data security boundary protection method
  • A cloud computing data security boundary protection method
  • A cloud computing data security boundary protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail in conjunction with the accompanying drawings and specific embodiments.

[0045] see figure 1As shown, a cloud computing data security boundary method described in the present invention takes the data interaction between the client computer and the cloud data center as the basic system model, and the client computer converts the data involved in the cloud service into unformatted data blocks The form is entrusted to the cloud data center for storage. By adopting the data block tree organization structure, it is convenient to use the metadata header information to verify the remote data block, which well ensures the security boundary of different data.

[0046] H(·):{0,1} * →{0,1} k Represents a one-way mapping function of any length to k bits in length.

[0047] Specifically include the following steps:

[0048] Step 1: The cloud server accepts the cloud service request instruction sent by the user, initiali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing data security boundary protection method, which includes accepting a cloud service request instruction sent by a user, initializing a system data structure and security parameters, and sending it to the user; the user generates key information; the user initiates a data storage request, Generate the header information of the metadata of the data storage request, and the cloud data center initializes an unformatted data append tree; the user generates and sends the encrypted data block to the cloud data center; the cloud data center according to the serial number and The version number maintains the unformatted data append tree in real time; users use their own key information to perform data security boundary verification and append operations on the unformatted data append tree. The cloud computing data center of the cloud server in the present invention not only provides encryption, fault tolerance and security boundary maintenance functions for user data, but also satisfies data confidentiality, integrity and invulnerability.

Description

technical field [0001] The invention belongs to the field of data security in computer networks, and in particular relates to a method for encrypting and authenticating data using a tree-structured directory in a cloud computing system and ensuring a remote data security boundary. Background technique [0002] In the construction of modern enterprise informationization, traditional computers and local area networks can no longer meet the demand for increasing information volume, and the rising cloud computing technology provides a good solution, which can provide end users with flexible , customizable and low-cost storage and computing services. Therefore, individual and business users are gradually migrating their data to cloud systems. At the same time, the confidentiality, integrity and reliability of cloud data have gradually become the focus of attention. Although cloud computing has its advantages compared with traditional computing models, a series of security issue...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 杨晓元朱率率韩益亮张敏情钟卫东
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products