Credible data access control method applied to cloud storage of mobile devices

A mobile device, access control technology, applied in the field of cloud computing security, can solve problems such as difficulty in finding k for P and Q

Active Publication Date: 2014-04-30
BEIHANG UNIV
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its security is based on the discrete logarithm problem on the elliptic curve, that is, the Abel grou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible data access control method applied to cloud storage of mobile devices
  • Credible data access control method applied to cloud storage of mobile devices
  • Credible data access control method applied to cloud storage of mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The trusted access control method will be described in detail below in conjunction with the accompanying drawings, figure 1 It is a flow chart of the present invention; figure 2 For login with authentication process; image 3 Create a protocol flow diagram for the key; Figure 4 Flowchart for sharing keys for multiple mobile devices.

[0041] Main symbols and algorithm explanations:

[0042] (1) The value stored in the PCR represents the measurement value of the current system, and a fixed-length value is obtained by a hash algorithm in the TPM, that is, the PCR n =Hash(PCR n-1 ||Measurement n )Calculated;

[0043] (2) The random number R represents a fresh randomly generated number, which can ensure that each session is fresh;

[0044] (3)EK A Represents a symmetric encryption and decryption key, used to encrypt or decrypt user data stored in the cloud;

[0045] (4)K B Represents the public key of mobile device B, which is used to encrypt the symmetric data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a credible data access control method applied to cloud storage of mobile devices. The credible data access control method includes six steps including user registering, user login, secret key generation, data encryption uploading, data downloading and decryption in three stages. The first step is user registering, the second step is user login with an authentication process, the third step is encryption secret key generation, the fourth step is user data encryption uploading, the fifth step is secret key sharing among the multiple mobile devices, and the sixth step is data downloading and decryption. According to the credible data access control method, transmitting of a credible chain in the secret key exchanging process is guaranteed by a user through a mobile TPM chip, the length of a secret key is reduced through encryption based on a elliptic curve, it is guaranteed that the multiple mobile devices can safely share the secret key, compared with a traditional server terminal or client terminal data encryption method provided by a cloud storage service provider, the credible data access control method is safe, reliable, high in confidence degree and small in interaction data amount, and the good practical value and the wide application prospect are achieved in the technical field of cloud storage safety.

Description

(1) Technical field [0001] The present invention relates to a trusted data access control method applied to cloud storage of mobile devices, and it is also a method for safely sharing cloud storage services applied to multiple mobile devices through TPM (Trusted Platform Module, Trusted Platform Module), It belongs to the field of cloud computing security. (2) Background technology [0002] With the rapid development and popularization of the mobile Internet, portable mobile devices with powerful computing capabilities have emerged one after another. As someone may have multiple mobile devices and be easily connected to a wireless network, there is an increasing need to share or synchronize data from his or her devices. The way of cloud storage caters to these needs. Using cloud storage services, users can access data anytime and anywhere through mobile terminal devices, and easily realize data sharing among multiple mobile devices. [0003] Although cloud storage provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘建伟童丹艾倩颖王志学
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products