Method for safely sharing mobile cloud storage light-level data

A data security and lightweight technology, which is applied in the field of mobile cloud storage data security sharing, can solve the problems of mobile terminal complexity, unfavorable mobile terminal implementation, high user authority overhead, etc., to ensure data security, realize data security sharing, reduce The effect of small overhead

Inactive Publication Date: 2014-04-30
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, mobile devices also have their limitations: limited storage space, limited power and computing power
However, the disadvantage of this scheme is that the user needs to periodically apply to the certification center for the re-use of the private key; and before the expiration time, the user's authority cannot be revoked
[0004] To sum up, the current research on data access control in cloud storage is mostly applied to non-mobile terminals, which is too complicated for mobile terminals with limited power and computing power; in addition, the current data access control on cloud storage In the study of control, it will bring a lot of overhead when changing user permissions, which is not conducive to the implementation on the mobile terminal
In short, there is currently no feasible data security sharing scheme in mobile cloud storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely sharing mobile cloud storage light-level data
  • Method for safely sharing mobile cloud storage light-level data
  • Method for safely sharing mobile cloud storage light-level data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0067] Below at first explain and illustrate with regard to the technical terms of the present invention:

[0068] Data owner: refers to the user of the mobile cloud, who needs to store the data in the mobile device in the cloud, share the data with others, and formulate a data access control strategy to determine the data sharing object;

[0069] Trusted third party: In the attribute encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely sharing mobile cloud storage light-level data. The method comprises the steps that an attribute set is registered in a credible third party by a data owner, the attribute set is assigned to a user by the data owner, the user is authorized by the credible third party through an attribute code mechanism according to the attribute set of the user, so that an attribute key is generated, when the data owner uses a mobile side to share a file, the file is firstly encrypted through a symmetric cryptography mechanism, a symmetric key is encrypted through a proxy encryption server by the utilization of an attribute key mechanism, a file ciphertext and a key ciphertext are sent to a cloud side, after the file ciphertext and the key ciphertext are read from the cloud side by the user, the attribute code mechanism is used by a proxy decryption server to decrypt the file, an authority limit alteration statement is sent to the credible third party and the cloud side by the data owner, and judgments are made by the credible third party and the cloud side, so that authority limits of the user are increased or deleted. According to the method for safely sharing the mobile cloud storage light-level data, the data can be safely shared on the mobile side on the conditions that electric quantity and computing power are limited.

Description

technical field [0001] The invention belongs to the field of cloud storage and access control, and more specifically relates to a method for safely sharing mobile cloud storage data. Background technique [0002] With its portability and increasingly powerful computing and processing capabilities, mobile devices are increasingly used in daily life. However, mobile devices also have their limitations: limited storage space, limited power and computing power. Due to the increasing amount of user data on the mobile terminal, and the mobile terminal has only limited storage space, for backup considerations, some data needs to be transferred to the cloud. In addition, the end-to-end transmission between mobile terminals is only suitable for a small number of users with a small amount of data. When a user needs to share a large amount of data with a large number of contacts, the user needs to store the data to be shared in the cloud, and other users share the data through the clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李瑞轩沈成林何亨辜希武李玉华韩洪木汤俊伟叶威
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products