File cloud security management method and system based on CPK

A security management and file technology, applied in the field of network security, can solve problems such as high cost, inability to share ciphertext files, and problems that have not yet been raised, and achieve the effect of providing security and preventing file loss

Inactive Publication Date: 2014-08-06
东方斯泰克信息技术研究院(北京)有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution also has many shortcomings. For example, due to the adoption of the PKI system, the encryption depends on the third-party CA system, which requires the support of hardware devices such as USB Key based on the security chip, and the cost is relatively high; When making a digital envelope, you need to get the public key, and the public key of the PKI system generally needs the support of the online certificate library
In addition, it is difficult to obtain non-user's own certificates, so it is still impossible to share ciphertext files, and only secure cloud storage of user's own files can be realized
[0006] It can be seen that the security solutions in the prior art either cannot realize cloud storage and cloud sharing, or can only realize cloud storage but not cloud sharing, and for this problem in the prior art, no effective solution has yet been proposed. solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File cloud security management method and system based on CPK
  • File cloud security management method and system based on CPK
  • File cloud security management method and system based on CPK

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0033] According to an embodiment of the present invention, a CPK-based file cloud security management method is provided.

[0034] Such as figure 1 As shown, the CPK-based file cloud security management method according to the embodiment of the present invention includes:

[0035] Step S101, encrypting the file to be stored according to the pre-configured session key to generate file ciphertext;

[0036] Step S103, according to the pre-configured public key of the current user and the publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file cloud security management method and system based on a CPK. The method comprises the steps that a file to be stored is encrypted according to pre-configured session keys, and file ciphertext is generated; the session keys are respectively encrypted according to a pre-configured public key of a current user and a public key of a target user assigned by the current user, and a digital envelope set is generated; the digital envelope set and the file ciphertext are bound, a ciphertext file capable of being shared is formed, and the ciphertext file is stored in a cloud server. According to the method and system, a CPK combined public key system is adopted as the basis, the key transmitting technology of the CPK is utilized, the local file of the current user is encrypted, the file capable of being decrypted only by the current user and the target user assigned by the current user is generated, the file is stored in the cloud server, and therefore cloud security storage and sharing of the file are achieved, and automatic controllability of cloud security storage and sharing is built.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a CPK (Combined Public Key, combined public key)-based file cloud security management method and system. Background technique [0002] With the increasing degree of informatization, file storage and sharing are widely used in various fields, especially the storage requirements for sensitive files or important files within the company are also increasing, especially as a new storage mechanism in file storage - cloud storage is more So, among them, cloud storage is a new concept extended and developed from the concept of cloud computing, which refers to the storage of a large number of various applications in the network through functions such as cluster applications, network technology or distributed file systems. A system in which devices work together through application systems to jointly provide data storage and service access functions. [0003] At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/08G06F21/60G06F21/62
Inventor 陈海南李维刚郭守祥刘莹
Owner 东方斯泰克信息技术研究院(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products