Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage data audit method against key leakage

A data audit and cloud storage technology, applied in the field of cloud computing security, can solve the problems of system audit security loss, inability to resist key leakage, and low user security awareness, so as to improve storage efficiency and audit performance, reduce the number of tags, The effect of reducing the burden on oneself

Active Publication Date: 2017-02-15
SHANDONG ZHENGZHONG COMP NETWORK TECH CONSULTING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user equipment is not safe, and the user's security awareness is not high. When using software or surfing the Internet, intruders may take the opportunity to intrude due to improper operation, resulting in key disclosure.
At present, none of the existing cloud audit technologies can resist key leakage. Once the user's key is leaked, the security of the system audit will also be lost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data audit method against key leakage
  • Cloud storage data audit method against key leakage
  • Cloud storage data audit method against key leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The members of the system used in the cloud storage data audit method that can resist key leakage provided by this patent include a system parameter generation center, a cloud, end users, security equipment, and an audit center. Among them, the system parameter generation center generates various system parameters, generates public and private keys for users, selects device private keys for security devices, calculates audit parameters, etc.; the cloud provides storage resources for user data; a large amount of data of end users must be outsourced to the cloud; security The device assists the user to periodically update the key; the audit center verifies the data integrity on behalf of the user.

[0031] The following examples are used to describe the implementation of the present invention in detail, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud storage data auditing method for preventing a secret key from being revealed. The method comprises the first step of system parameter generating, the second step of secret key updating and the third step of file uploading and auditing. According to the method, a physically safe safety device is introduced to help a user to periodically update the secret key, and therefore data auditing in other time periods is still safe even when an attacker attacks the user at one time period and obtains the user secret key at the time period.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a cloud storage data audit method against key leakage. Background technique [0002] In recent years, with the rapid development of Internet technology, cloud computing has entered people's lives, and the safe storage of data in the cloud has become a hot spot that people care about. Nowadays, there are all kinds of applications and services, and more and more data and processes are generated, and the storage and computing requirements of computers are also getting higher and higher. Cloud computing provides a scalable environment for a large amount of data storage and process operation, in which outsourced storage services provide a relatively low-cost, scalable, and location-independent data management platform, which can greatly reduce the user's own storage management, maintenance burden. However, because the data is stored in the uncertain storage pool, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 于佳李京郝蓉
Owner SHANDONG ZHENGZHONG COMP NETWORK TECH CONSULTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products