Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph

A deletion method and deterministic technology, applied in the field of information security, can solve the problems of untrusted control keys by key managers, theft of control keys, failure to achieve deterministic deletion of data, etc. Strong, small amount of computation

Active Publication Date: 2014-09-03
XIDIAN UNIV
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this solution is that the time-based key management method is not fine-grained enough. In addition, the data owner DO cannot obtain absolute control over the DHT network, and cannot realize instant deletion of data. It is only an idealized realization
This method is vulnerable to attack and the control key is stolen, and there is a security risk that the key manager is untrustworthy and does not delete or leak the control key
In addition, although FADE can implement policy-based access control, its implementation process introduces metadata information to files, adding additional space overhead and network transmission overhead
[0011] c) In the above scheme, if the data visitor has successfully accessed the data once, save the copy of the data key. Originally recovering plaintext data cannot meet the backward security of data, so the effect of data deterministic deletion has not been achieved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
  • Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
  • Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Symbols and Abbreviations

[0056] PK is the public key, MK is the master key;

[0057] M is the original file;

[0058] C is the file ciphertext;

[0059] ED is the sampled ciphertext obtained based on file ciphertext sampling

[0060] C' is the remaining ciphertext after sampling

[0061] K is the file key;

[0062] K' is the file key ciphertext, that is, the ciphertext form of the file key K encrypted by CP-ABE;

[0063] A u is the set of attributes owned by the authorized user U;

[0064] skAu is the user private key corresponding to authorized user U;

[0065] T is an attribute-based access control structure;

[0066] Enc K (M) is a symmetric encryption scheme, using the key K to encrypt M;

[0067] December K (C) is a symmetric decryption scheme, using the key K to decrypt C.

[0068] Ω is the set of system properties;

[0069] a j It is an attribute element in the system attribute collection;

[0070] G 0 is a multiplicative cyclic group of order ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a deterministic cloud data deleting method based on sampling and fragmenting of a cryptograph. The method mainly solves the problems that the fine granularity of access control is low and the safety is low in the prior art. The method comprises implementation steps that (1) a data owner carries out sampling and fragmenting on the cryptograph to generate a sampling cryptograph and a residual cryptograph, and the sampling cryptograph and the residual cryptograph are sent to a credible third-party mechanism and a could service provider respectively; (2) a file secret key is shared by a plurality of users in a cloud storage environment; (3) when an authorized user accesses the cloud data, the credible third-party mechanism merges the cryptograph of a file, and the authorized user decrypts the cryptograph of the file; (4) the cryptograph sampling and fragmenting technology is adopted to prevent the cloud service provider from acquiring the integrated cryptograph of the file, the credible third-party mechanism destroys the sampling cryptograph, and then deterministic data deleting is achieved. By means of the method, real-time deterministic deleting of data in cloud storage services can be achieved, and the privacy of user data can be improved. The method can be used for guaranteeing safe access of the user data in the cloud storage mode.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for deleting cloud data, which is applicable to a scene in which user data needs to be deterministically deleted in cloud storage services. Background technique [0002] With the development of cloud computing technology, more and more individuals and enterprises are beginning to use cheap and convenient cloud services to transfer computing and storage. In the cloud storage mode, data is hosted and stored in a third-party cloud storage platform, out of the control of the data owner DO, and its security is highly dependent on the cloud service provider CSP. [0003] When the CSP is untrustworthy, in order to protect the confidentiality of the data, the DO will first encrypt the data, and then entrust the ciphertext data to the CSP, and the encryption key will be kept by itself or a third-party key management agency. However, even if the data is s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/06
Inventor 张坤杨超马建峰董超周洪丞张明月姚亮张鹏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products