Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe content access method

An access method and content security technology, applied in the field of content security access, can solve the problems of reducing data management, high cost of key maintenance, and achieve the effects of improving key security, reducing return frequency, and reducing overhead

Inactive Publication Date: 2015-07-15
成都创屹远景科技有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the key index tree in the existing scheme that supports dynamic policies effectively reduces the cost of part of the authority update, the user's key maintenance cost is still high, and in the case of authority update, the update of high-security level data still needs Completed by the database side, it does not safely and effectively reduce the cost of data management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe content access method
  • Safe content access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The following is attached to illustrate the principle of the present invention Figure one A detailed description of one or more embodiments of the present invention is provided together. The present invention is described in conjunction with such an embodiment, but the present invention is not limited to any embodiment. The scope of the present invention is limited only by the claims, and the present invention covers many alternatives, modifications and equivalents. In the following description, many specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example, and the present invention can be implemented according to the claims without some or all of these specific details.

[0013] An aspect of the present invention provides a method for securely accessing content. figure 1 It is a flowchart of a method for securely accessing content according to an embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe content access method used for encrypting a file in a cloud computing environment. The safe content access method comprises the following steps: updating a secrete key through re-encryption to prevent a server from acquiring the plaintext information of file data of a database side; executing an access control policy according to an access control matrix to prevent a user from performing unauthorized file access. According to the safe content access method, the safety performance cost of cloud storage is further safely and effectively reduced, the maintenance quantity of the database side is decreased, and an efficient secrete key and data updating policy is constructed.

Description

Technical field [0001] The present invention relates to cloud security, in particular to a content security access method for cloud storage. Background technique [0002] As an emerging form of service, cloud storage has become the storage choice of many organizations due to its advantages of flexible configuration, purchase on demand, and easy maintenance. However, in the cloud storage mode, data is out of the user's control, which causes users to worry about server reliability and data security. For example, with the development of smart medical care, medical platforms based on cloud computing are widely used by medical institutions. Sensitive data generated in medicine and medical treatment needs to be stored securely. At this time, ciphertext access control is a cloud storage mode to improve medical work User data confidentiality and an important method to achieve fine-grained access control. In an organization with a large scale of personnel and basically the same access r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘颖
Owner 成都创屹远景科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products