Layered key management method of secure cloud storage system

A technology of key management and cloud storage, which is applied in the field of computer storage, and can solve the problems of high overhead of re-encryption and increased length of ciphertext for data owners to process files

Active Publication Date: 2015-09-23
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of the above defects or improvement needs of the prior art, the present invention provides a hierarchical key management method for a secure cloud storage system, the purpose of which is to solve the above-mentioned key problems existing in the key management method of the existing cloud storage system The management tree needs to be rebuilt, the length of the ciphertext increases, and the data owner handles the technical problems of high overhead for file re-encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Layered key management method of secure cloud storage system
  • Layered key management method of secure cloud storage system
  • Layered key management method of secure cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the following in conjunction with the attached picture And embodiment, the present invention is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0044] The basic idea of ​​the present invention is to provide a layered key management method for secure cloud storage, wherein keys are divided into file keys, role keys and node keys. The node key is the key of each node in the key management tree, which contains the leaf node key and non-leaf node key. The leaf node key is the public-private key pair used by the ElGamal algorithm, and the no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a layered key management method of a secure cloud storage system. The layered key management method finishes efficient organization and management of asymmetrical secret keys and symmetric keys by establishing a binary Trie key management tree and a key derivation mechanism based on the tree, reduces the complexity of managing the secret keys by a data owner and improves the safety of the data. An ElGamal agent re-encryption mechanism having multi-hop properties is introduced to finish the update of the secret keys, and partial load of key re-encryption caused by the change of the access strategy is passed to CSP. The method of the invention uses a delay update strategy to transfer re-encryption expenditure of data to a shared user end, thereby reducing processing expenditure of the data owner and improving the performance of the secure cloud storage system.

Description

technical field [0001] The invention belongs to the technical field of computer storage, and more specifically relates to a layered key management method of a secure cloud storage system. Background technique [0002] While the rapid development of cloud storage brings convenience to users, it also brings many security risks. In the cloud storage environment, the data owner stores the data in the cloud and loses absolute control over the data. Data encryption and data security access control are the two most basic technologies to protect data from illegal access. How to efficiently and flexibly organize, distribute, and manage various keys used in cloud storage systems, and how to deal with data re-encryption and key update problems brought about by changes in access control policies have become key management research topics for secure cloud storage. key problem. [0003] The key management method of the existing secure cloud storage system is mainly based on the user's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L9/0819H04L9/0825H04L63/064H04L67/1097
Inventor 李春花周可边泽明魏荣磊
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products