Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud data security system based on USB Key

A security system and cloud data technology, applied in the field of information security, can solve the problems of inability to effectively control centralized management, data out of controllable scope, insecure factors and leaks, etc. Effect

Inactive Publication Date: 2015-11-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the separation of data ownership and control, the data is out of the user's controllable range, unable to be effectively controlled and managed centrally, and there are risks of insecurity and leaks; due to the centralized storage of data, many cloud tenants share cloud computing resources and storage resources , how to effectively isolate tenant data and implement fine-grained access control is a very challenging issue; centralized storage of data is more vulnerable to attacks and damages by malicious attackers, such as distributed denial of service attack DDoS, etc.; in addition, In the cloud computing network, the server provider has the priority access right to the cloud data, and the malicious administrators can freely view the user's sensitive data, and even maliciously delete or modify the data, causing immeasurable losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security system based on USB Key
  • Cloud data security system based on USB Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] Now take the process of the user uploading the 2G data file report.dat to the cloud as an example, the hardware structure involved is as follows figure 1 , figure 2 As shown, when using this system for data transmission and downloading, the access control in step 1) and the identification in step 2) are as described above, and the specific implementation process of the data processing and transmission steps in step 3) is as follows:

[0078] a) Algorithm negotiation: According to the importance of cloud data, the client and the cloud negotiate data encryption algorithm AES (256 bits, CFB mode) and integrity detection algorithm SHA-2, and generate cloud data encryption key K (256 bits), the key ciphertext after the encryption key is encrypted with its private key, the data file to be encrypted report.dat, the file length 2G, the encryption algorithm AES and parameters (256 bits, CFB mode), the integrity detection algorithm Metadata information such as SHA-2 and time (2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data security system based on a USB Key. The cloud data security system comprises a client and a cloud, the client is connected with the USB Key, the USB Key structurally comprises a control unit, a calculating unit, a storage unit, a cache unit and an input and output I / O logic module, and a digital certificate and a plurality of encryption algorithms and integrity detection algorithms are built in the USB Key; according to different security requirements of cloud data, different encryption algorithms are selected to finish encryption calculation of the cloud data, so as to satisfy the security demands and transmission security of different users; and the integrity detection algorithms are used for detecting the integrity of the cloud data with a block as a unit. Compared with the prior art, the cloud data security system based on USB Key can select different encryption algorithms according to the importance of the data and guarantee the integrity of the data at the same time, so as to satisfy the security demands of the users in a cloud calculation environment, and the cloud data security system is strong in practicability and is easy to promote.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a highly practical USBKey-based cloud data security system. Background technique [0002] With the rapid development and application of cloud computing technology, more and more people pay attention to it. However, data security in cloud computing has become a key issue restricting the rapid development and promotion of cloud computing. All user data in cloud computing is stored in the cloud, and the calculation results are sent back to the client through the network. This new network service model faces unprecedented security threats. CSA pointed out in the cloud computing security report "The Notorious Nine Cloud Computing Top Threats (2013)" that data destruction and data loss are the most important security threats faced by cloud computing. Due to the separation of data ownership and control, the data is out of the user's controllable range, unable to be effec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/105H04L9/3263H04L63/0823H04L67/10
Inventor 李清玉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products