Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage security realization method based on data encryption and access control

A data encryption and access control technology, applied in the field of cloud computing applications, can solve security threats, data security issues, difficult data security and other issues, to achieve the effect of protecting security and avoiding mutual access to data intentionally or unintentionally

Inactive Publication Date: 2015-11-25
STATE GRID CORP OF CHINA +1
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The key feature of cloud computing is that its services are mainly realized through the network environment. All the information and data of network users need to be placed in the cloud, and then the results are sent back to the client in the network through calculation. Cloud computing as a A new type of service model will naturally face great security threats. Because cloud computing is distributed, in order to improve the efficiency of network resource usage, users may share storage resources or computing resources. If users The lack of effective security isolation between them or the use of attack technology by users will cause data security issues. Therefore, the stand-alone mode has different characteristics from ensuring the security of cloud data storage. It is difficult to ensure the security of the entire data using traditional data protection methods. Safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage security realization method based on data encryption and access control
  • Cloud storage security realization method based on data encryption and access control
  • Cloud storage security realization method based on data encryption and access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0020] The security system mainly consists of three parts: system users, cloud business system and cloud storage platform. System architecture such as figure 1 . System users are deployed on PCs or mobile devices; the cloud business system accepts user data input; the cloud storage platform implements centralized data storage and is deployed on clusters, and the data storage entrance of the cloud storage platform is equipped with data encryption software modules and data access control software The module is installed at the data access entrance of the cloud storage platform.

[0021] The realization of data access mutual exclusion consists of two parts: data encryption and data access control.

[0022] Implementation of data encryption

[0023] When the business system receives the data input by the user or the user modifies or deletes the busine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud storage security realization method based on data encryption and access control. The method comprises the following steps: when a user issuing a data persistence request to a cloud service system, the service system transmitting the data persistence request to a cloud storage platform, a data encryption software model performing encryption processing on data, and finishing data storage; when the user issues a data access request to the cloud service system, the service system transmitting the data access request to the cloud storage platform, a data access control software module performing access control on access data to determine whether to the data access request is allowed, and if the data access request is allowed, allowing access to the data after encryption; and if the access is allowed, ending the access so as to ensure the security of the data stored by the user in the cloud storage platform in a distributed mode. According to the invention, the encryption processing and the access control are performed on the data so that the data between systems of a cloud platform rejects mutual access, and thus the data security is guaranteed.

Description

technical field [0001] The invention relates to the field of cloud computing applications, in particular to a method for implementing cloud storage security based on data encryption and access control. Background technique [0002] In recent years, with the continuous improvement of the level of science and technology, cloud computing has also achieved a great degree of development, and it shows a trend of continuous progress. As a relatively new computer technology in today's society, cloud computing has the problem of data security storage. It has not been fully studied and solved. As far as the current research status of cloud computing data storage security is concerned, most of its research focuses on data protection, virtual security technology, attribute-based encryption algorithms, access control, etc., among which the most The core part is the problem of data security storage. [0003] The key feature of cloud computing is that its services are mainly realized thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/1097H04L63/0428
Inventor 缪燕邢艳董明李海吕志来张学深
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products