Data security confidentiality method under cloud environment

A technology of data security and confidentiality methods, applied in the field of information security protection, can solve the problems of weak information confidentiality and easy data leakage, etc., and achieve the effect of ensuring security and reliability, improving security, and reasonable steps

Active Publication Date: 2016-02-24
ZHEJIANG YUANWANG SOFTWARE
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the deficiencies of the above-mentioned prior art, and provide a data security and confidentiality method in a cloud enviro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security confidentiality method under cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0039] refer to figure 1 , the embodiment of the present invention provides a data security and confidentiality method in a cloud environment, which is based on an independent third-party authentication and storage device and terminal security detection program, the third-party authentication and storage device includes a self-control chip and a memory, so The program running on the automatic control ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a data security confidentiality method under a cloud environment. The method is based on an independent third-party authentication and storage device and a terminal security detection program, wherein, the third-party authentication and storage device comprises a self-controlled chip and a memory; a program that runs on the self-controlled chip comprises a control module and a file system module; the memory comprises an encrypted memory area and an ordinary memory area; the control module accessed the encrypted memory area of the memory; the ordinary memory area comprises the terminal security detection program; the encrypted memory area comprises identity authentication information, a key and an algorithm software carrier; the key adopts an encryption mode of associating an AES (Advanced Encryption Standard) symmetric key with an RSA (Rivest Shamir Adleman) asymmetric key; and a fingerprint identifier is arranged on the third-party authentication and storage device. The data security confidentiality method under the cloud environment disclosed by the present invention guarantees data not to be stolen and tampered in the cloud environment, and improves security and confidentiality of user data in a terminal and a service terminal.

Description

【Technical field】 [0001] The invention relates to a method for protecting information security, in particular to a data security and confidentiality method in a cloud environment. 【Background technique】 [0002] Cloud computing supports users to obtain application services at any location and using various terminals, and the requested resources come from the "cloud" rather than fixed tangible entities. Whether it is an enterprise or an individual user, there is a large amount of private data, such as corporate business confidential data, corporate customer information data, financial data, personal bank accounts and passwords, private photos, and so on. For users of cloud computing services, "cloud" is like a black box, because in the cloud environment, users do not know where their data is ultimately stored, whether the data transmission process is safe, or whether the cloud service provider has Special permissions to access user data. In other words, users cannot control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L29/08G06F21/32
CPCG06F21/32G06F21/62G06F21/6218H04L67/10
Inventor 邵森龙傅如毅蒋行杰
Owner ZHEJIANG YUANWANG SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products