Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud safety storage method based on client public and private key encryption and decryption

A secure storage and client-side technology, applied in electrical components, transmission systems, digital data authentication, etc., can solve problems such as different server security, server maliciously obtaining data, and destroying user privacy and security.

Active Publication Date: 2016-05-18
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularity of cloud storage, more and more users place objects (including directories, files, etc.) Tampering and other security attacks that destroy user privacy
And because most cloud storage servers are distributed storage, the security of the server may be different, and the administrator of the server may also maliciously obtain data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud safety storage method based on client public and private key encryption and decryption
  • Cloud safety storage method based on client public and private key encryption and decryption
  • Cloud safety storage method based on client public and private key encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 Shown and described are the main components of the method. The method includes a client role, a server role, and a key data center role. The client role is mainly responsible for the encryption and decryption of objects, the server role is responsible for the storage of encrypted objects, and the key data center role is mainly responsible for the storage and control of permission records. This method mainly describes the six process steps of initializing objects that a user has permission to access, viewing objects, adding objects, deleting objects, modifying objects, and adding or deleting another user's sharing permissions. figure 1 The flow chart of the method describes the steps of viewing objects, adding objects, deleting objects, modifying objects, and adding or deleting another user's sharing permissions after the user logs in to initialize the process.

[0031] Such as figure 2 As shown in , it describes the process of initially loading and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cloud safety storage method based on client public and private key encryption and decryption. The method comprises the following steps of: initializing objects which are permitted to access; checking the objects; adding objects; deleting objects; modifying objects; and adding or deleting sharing authority of another user by one user. According to the invention, the user's controller over encryption and decryption on a client is effectively ensured, the decryption on a server end is avoided, and the safety is ensured. By adopting the method, the user is prevented from continuously accessing one object when the access authority of the user over the object is repealed. The safety of cloud storage and the storage performance are improved.

Description

technical field [0001] The invention relates to a cloud security storage technology, in particular to a cloud security storage method based on client public and private key encryption and decryption. Background technique [0002] With the popularization of cloud storage, more and more users place objects (including directories, files, etc.) on cloud servers, but if user data is not protected on the server, it is likely to be leaked, stolen or Tampering and other security attacks that destroy user privacy. And because most cloud storage servers are distributed storage, the security of the servers may be different, and the administrators of the servers may also obtain data maliciously. Therefore, the confidentiality of user data on the server side has become an important part of cloud storage security. Contents of the invention [0003] The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a cloud security stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/31
CPCG06F21/31H04L63/0435H04L63/0442H04L63/0478H04L67/1097
Inventor 何克晶林芙楠
Owner SOUTH CHINA UNIV OF TECH