Unlock instant, AI-driven research and patent intelligence for your innovation.

A cloud security storage method based on client public and private key encryption and decryption

A secure storage and client-side technology, applied in electrical components, transmission systems, digital data authentication, etc., to solve problems such as attacks, leaks, and damage to user privacy and security

Active Publication Date: 2018-07-20
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularity of cloud storage, more and more users place objects (including directories, files, etc.) Tampering and other security attacks that destroy user privacy
And because most cloud storage servers are distributed storage, the security of the server may be different, and the administrator of the server may also maliciously obtain data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud security storage method based on client public and private key encryption and decryption
  • A cloud security storage method based on client public and private key encryption and decryption
  • A cloud security storage method based on client public and private key encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 Shown and described are the main components of the method. The method includes client role, server role, and key data center role. The client role is mainly responsible for the encryption and decryption of objects, the server role is responsible for the storage of encrypted objects, and the key data center role is mainly responsible for the storage and control of permission records. This method mainly describes the six process steps of initializing objects that the user has permission to access, viewing objects, adding objects, deleting objects, modifying objects, and users adding or deleting another user's sharing permissions. figure 1 The flowchart describes the steps of this method when the user logs in for the initialization process, and can view objects, add objects, delete objects, modify objects, and add or delete another user’s sharing authority.

[0031] Such as figure 2 As shown, it describes the process of initializing and loading objects with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cloud safety storage method based on client public and private key encryption and decryption. The method comprises the following steps of: initializing objects which are permitted to access; checking the objects; adding objects; deleting objects; modifying objects; and adding or deleting sharing authority of another user by one user. According to the invention, the user's controller over encryption and decryption on a client is effectively ensured, the decryption on a server end is avoided, and the safety is ensured. By adopting the method, the user is prevented from continuously accessing one object when the access authority of the user over the object is repealed. The safety of cloud storage and the storage performance are improved.

Description

Technical field [0001] The invention relates to a cloud safe storage technology, in particular to a cloud safe storage method based on client public and private key encryption and decryption. Background technique [0002] With the popularity of cloud storage, more and more users place objects (including directories, files, etc.) on servers in the cloud, but user data on the server is likely to be leaked, stolen or Security attacks that destroy user privacy, such as tampering. And because most cloud storage servers are distributed storage, the security of the servers may be different, and the server administrators may also obtain data maliciously. Therefore, user data confidentiality on the server side has become an important part of cloud storage security. Summary of the invention [0003] The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art and provide a cloud secure storage method based on client public and private key encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/31
CPCG06F21/31H04L63/0435H04L63/0442H04L63/0478H04L67/1097
Inventor 何克晶林芙楠
Owner SOUTH CHINA UNIV OF TECH