Cloud computing ccs fine-grained data control method

A data control and cloud computing technology, applied in transmission systems, electrical components, etc., can solve the problems of not being able to fully understand all the information, not suitable for cloud computing environments, and complex access control of fine-grained encrypted data, so as to improve security and effect. Good results

Active Publication Date: 2019-03-26
GUANGDONG POLYTECHNIC NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the distribution, dynamics, anonymity and heterogeneity of resources and services in the cloud computing environment, it becomes more complicated to implement fine-grained encrypted data access control
Although there are many models and methods to achieve fine-grained encryption access control in the traditional IT operating environment, these models and methods require that the owner of the data and the storage service provider belong to the same trust domain, but this condition is not available in the cloud environment. It is no longer true, that is, most cloud data owners and cloud service providers do not belong to the same trust security domain, and cloud service providers cannot fully understand all information of data owners, especially in the case of cross-security domain access. Data users know very little, so it is difficult to give cloud data visitors a safe and effective data access authorization in cross-domain access
Therefore, traditional encrypted access control technology is not suitable for cloud computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing ccs fine-grained data control method
  • Cloud computing ccs fine-grained data control method
  • Cloud computing ccs fine-grained data control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:

[0039] refer to figure 1 , a cloud computing CCS fine-grained data control method described in this embodiment, comprising the following steps:

[0040] Step 1: Use compressed sensing technology (or CS technology, the English full name is Compressed Sensing), after obtaining the initial key, use the N-level shift register and the feedback function calculation formula to generate the key. The N is greater than or equal to 1. The shift register stores data in a manner of storing double-precision decimal numbers.

[0041] combined reference figure 2 , step 1 may also include the following steps:

[0042] Step 11, use compressed sensing technology and generate N initial keys through Gaussian random function; in this step 11, the initial state value c of the Gaussian function can be used (0) ~N(0,1) generates the initial key.

[0043] Step 12, storing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing CCS (Cloud Computational Security) fine-grained data control method. The cloud computing CCS fine-grained data control method comprises the following steps of generating a secret key by utilizing an N-level shifting register and a feedback function calculation formula after an initial secret key is obtained by adopting a compression sensing technology; establishing an index sequence for the generated secret key and obtaining a coding matrix based on the index sequence; and realizing a cloud computing data access control process based on the N-level shifting register, the coding matrix and the secret key when the cloud computing platform is in the presence of noise and attack, wherein N is greater than or equal to 1. The cloud computing CCS fine-grained data control method is high in security.

Description

technical field [0001] The present invention relates to a cloud data access control method, in particular to a CCS (Cloud Computational Security, cloud computing security) fine-grained access control method for cloud computing data. Background technique [0002] Data access control actually allows or restricts cloud users' access to cloud resources and their service content by formulating access control rules or policies. Due to the distribution, dynamics, anonymity, and heterogeneity of resources and services in the cloud computing environment, it becomes more complicated to implement fine-grained encrypted data access control. Although there are many models and methods to achieve fine-grained encryption access control in the traditional IT operating environment, these models and methods require that the owner of the data and the storage service provider belong to the same trust domain, but this condition is not available in the cloud environment. It is no longer true, tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/101H04L63/104
Inventor 赵慧民戴青云魏文国蔡君雷方元罗建桢
Owner GUANGDONG POLYTECHNIC NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products