Safe data sharing method suitable for hybrid cloud environment

A data security and hybrid cloud technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as increasing the burden on data owners

Active Publication Date: 2016-08-24
HANGZHOU YUANTIAO TECH CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this mechanism outsources sensitive encryption and decryption operations to the cloud service provider, it increases the burden on the data ow...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data sharing method suitable for hybrid cloud environment
  • Safe data sharing method suitable for hybrid cloud environment
  • Safe data sharing method suitable for hybrid cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. The following examples are implemented on the premise of the technical solutions of the present invention, and detailed implementation methods and processes are given, but the protection scope of the present invention is not limited to the following examples.

[0044] In order to better understand the method proposed in this embodiment, a corporate encrypted file sharing event is selected. In the event, there is a data owner, two access users (user A has attributes of "technical department and manager"; user B has attributes of "personnel department" and "supervisor") and a shared file.

[0045] As the method structural diagram of the present invention ( figure 1 ), the specific implementation steps of this embodiment are as follows:

[0046] 1. System initialization

[0047] The system (the system refers to the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A safe data sharing method suitable for a hybrid cloud environment is disclosed and comprises the following steps: a system is initialized; a secret key is generated by an authorization mechanism, a data owner encrypts a file so as to generate a data ciphertext and a middle ciphertext of a secret key ciphertext, the data ciphertext is directly uploaded to a public cloud without being processed via a private cloud, the middle ciphertext of the secret key ciphertext is uploaded to the private cloud, the private cloud processes the middle ciphertext and generates the same into a complete secret key ciphertext, ciphertext conversion is conducted via the private cloud, and user data of a mobile terminal is decrypted. According to the method, in the hybrid cloud environment, data is ciphered and shared based on ciphertext strategy attributes; with limited computation and storage capability of the mobile terminal taken into consideration, the private cloud as a proxy can safely take over part of complex ciphering and deciphering tasks via use of secret key decomposition technologies and secret key negotiation technologies on a precondition that data safety is ensured, a computation burden and storage demand of the mobile terminal can be reduced, and a reliable method is provided for protecting and sharing data of the mobile terminal in a highly efficient and safe manner.

Description

technical field [0001] The invention relates to a data security sharing method applicable to a hybrid cloud environment. Specifically, it involves attribute-based encryption mechanism, key decomposition technology, and key agreement technology. In a hybrid cloud environment, users only need to perform simple attribute-based encryption and partial decryption on the data, and outsource complex encryption operations and paired decryption operations to the private cloud, which then transmits the encrypted data to the public cloud. This not only reduces the encryption and decryption time of the mobile terminal, shortens the length of the ciphertext and the key, thereby reducing the resource consumption of the mobile terminal, but also ensures the safe transmission of data between the user and the private cloud. In summary, this data sharing method is suitable for the hybrid cloud environment, and it is oriented to the safe sharing of cloud data by mobile terminals, which reduces t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/32H04L29/06
Inventor 夏莹杰刘雪娇叶薇
Owner HANGZHOU YUANTIAO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products