A data security sharing method suitable for hybrid cloud environment

A data security and hybrid cloud technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as increasing the burden on data owners, and achieve the effect of easy data re-encryption, easy implementation, and low resource overhead

Active Publication Date: 2019-04-23
HANGZHOU YUANTIAO TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this mechanism outsources sensitive encryption and decryption operations to the cloud service provider, it increases the burden on the data owner during the data operation process, and the data owner and the cloud service provider need to perform multiple identity authentication and other operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security sharing method suitable for hybrid cloud environment
  • A data security sharing method suitable for hybrid cloud environment
  • A data security sharing method suitable for hybrid cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solution of the present invention will be further described in detail below with reference to the drawings and embodiments. The following examples are implemented on the premise of the technical solution of the present invention, and detailed implementation manners and processes are given, but the protection scope of the present invention is not limited to the following examples.

[0044] In order to better understand the method proposed in this embodiment, a company encrypted file sharing event is selected. In the event, there are one data owner, two access users (user A has the attributes of "technical department, "manager"; user B has the attributes of "personnel department" and "supervisor") and a shared file.

[0045] Such as the structure diagram of the method of the present invention ( figure 1 ), the specific implementation steps of this embodiment are as follows:

[0046] 1. System initialization

[0047] The system (the system refers to the key center,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data security sharing method applicable to a hybrid cloud environment, comprising the following steps: system initialization; an authority generating a key; a data owner encrypting a file to generate an intermediate ciphertext of a data ciphertext and a key ciphertext; The text is directly uploaded to the public cloud without processing by the private cloud, and the intermediate ciphertext of the key ciphertext is uploaded to the private cloud; the private cloud processes the intermediate ciphertext to generate a complete key ciphertext; the private cloud converts the ciphertext; End user data decryption. This method is aimed at the method of encrypting shared data using ciphertext policy attribute-based encryption in a hybrid cloud environment. According to the needs of mobile terminals with limited computing and storage capabilities, and on the premise of ensuring data security, using key decomposition technology and key agreement technology, Safely delegate some complex encryption and decryption tasks to the private cloud, which not only reduces the computing burden of the mobile terminal, reduces the storage requirements of the mobile terminal, but also provides a reliable method for efficient and safe data protection and sharing of mobile terminals.

Description

Technical field [0001] The invention relates to a data security sharing method suitable for a hybrid cloud environment. Specifically related to attribute-based encryption mechanism, key decomposition technology, key agreement technology. In a hybrid cloud environment, users only need to perform simple attribute-based encryption and partial decryption of data, and outsource complex encryption operations and pairing decryption operations to the private cloud, and the private cloud transmits the encrypted data to the public cloud. This not only reduces the encryption and decryption time of the mobile terminal, shortens the length of the ciphertext and the key, thereby reducing the resource consumption of the mobile terminal, but also ensures the safe transmission of data between users and the private cloud. In summary, this data sharing method is suitable for the secure sharing of cloud data by mobile terminals in a hybrid cloud environment, reduces the computing burden on the mob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L9/32H04L29/06
Inventor 夏莹杰刘雪娇叶薇
Owner HANGZHOU YUANTIAO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products