Ciphertext storage and ciphertext retrieval open cloud method and system

A cloud service and ciphertext technology, applied in the field of information security, can solve problems such as weak key management functions, easy data leakage, and abuse of authority by cloud service providers, so as to improve data security protection and privacy protection capabilities, and various encryption algorithms , the effect of a simple calling method

Inactive Publication Date: 2017-01-04
INST OF INFORMATION ENG CAS
View PDF5 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Data is easily leaked during network transmission: At present, many cloud service providers use unsafe transmission methods when synchronizing user data. When data is synchronized to the cloud, it is easy to be eavesdropped or hijacked by the network, resulting in privacy data leakage
[0005] 2. The risk of abuse of authority by cloud service providers: Since data exists in third-party cloud service providers in clear text, and administrators of some cloud service providers have higher authority, administrators may Leakage of user data; or cloud service providers spying on and analyzing user data for commercial purposes
[0006] 3. Cloud service providers are attacked: storing data in the cloud brings convenience to data access and storage, but also faces the threat of many hacker attacks on the Internet. If user data is stored in the cloud in plain text, once the cloud service The merchant is attacked, which is very likely to cause a large amount of leakage of user data
[0008] 1. There is no unified specification and standard: When users write encryption components, how to encrypt data, encryption process, key management methods, and project integration methods are all taken into consideration by users. At present, there is a l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext storage and ciphertext retrieval open cloud method and system
  • Ciphertext storage and ciphertext retrieval open cloud method and system
  • Ciphertext storage and ciphertext retrieval open cloud method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, but the scope of the present invention is not limited in any way.

[0091] This embodiment adopts as figure 1 The shown ciphertext storage and ciphertext retrieval open cloud service method and system structure include a security component, a server connected to the security component, the security component establishes a connection with the server through the network, and the security component establishes a connection with a third-party cloud storage server through the network .

[0092] Security components include file encryption and decryption module, key management module, ciphertext retrieval module, external cloud connection module, identity authentication module and meta information connection module;

[0093] The file encryption and decryption module and the ciphertext index module are used to perform encryption and decryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a ciphertext storage and ciphertext retrieval open cloud method and system. The system comprises a plurality of safety assemblies and a server; the server creates one encryption and decryption secret key binding with the personal identity for each login user; the server encrypts and stores the encryption and decryption secret key by using a main secret key; after the server passes the user authentication, the main secret key of the user is returned back to the safety assemblies; the safety assemblies employ the user's main secret key to perform decryption to obtain the user's encryption and decryption secret key and then employ the encryption and decryption secret key to perform encryption of the user's file to be stored and then store the file at a third-party cloud platform; and the file element data of the file to be stored and the ciphertext index of the file to be stored are generated and sent to the server; and the safety assemblies are configured to send the retrieval request to the server, and the server performs retrieval in the ciphertext index according to the keywords in the retrieval request, inquires the file element information according to the retrieval result and returns the file element information back to the user's client.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for encrypted storage of user data and retrieval of ciphertext in a cloud storage environment. Background technique [0002] With the development of Internet and computing technology, people's life has entered the "cloud era". Being in the "cloud", all kinds of information that people want are at their fingertips, and people can use almost unlimited software and hardware resources on demand like tap water. Cloud storage provides storage resources as services to users through the Internet, and is an important form of Infrastructure as a Service (IaaS) in cloud computing. With the help of virtualization and distributed computing and storage technologies, cloud storage can integrate many cheap storage media into a storage resource pool, shielding users from details such as storage hardware configuration, distributed processing, disaster recovery and b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/60G06F21/62
Inventor 陈驰苏帅陈盛
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products