Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data safety storage method in cloud environment

A cloud environment and data technology, applied in secure communication devices, encryption devices with shift registers/memory, digital transmission systems, etc., to achieve the effect of low performance consumption

Active Publication Date: 2017-03-22
西安交大捷普网络科技有限公司
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to avoid the potential risks brought by multi-user coexistence; how to ensure the security requirements of data or control commands such as identity authentication, authentication management, and access control of cloud services has become one of the security challenges faced by the cloud computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0015] The embodiment of the present invention provides a data encryption method in a cloud environment. The method is that the sending end encrypts the pre-generated dynamic token according to the encryption algorithm, and the encrypted result is used as the encryption key before data transmission. According to the key pair The data is encrypted with AES symmetric encryption to form the encrypted data part, and the dynamic token is XORed, replaced, replaced, shifted, and the encrypted data part is spliced, and the check code is calculated according to the spliced ​​data and the encrypted data part is spliced. transmission;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method in a cloud environment. A sending end encrypts a dynamic token generated in advanced according to an encryption algorithm, an encryption result is used as a secret key, data is subjected to AES symmetric encryption according to the secret key to form an encrypted data part, the dynamic token is subjected to Exclusive OR, replacement, substitution and shifting and is spliced with the encrypted data part, a check code is calculated according to the data obtained after splicing, and the encrypted data part is transmitted after being spliced; and a receiving end with the same dynamic token and secret key with a receiving end carries out unpacking on data to obtain a check code to be verified and an encrypted data part after receiving the data, the encrypted data part is subjected to calculation to obtain a check code, the check code is compared with the check code to be verified, if the check code is the same with the check code to be verified, the data is correct data and the encrypted data part is stored and subjected to other processing, and on the contrary, the data is incorrect data, the data is regarded as tampered data and the data is abandoned. The data encryption method in the cloud environment, which is disclosed by the invention, can prevent leakage and prevent tampering, and is low in performance consumption.

Description

technical field [0001] The invention belongs to the technical field of data security in a cloud environment, and in particular relates to a data encryption method in a cloud environment. Background technique [0002] Security issues after data centralization in the cloud environment emerge. First, there are traces of the standard traffic and burst traffic of various application services in the traditional network, and the design of the traffic model is relatively standardized and simple, and there is no high requirement for the processing capacity of the security device. In the cloud computing environment, the scale of the same type of storage or application server grows rapidly, and it can be expanded in units of tens of thousands, and cannot be divided and conquered. It must be carried by a basic network with a unified architecture. Compared with the traditional network environment, this puts forward higher requirements on the performance indicators of the security device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L29/08
CPCH04L9/0631H04L63/0428H04L67/1097
Inventor 陈晓兵陈宏伟焦小涛何建锋同元峰
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products