Unlock instant, AI-driven research and patent intelligence for your innovation.

A data storage and cloud control method with lightweight auditing

A data storage and cloud control technology, applied in the field of cloud data storage, can solve problems such as difficulty, lack, and consumption of cloud server resources, and achieve the effect of avoiding illegal downloads and ensuring security

Active Publication Date: 2020-01-03
UNIV OF SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the lack of corresponding compatible cloud access control strategies, CP-ABE is still difficult to be directly deployed in the actual public cloud environment
In the current cloud access control scheme, the cloud server is always assumed to be completely trusted, so it is difficult for these schemes to be compatible with the CP-ABE scheme
Due to the lack of corresponding cloud access control, in the access control scheme based on CP-ABE, the cloud server is always exposed to a variety of security threats, one of the most important security threats is denial of service attack (DoS / DDoS), malicious Users can download files shared by other users on the cloud server without restriction, thus consuming various resources on the cloud server and making the cloud server unable to work normally; in addition, due to the lack of cloud access control, malicious users can download A large number of files can carry out attacks related to ciphertext analysis, threatening the confidentiality of user data; at the same time, in order to pay for the resources consumed by the cloud server reasonably, the cloud server needs to provide users with an audit mechanism for related resource consumption, and there are currently some works to try to solve the resource auditing problem on the cloud server side, but these solutions are difficult to work with the current CP-ABE access control scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data storage and cloud control method with lightweight auditing
  • A data storage and cloud control method with lightweight auditing
  • A data storage and cloud control method with lightweight auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings, as figure 1 Shown is a schematic flow chart of a data storage and cloud control method with lightweight auditing provided by an embodiment of the present invention, and the method includes:

[0022] Step 1. The data owner generates the attribute set {A required for attribute encryption according to the access permissi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data storage and cloud control method capable of lightweight auditing. The data storage and cloud control method comprises the steps that: firstly, a data owner generates an attribute set { A1, A2, ..., An} and an access strategy A required for conducting attribute encryption according to access right requirements of a file M to be uploaded, and generates a random session key K and N random character strings {S1, S2, ..., SN}; the data owner processes the random character strings {S1, S2,..., SN} by adopting a secure Hash algorithm, and uploads a ciphertext CT to a cloud server; when another user needs to obtain the file M stored in the cloud server, the cloud server and the user complete a challenge-response process; the cloud server sends a data ciphertext EK(M) in the ciphertext CT corresponding to the file M required by the user; the user decrypts the EK(M) by adopting the random session key K to obtain the required file M; and the data owner audits a resource consumption record provided by the cloud server. The data storage and cloud control method effectively judges the access rights of specific users, and further ensures that the user can effectively monitor the resources provided by the cloud server.

Description

technical field [0001] The invention relates to the technical field of cloud data storage, in particular to a data storage and cloud control method with lightweight auditing. Background technique [0002] At present, in the cloud storage environment, users outsource their data to cloud servers for economic and convenience considerations. In order to protect the confidentiality and privacy of user data, access control is an indispensable means of protection. However, because users cannot fully trust cloud server providers, traditional access control methods cannot be well applied to cloud storage environments. In order to solve this problem, Attribute-Based Encryption (ABE) is introduced into cloud storage. ABE enables data owners to directly control access to their own data, and is an effective means of user-side access control. Among them, policy-associated attribute-based encryption (CP-ABE) is considered to be one of the most suitable means for implementing access contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3271H04L63/0435H04L63/10H04L63/1458H04L67/1097
Inventor 薛开平李威陈炜铿洪佩琳
Owner UNIV OF SCI & TECH OF CHINA