Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe data sharing method in cloud environment

A data sharing, cloud environment technology, applied in the field of data security, can solve problems such as increasing the complexity of key revocation, and achieve the effect of resisting collusion attacks and improving security

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since the user's private key is associated with the user's attribute set, there are common attributes among the attribute sets of different users. In the cloud storage environment, the user's departure will lead to the update of multiple user's private keys, which increases the complexity of key revocation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data sharing method in cloud environment
  • Safe data sharing method in cloud environment
  • Safe data sharing method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The user is the data owner, who uploads the data that needs to be shared to the cloud space through a proxy service provider; the proxy service provider, called an agency, rents the cloud space to distribute to his users; the cloud space owner is Cloud service providers, organizations that manage cloud space are called cloud centers; legal visitors are those authorized by users, who obtain encrypted shared data from the cloud storage center and use their own keys to decrypt the data.

[0011] In the present invention, firstly, the authorization agency and the cloud storage center combine the user's unique identifier to jointly generate the user key; secondly, the user mixes the asymmetric key generated by the authorization organization and the symmetric key generated by the cloud service provider to complete the encryption and decryption of data; Finally, when the user logs out, the related key and ciphertext are updated to protect the backward security of the shared dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe data sharing method in a cloud environment. The safe data sharing method is provided in allusion to a problem of encrypted data access control in the cloud storage environment by combining CP-ABE (ciphertext-policy attribute-based encryption). According to the method, a problem of trusted third party dependency in a CP-ABE algorithm is solved through combining a symmetric key of a cloud storage center and a asymmetric private key of an authorized agency; secondly, user unique identification is added to an attribute private key of a user so as to enable a sharing mechanism to resist collusion attacks from illegal users; and finally, revocation of the user is completed through updating the symmetric key, the backward security of shared data is ensured, and the updating efficiency is improved.

Description

[0001] Field [0002] The invention relates to the technical field of data security in cloud storage environment [0003] technical background [0004] With the development of cloud computing and the research of mobile data storage, more and more people and enterprises choose to store data in the cloud, so as to break the limitation of accessing certain information by intelligence in a specific environment in the past. However, there are also risks to corporate or personal information security. Service providers are attacked, and personal networks are attacked, which leads to the leakage of private and confidential information, causing hidden dangers. Therefore, data encryption technology and storage technology in the cloud environment have received more and more research. [0005] In an open cloud environment, data owners (users) encrypt and store information in the cloud, and use symmetric and asymmetric keys to protect data. Although data privacy can be guaranteed, the key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08H04L9/14H04L29/06H04L29/08
CPCH04L67/1097H04L9/002H04L9/0861H04L9/0866H04L9/14H04L63/045H04L63/083H04L63/10H04L63/1441H04L63/1466
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products