Safe data sharing method in cloud environment
A data sharing, cloud environment technology, applied in the field of data security, can solve problems such as increasing the complexity of key revocation, and achieve the effect of resisting collusion attacks and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0010] The user is the data owner, who uploads the data to be shared to the cloud space through a proxy service provider; the proxy service provider, called an agency, rents cloud space to distribute to his users; the cloud space owner is The cloud service provider, the organization that manages the cloud space, is called the cloud center; the legitimate visitor is the visitor authorized by the user, who obtains the encrypted shared data from the cloud storage center and decrypts the data with his own key.
[0011] In the present invention, firstly, the user key is jointly generated by the authorization organization and the cloud storage center in combination with the user's unique identifier; secondly, the user mixes the asymmetric key generated by the authorization organization and the symmetric key generated by the cloud service provider to complete data encryption and decryption; Finally, when the user logs out, the relevant key and ciphertext are updated to protect the bac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap