Safe data sharing method in cloud environment

A data sharing, cloud environment technology, applied in the field of data security, can solve problems such as increasing the complexity of key revocation, and achieve the effect of resisting collusion attacks and improving security

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since the user's private key is associated with the user's attribute set, there are common attributes among the attribute sets of different users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data sharing method in cloud environment
  • Safe data sharing method in cloud environment
  • Safe data sharing method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0010] The user is the data owner, who uploads the data to be shared to the cloud space through a proxy service provider; the proxy service provider, called an agency, rents cloud space to distribute to his users; the cloud space owner is The cloud service provider, the organization that manages the cloud space, is called the cloud center; the legitimate visitor is the visitor authorized by the user, who obtains the encrypted shared data from the cloud storage center and decrypts the data with his own key.

[0011] In the present invention, firstly, the user key is jointly generated by the authorization organization and the cloud storage center in combination with the user's unique identifier; secondly, the user mixes the asymmetric key generated by the authorization organization and the symmetric key generated by the cloud service provider to complete data encryption and decryption; Finally, when the user logs out, the relevant key and ciphertext are updated to protect the bac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe data sharing method in a cloud environment. The safe data sharing method is provided in allusion to a problem of encrypted data access control in the cloud storage environment by combining CP-ABE (ciphertext-policy attribute-based encryption). According to the method, a problem of trusted third party dependency in a CP-ABE algorithm is solved through combining a symmetric key of a cloud storage center and a asymmetric private key of an authorized agency; secondly, user unique identification is added to an attribute private key of a user so as to enable a sharing mechanism to resist collusion attacks from illegal users; and finally, revocation of the user is completed through updating the symmetric key, the backward security of shared data is ensured, and the updating efficiency is improved.

Description

[0001] Field [0002] The invention relates to the technical field of data security in cloud storage environment [0003] technical background [0004] With the development of cloud computing and the research of mobile data storage, more and more people and enterprises choose to store data in the cloud, so as to break the limitation of accessing certain information by intelligence in a specific environment in the past. However, there are also risks to corporate or personal information security. Service providers are attacked, and personal networks are attacked, which leads to the leakage of private and confidential information, causing hidden dangers. Therefore, data encryption technology and storage technology in the cloud environment have received more and more research. [0005] In an open cloud environment, data owners (users) encrypt and store information in the cloud, and use symmetric and asymmetric keys to protect data. Although data privacy can be guaranteed, the key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08H04L9/14H04L29/06H04L29/08
CPCH04L67/1097H04L9/002H04L9/0861H04L9/0866H04L9/14H04L63/045H04L63/083H04L63/10H04L63/1441H04L63/1466
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products