Unlock instant, AI-driven research and patent intelligence for your innovation.

Key updating method applicable to cloud storage system

A cloud storage system and key update technology, which is applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of large resource occupation and lack of real-time update keys, etc., to improve performance, facilitate protection, and reduce additional overhead Effect

Active Publication Date: 2017-05-31
NO 32 RES INST OF CHINA ELECTRONICS TECH GRP
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The patent "Multi-level authority management method for encrypted data sharing in cloud storage" (patent number 201310044503.4, patent application date is January 4, 2013), introduces the use of attribute-based encryption, access control, authority management and other methods to provide cloud Access to shared ciphertext and multi-level authority management in storage environment provide a reliable method. The invention has the advantages of easy implementation, strong user information protection, and fine authority control, but its resource occupation is large.
"Cloud storage encryption system based on domestic commercial encryption algorithm and its implementation method" patent (patent number 201410751081.9, patent application date is December 9, 2014), which introduces the design of an encryption system in the field of cloud storage, through data transmission and The domestic commercial encryption algorithm is added to the storage process for data encryption protection, but there is still a lack of real-time key update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key updating method applicable to cloud storage system
  • Key updating method applicable to cloud storage system
  • Key updating method applicable to cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The preferred embodiments of the present invention are given below in conjunction with the accompanying drawings to describe the technical solution of the present invention in detail.

[0039] Such as figure 1 As shown, the core idea of ​​the present invention is that after the key is updated, the new key is only used for new write operations, and the keys of other areas without write operations remain unchanged. Since the IO read and write is based on the sector, we Represent the storage area in the form of a bitmap, one bit represents a sector, and one key assigns a bitmap;

[0040] The present invention comprises the following steps:

[0041] key initialization;

[0042] key update;

[0043] IO write process;

[0044] IO read process.

[0045] figure 2 It is a schematic diagram of bitmap and key storage, and the bitmap is stored in the key server in the form of a linked list;

[0046] The administrator specifies the storage area for the user through the manag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key updating method applicable to a cloud storage system. The key updating method comprises the following steps: key initialization, key updating, an IO write process and an IO read process. The core concept of the invention is that after the key is updated, a new key is only used for the new write operation, and the keys of other areas without the write operation are unchanged, and as the IO read and write takes the sector as the basic unit, the storage area is represented in a mode of bitmaps, one bit represents one sector, and one bitmap is assigned to one key. The advantages of the key updating method disclosed by the invention are mainly embodied as follows: the key of the storage system can be updated in real time, no business interruption is needed after the key is updated, and zero time window is achieved; the read and write performance cannot be affected after the key is updated; less resources are occupied; the key is periodically replaced to benefit the protection of data, and a more secure data protection mode can be provided for customers; the business continuity can be maintained after the key is updated; and a small extra overhead is needed, and the performance is increased.

Description

technical field [0001] The invention relates to a storage encryption technology, in particular to a key update method suitable for a cloud storage system. Background technique [0002] With the increasing development of cloud computing technology, the storage security of the server is facing a huge challenge. In order to solve the problem of storage security, data storage encryption technology has been widely used, and the key is the core of storage encryption. After the key is updated in the traditional method, either terminal services are required, or the performance is severely degraded after the key is updated and the service life of the disk is reduced. [0003] Among the existing invention patents, the patent "Key update method of cloud storage and implementation method of cloud data audit system" (patent number 201510192375.7, patent application date is April 22, 2015) introduces key update of cloud storage Method: When the cloud user needs to update the key, reques...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08G06F21/60
CPCG06F21/602H04L9/0891H04L63/068H04L67/1097
Inventor 刘浩月
Owner NO 32 RES INST OF CHINA ELECTRONICS TECH GRP