Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Storage method of confidential data

A technology for confidential data and data storage, applied in the field of information security, can solve the problems of data being vulnerable to collusion attacks, security loopholes, and inefficient operations, and achieve the effect of ensuring data security, resisting collusion attacks, and realizing safe processing.

Inactive Publication Date: 2017-05-31
WUHAN UNIV
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. When traditional encryption methods are used to encrypt confidential data, the ciphertext data cannot be directly handed over to the data user for use, and when multiple authorized data users request encrypted confidential data (usually symmetric key encryption), as long as one user obtains the data The decryption key assigned by the manager can be used to decrypt the decrypted data requested by other authorized data users. The data is vulnerable to collusion attacks. At the same time, repeated decryption and encryption operations also increase the risk of data leakage, and the operation is extremely inefficient. ;
[0007] 3. There is no distinction between storage and management. Traditional data managers not only perform content authority management of confidential data, but also perform data storage management. Data managers can easily become the biggest security hole in confidential data storage, making confidential data more secure. the uncertainty of
[0008] 4. The distribution efficiency of confidential data is too low, the timeliness is poor, and the value of confidential data cannot be fully utilized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage method of confidential data
  • Storage method of confidential data
  • Storage method of confidential data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0040] The present invention includes the following objects: a data owner (Data Owner, DO), who generates confidential data, encrypts the confidential data, and hands over the ciphertext of the confidential data and its access rights to the data storage manager and the data authority manager for management; DO It can be unique, that is, the system is a centralized storage system, or there can be multiple DOs, that is, the system is a distributed storage system. When performing storage and distribution, there is no obvious difference, so that the system of the present invention is both targeted and without loss of versatilit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a storage method of confidential data, wherein the storage method includes steps of 1), a data owner generates public and private key pairs by using a public key cryptographic algorithm; a data user applies public key cryptographic algorithm to generate the public and private key pairs associated with its identity; 2), a data storage administrator generates a ciphertext data index and publishes to a data authority administrator; 3), the data authority administrator feeds back a confidential data visit request to the data storage administrator; 4) an re-encryption key is generated; after receiving the data visit request, the data owner generates re-encryption key according to the public key information of the user, and sends to the data storage administrator; 5), re-encrypted ciphertext is distributed; the data storage administrator applies the re-encryption key to encrypt the confidential data ciphertext requested to visit by the secret key encryption data; the re-encrypted ciphertext is is acquired, and sent to the authorized data user. The method can easier realize the safe and high-efficient distribution of multiple users, and has high practicability.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for storing confidential data. Background technique [0002] The security of confidential data is related to national security and social stability, and should not be disclosed. The storage, management and use of traditional confidential data still adopt the "rule of man" approach: the data owner hands over the confidential data to a dedicated data manager who is responsible for content access management and stores it offline in a dedicated storage system. Sometimes the data manager also Encryption is performed on confidential data. Any data user requesting to obtain data needs to be dually authorized by the data administrator and the data owner. The data administrator uses a dedicated storage medium such as a CD and assigns a special person to distribute the confidential data and decryption key to the data user. [0003] With the advent of the era of big ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06F21/60
CPCG06F21/602G06F21/604H04L9/0825H04L63/0478
Inventor 徐正全王涛朱荣
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products