Cloud data protection method for data hierarchical encryption and segmentation

A technology of data classification and data protection

Inactive Publication Date: 2017-12-01
JINAN INSPUR HIGH TECH TECH DEV CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The management rights and ownership of data information in the cloud data storage system are forced to separate, making data security and privacy protection extremely difficult
For this problem, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data protection method for data hierarchical encryption and segmentation
  • Cloud data protection method for data hierarchical encryption and segmentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The content of the present invention is described in more detail below:

[0032] The solution divides the security implementation of cloud storage into the following three parts:

[0033] 1) Client system: The client system consists of a file system filter driver in the kernel state and a control program in the user state. It is responsible for monitoring and capturing local system operations, dividing the obtained data into large and small blocks, and performing hash operations (Hash), and then saving small data blocks and hash values ​​locally, using data coloring and different intensities Data encryption technology to encrypt.

[0034] 2) Master control server system: The master control server system mainly performs data block and metadata processing services, and performs authentication and access control on data requests from clients.

[0035] 3) Storage server system: The storage server system is mainly responsible for the actual managed data storage. When the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud data protection method for data hierarchical encryption and segmentation, and belongs to the field of cloud data protection. The method of the invention includes the steps of firstly segmenting data into small and large data blocks rationally; then deploying the small block data and the large block data respectively in local and remote places; and then, according to different security level requirements of the data, performing data encryption using data encryption techniques of different strengths. In this way, the flexibility is increased and the system overhead is reduced while the cloud user data are protected.

Description

technical field [0001] The invention relates to the field of cloud data protection, in particular to a cloud data protection method for hierarchically encrypting and dividing data. Background technique [0002] ECC encryption algorithm [0003] The encryption algorithm based on elliptic curve (EEC, Elliptic Curve Cryptography) was proposed by Koblitz and Miller in 1985 to apply the elliptic curve system to cryptography for the first time. The elliptic curve cryptographic scheme belongs to the public key mechanism, and its security depends on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP, Elliptic Curve Discrete Logarithm Problem). ECDLP is defined as follows: Given a prime number p and an elliptic curve E, for Q=nP, find a positive integer n smaller than p when P and Q are known. The addition operation and multiplication operation in the elliptic curve correspond to the modular multiplication operation and modular exponentiation operation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14H04L29/06H04L9/30
CPCH04L9/088H04L9/14H04L9/3066H04L63/0428H04L63/10
Inventor 仇伟民戴鸿君于治楼
Owner JINAN INSPUR HIGH TECH TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products