Sensitive data secure sharing and self-destroying method for cloud storage system

A cloud storage system, sensitive data technology, applied in transmission systems, electrical components, etc., can solve the problem of suspicious SSDD solution security and other issues

Active Publication Date: 2017-12-29
SHANGHAI MARITIME UNIVERSITY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, Wolchok et al. did a lot of experiments and confirmed that the Vanish system is vulnerable to Sybil attack (Sybil attack) by using the Vuze DHT network
Therefore, the security of the SSDD scheme is also questionable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data secure sharing and self-destroying method for cloud storage system
  • Sensitive data secure sharing and self-destroying method for cloud storage system
  • Sensitive data secure sharing and self-destroying method for cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described below through specific embodiments in conjunction with the accompanying drawings. These embodiments are only used to illustrate the present invention, and are not intended to limit the protection scope of the present invention.

[0060] Such as figure 1 As shown, a method for safe sharing and self-destruction of sensitive data in a cloud storage system includes the following steps:

[0061] Step 1: Design cloud storage system security sharing and self-destruct system;

[0062] Such as figure 2 As shown, the system includes: data owner 1, which is the owner of sensitive data; cloud storage system manager 2, which is responsible for the safe sharing of sensitive data in the cloud storage system; cloud storage server 3, which is used to store the cloud storage system All sensitive data; time server 4, which is used for setting and verifying the use time of the sensitive data ciphertext, and, data user 5, which is the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive data secure sharing and self-destroying method for a cloud storage system. The method comprises the following steps of S1, designing a secure sharing and self-destroying system for the cloud storage system; S2, initializing the system to generate system parameters and a main key; S3, encrypting a sensitive data file and setting an authorization period; S4, setting fine granularity access control within the authorization period; and S5, carrying out data self-destroying on the encrypted sensitive data file within the authorization period after the sensitive data file is expired. According to the method, a user is supported to define the authorization period, in a practical cloud application scene, each data item can be related to a group of attributes, and each attribute is related to a specification of a time interval. According to the method, the fine granularity access control also can be provided; if a moment is not in an appointed time interval, a ciphertext cannot be decrypted, namely, the ciphertext is self-destroyed; and even if a secure key is expired, the ciphertext cannot be decrypted by anyone, so the secure data self-destroying with the fine granularity access control is realized.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a method for safe sharing and self-destruction of sensitive data in a cloud storage system. Background technique [0002] Cloud computing is regarded as an on-demand service technology that combines service-oriented architecture (SOA) and new technologies of virtualization. With the rapid development of general cloud computing technology and services, users can utilize cloud storage services to share data with others in the circle of friends, such as Dropbox, Google Drive and AliCloud. [0003] However, shared data in cloud servers usually contains sensitive information of users (such as personal data, financial data, health records, etc.) and needs to be well protected. Since the ownership of data is separated from its management, cloud servers may migrate user data to other cloud servers for outsourcing or sharing in cloud search systems. Therefore, protecting the privacy of sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/064H04L63/10H04L67/1097H04L67/5682
Inventor 张肖韩德志毕坤王军田秋亭
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products