Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for auditing cloud access in real time

An access method and cloud technology, applied in encryption devices with shift registers/memory, instruments, digital transmission systems, etc.

Inactive Publication Date: 2018-07-03
TIDETIME SUN LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the audit needs to have a basis, that is, evidence (Proof), which is a message (SignedMessages) that has been signed by both parties, so users must check each time before executing an application or accessing a file to ensure that the cloud platform is safe and secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for auditing cloud access in real time
  • Method for auditing cloud access in real time
  • Method for auditing cloud access in real time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to describe the technical content, structural features, achieved goals and effects of the present invention in detail, the following examples are given and described in detail with reference to the drawings.

[0022] Such as figure 1 , 2 as shown, figure 1 For the file folder tree structure, figure 2 is a hash value tree structure, composed of figure 1 It is known that when a user client starts to use cloud services, the user client calculates the hash value (Hash value) of each file and folder in the library in its operating system and records it. figure 2 It is known that from the leaf nodes at the bottom of the tree, the files and folders are calculated layer by layer, for example, h(d3)=h(h(f2)|h(d6)|h(f3)), where h ha Hash function, because the hash value at the top is called the root hash value. Due to the characteristics of the cryptographic encryption function, if the value of one of the nodes is modified, a different root hash value will be obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for auditing cloud access in real time includes steps of Step 1: client obtains necessary information from a synchronization server (SYS), by executing a library comprising index function [gamma] required by program, and saving a root hash value R of a fully binary hash tree (FBHTREE) in SYS; Step 2: the client obtains leave node position corresponding to FBHTREE and corresponding tree node position by inputting an index function [gamma] via file absolute path; Step 3: obtaining slice of FBHTREE based on the leave node position in Step 2; Step 4: performing a hash computation on treenode position in the slice and hash value saved at another tree node position to obtain hash value of tree node position of one previous level till root hash value Y is obtained; Step 5: comparing thehash value Y and the root hash value R saved by the client.

Description

technical field [0001] The invention provides a cloud access method for real-time auditing of cloud services. Background technique [0002] Due to the increasing popularity of cloud services, many cloud service providers have begun to provide file access services. Nowadays, many people choose to rent network space on the cloud for software development or website service provision. However, when cloud service providers provide file access services, they are not completely safe. Files on cloud servers may be damaged due to improper storage by cloud service providers, and even cloud servers have been implanted with malware. Some cloud service providers claim that their services are safe and defensible, but users do not know whether they can really isolate and protect cloud servers safely. Consider the following scenario: user A rents a cloud hard drive on the cloud, and the cloud platform may shut down the cloud hard drive when user A suspends the use of the cloud hard drive,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L29/06
CPCH04L9/0643H04L9/3239H04L63/10H04L67/10G06F21/552G06F21/604H04L63/105G06F16/2246G06F16/2255
Inventor 黄冠寰
Owner TIDETIME SUN LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products