Cloud data deterministic deletion method for supporting fine-grained access

A deletion method, deterministic technology, applied in the field of network security

Active Publication Date: 2018-09-28
SHAANXI NORMAL UNIV
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to solve the above problems in the prior art, the present invention provides a cloud data deterministic deletion method that supports fine-grained access, aiming at possible data leakage in cloud storage, illegal cross-cloud migration of data, and unauthorized access Security issues such as security issues and the problem that it is difficult to verify that the data requested to be del

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data deterministic deletion method for supporting fine-grained access
  • Cloud data deterministic deletion method for supporting fine-grained access
  • Cloud data deterministic deletion method for supporting fine-grained access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0059] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0060] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0061] The present invention is based on the theory of public key cryptography, and proposes an attribute-based cloud data deterministic deletion method based on key policy. This method supports fine-grained access control at the same time, and is applied to cloud ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud data deterministic deletion method for supporting fine-grained access, comprising the following steps: a data owner encrypts data and outsources the encrypted data toa cloud server, so that only the user who meets an access requirement can decrypt the data; when the data owner wants to delete the data stored in the cloud server, the owner first sends a deletion request to a trusted authority center, which returns a deletion key, namely, a re-encrypted key to the data owner, the data owner sends the deletion key to the cloud server, and the cloud server carriesout a deletion operation on the data; after performing the deletion operation, the cloud server returns a certificate to the data owner, and the data owner verifies that the target data has been deleted through a Merkle hash tree. The cloud data deterministic deletion method in the invention utilizes attribute revocation and the Merkle hash tree to realize verifiable data deletion, supports fine-grained access control to achieve the purpose of privacy protection, and greatly improves the use ratio of the cloud server.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a cloud data deterministic deletion method supporting fine-grained access. Background technique [0002] As a new computing model, cloud computing makes data storage and data sharing more convenient and economical. It can integrate a large number of high-quality resources, and integrate different resources to provide users with massive storage and efficient and fast computing services. Users can access shared resources anytime and anywhere, which greatly saves user costs and improves resource utilization. More and more users like to store data on the cloud, which contains a large amount of sensitive data such as health data, financial data, business secrets and other data, making data privacy and other security issues become the focus of public attention. [0003] Due to the use of cloud computing technology, the ownership and management of cloud data are se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3247H04L63/0428H04L63/205H04L67/06H04L67/1097
Inventor 禹勇苏西洛·威利张凌越薛靓李艳楠
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products