Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A proxy cloud storage security control method and system based on public key pool

A technology of security control and key pool, applied in the field of cloud storage, which can solve the problems that the execution environment of the encryption program on the client side is not secure enough, the true randomness of the key cannot be realized, and the security is insufficient.

Active Publication Date: 2018-12-11
RUBAN QUANTUM TECH CO LTD
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Public cloud customers have worries about data migration to the cloud
[0007] (2) If the file key is a pseudo-random key, the true randomness of the key cannot be realized, it may be predicted, and the security is insufficient
[0008] (3) The execution environment of the user-side encryption program is not safe enough. If there is a virus Trojan horse, the key in the memory may be monitored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A proxy cloud storage security control method and system based on public key pool
  • A proxy cloud storage security control method and system based on public key pool
  • A proxy cloud storage security control method and system based on public key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Figure 5 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 7 A flow chart of a storage method provided in this embodiment, a specific steps of a proxy cloud storage security control method based on a public key pool are as follows:

[0069] Step 1.1 The client encrypts the file and sends it to the key pool device: the client uses the true random number R generated by the random number generator to encrypt the data file to obtain the ciphertext M1, and uses the public key of the key pool device P to encrypt the true random number R , and send these two parts to the key pool device P.

[0070] Step 1.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the ciphertext M1 to obtain a data file in plaintext form.

[0071] Step 1.3 The key pool device uploads the Hash value of the data file and each algorithm ID to the cl...

Embodiment 2

[0089] Figure 8 It is a flow chart of a storage method provided in this embodiment. The sequence diagram of the storage method of the present embodiment is consistent with Embodiment 1, and the specific steps of a proxy cloud storage security control method based on a public key pool are as follows:

[0090] Step 2.1 The client encrypts the file and sends it to the key pool device: the client uses the true random number R generated by the random number generator to encrypt the data file to obtain the ciphertext M1, and uses the public key of the key pool device P to encrypt the true random number R , and send these two parts to the key pool device P.

[0091] Step 2.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the ciphertext M1 to obtain a data file in plain text.

[0092] Step 2.3 The key pool device uploads the Hash value of the data file and each algorithm ID to ...

Embodiment 3

[0100] Image 6 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 A flow chart of a file reading method provided by an embodiment of the present invention, a proxy cloud storage security control method based on a public key pool, based on the above embodiment, the specific steps for the client to read a file are as follows:

[0101] Step 3.1 The client initiates a file read request: the client takes the HASH value of the file it wants to read as a request, encrypts the request with the true random number R generated by the random number generator, and uses the public key pool device P The key encrypts the true random number R, and sends the two parts to the key pool device P.

[0102] Step 3.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the request to obtain the HASH value of the file.

[0103] Step 3.3 The key poo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy cloud storage security control method and system based on a public key pool. A user end uploads the data file to the key pool device, and the key pool device uploads the data file encrypted by the file key to the server. The file key is generated by the true random number generated by the quantum key card of the user end, and the user end uploads the true random number to the server through the key pool device. The server receives and stores data files and true random numbers from the client. The user end sends a read request to the key pool device, the key pooldevice downloads the true random number and the cipher text of the data file, the true random number generates a file key, decrypts the obtained data file and transmits the file to the user end. In the cloud storage process, the server can not access the file key and the decrypted data file, which can solve the security concerns of the cloud storage data. The quantum key card is utilized to generate the true random number to generate the true random file key, so the security of the key is improved and the security of the user-side encryption program execution environment is ensured.

Description

technical field [0001] The present invention relates to the field of cloud storage, in particular to a proxy cloud storage security control method and system based on a public key pool Background technique [0002] With the development of science and technology, cloud storage has increasingly become a trend, and various cloud storage technologies emerge in endlessly. In order to ensure the security of cloud storage data, various encryption methods are usually used to ensure data security. For example, through Asymmetric key encryption is used to ensure the security of data. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is kept secretly by the user, that is, the private key. . The information sender uses the public key to encrypt, and the information receiver uses the private key to decrypt. [0003] Since shared storage is mostly used in clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6245
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products