A proxy cloud storage security control method and system based on public key pool
A technology of security control and key pool, applied in the field of cloud storage, which can solve the problems that the execution environment of the encryption program on the client side is not secure enough, the true randomness of the key cannot be realized, and the security is insufficient.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] Figure 5 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 7 A flow chart of a storage method provided in this embodiment, a specific steps of a proxy cloud storage security control method based on a public key pool are as follows:
[0069] Step 1.1 The client encrypts the file and sends it to the key pool device: the client uses the true random number R generated by the random number generator to encrypt the data file to obtain the ciphertext M1, and uses the public key of the key pool device P to encrypt the true random number R , and send these two parts to the key pool device P.
[0070] Step 1.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the ciphertext M1 to obtain a data file in plaintext form.
[0071] Step 1.3 The key pool device uploads the Hash value of the data file and each algorithm ID to the cl...
Embodiment 2
[0089] Figure 8 It is a flow chart of a storage method provided in this embodiment. The sequence diagram of the storage method of the present embodiment is consistent with Embodiment 1, and the specific steps of a proxy cloud storage security control method based on a public key pool are as follows:
[0090] Step 2.1 The client encrypts the file and sends it to the key pool device: the client uses the true random number R generated by the random number generator to encrypt the data file to obtain the ciphertext M1, and uses the public key of the key pool device P to encrypt the true random number R , and send these two parts to the key pool device P.
[0091] Step 2.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the ciphertext M1 to obtain a data file in plain text.
[0092] Step 2.3 The key pool device uploads the Hash value of the data file and each algorithm ID to ...
Embodiment 3
[0100] Image 6 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 A flow chart of a file reading method provided by an embodiment of the present invention, a proxy cloud storage security control method based on a public key pool, based on the above embodiment, the specific steps for the client to read a file are as follows:
[0101] Step 3.1 The client initiates a file read request: the client takes the HASH value of the file it wants to read as a request, encrypts the request with the true random number R generated by the random number generator, and uses the public key pool device P The key encrypts the true random number R, and sends the two parts to the key pool device P.
[0102] Step 3.2 The key pool device decrypts the file: the key pool device P uses its own private key to decrypt to obtain a true random number R, and uses R to decrypt the request to obtain the HASH value of the file.
[0103] Step 3.3 The key poo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com