A method and system for cloud storage security control based on key pool
A technology of security control and cloud storage, which is applied in the field of cloud storage, can solve problems such as key monitoring, data worries, and the inability to realize true randomness of keys, so as to achieve the effect of improving security and ensuring true randomness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] A cloud storage security control method based on a key pool, applied to a cloud storage system, such as image 3 As shown, the specific steps are as follows:
[0065] Step 1.1: The Hash value calculation module of the client calculates the Hash value of the data file and uploads the Hash value and each algorithm ID to the judgment module of the server.
[0066] Before uploading the data file, the user end first calculates the Hash value of the data file, uploads the Hash value to the server, and uploads each algorithm ID at the same time, where each algorithm ID includes the ID of the key selection algorithm fp, the primary key generation algorithm fg and the ID of the self-selected key generation algorithm ff. Of course, according to the needs of the user, the self-selected key generation algorithm ff can be selected unique to the user end, or ff0 can be selected.
[0067] In this embodiment, the self-selected key generation algorithm ff selects the function ff(x)=x,...
Embodiment 2
[0090] A cloud storage security control method based on a key pool, applied to a cloud storage system, such as Figure 4 As shown, the specific steps are as follows:
[0091] Step 2.1: The Hash value calculation module calculates the Hash value of the data file and sends the Hash value and each algorithm ID to the server.
[0092] Specifically, before uploading the data file, the user terminal first calculates the Hash value of the data file, and uploads the Hash value to the server, and also uploads the ID of each algorithm. Among them, the self-selected key generation algorithm ff is unique to the user, instead of ff0, that is, ff(x)≠x, that is, the user uses the privacy and confidentiality function that belongs only to the user, and the file is unique to the user and does not participate in the encryption. The text is deduplicated.
[0093] Step 2.2: the storage module saves the Hash value and each algorithm ID, and the key authorization module sends the information that ...
Embodiment 3
[0101] A cloud storage security control method based on a key pool is applied to a cloud storage system. Based on the above-mentioned embodiment, the specific steps for a client to read a file are as follows, as follows: Figure 5 Shown:
[0102] Step 3.1: The Hash value calculation module uploads the Hash value of the read file and each algorithm ID to the server.
[0103] The client uploads the Hash value of the data file to be read and the ID of each algorithm to the server.
[0104] Step 3.2: The server sends the ciphertext and private key to the client.
[0105] In this embodiment, after receiving the Hash value and the algorithm ID of the file, the server finds the information corresponding to the Hash value and the algorithm ID, and sends the ciphertext and the personal key to the client.
[0106] Step 3.3: The client uses the private key to decrypt the personal key to obtain a true random number R, and further obtains the file key kf from the true random number R.
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com