Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method for transformable data cloud storage with data origin authentication

An access control and data cloud technology, applied in the field of cloud computing, can solve problems such as uncertainty, data corruption, and lack of data source authentication

Active Publication Date: 2021-04-27
福建中信网安信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are three problems here: Question 1, when the ciphertext data is damaged on the cloud server and cannot be decrypted normally, how to determine that it is the responsibility of the cloud service provider? Question 2, how to authenticate the source of the data when the data user wants to use the data, that is, how to determine the owner of the data
Question 3: When the secret data stored in the cloud server by the data owner has passed a certain protection period, and the data owner wants to disclose the data to the outside world, how to achieve the convertibility of the secret data
[0005] (1) In the existing technology, it is considered to encrypt the data and store it on the cloud server, and then track whether the data stored on the cloud server is damaged through irregular (third-party) audit methods, but it is impossible to determine whether it is a cloud service Data corruption due to provider issues
[0006] (2) When performing data access control, the data user cannot be sure that the ciphertext data comes from the specific data owner, that is, there is no authentication of the data source
[0007] (3) The open convertibility of secret data is not considered in the prior art, that is, how to disclose the data under the premise of ensuring that the data source can be authenticated, so that the data user can decrypt and verify the data without using their own private key source
[0008] (4) There is a joint attack between the cloud service provider and the data user in the prior art, that is, their cooperation can recover the private key of the data owner
[0009] (5) Most of the existing methods are based on public key infrastructure or identity-based public key system construction, so there are key management issues and key custody issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for transformable data cloud storage with data origin authentication
  • Access control method for transformable data cloud storage with data origin authentication
  • Access control method for transformable data cloud storage with data origin authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0085] In the prior art, most of them only consider encrypting the data and storing it on the cloud server, and then track whether the data stored on the cloud server is lost or damaged by means of (third-party) auditing. Especially when performing data access control, data users cannot be sure that the ciphertext data comes from a specific data owner. The public transferability of secret data is also not considered. Based on cryptographic primitives such as a certificateless public key system, signcryption, and proxy re-encryption, the present invention designs a specific data access control method that can simultaneously...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud computing, and discloses a convertible data cloud storage access control method with data source authentication. The control method includes: system parameter initialization, user key generation, data encryption and storage, data download and decryption, data Access control, ciphertext data conversion. The invention solves the problems of how to ensure data source authentication in the existing cloud data access control, how to determine that it is the responsibility of the cloud service provider when the data stored on the cloud server is damaged, and the public convertibility of ciphertext data. The public key system is constructed, so that there is no certificate management problem in PKI and key escrow problem under the identity-based public key system, and an access control method for data cloud storage with data source authentication can be converted.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to an access control method for convertible data cloud storage with data source authentication. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Cloud computing (Cloud Computing) technology has brought tremendous changes to people's work and life. Cloud computing technology has penetrated into various fields and brought positive and far-reaching impacts to all walks of life. Data cloud storage is an important part of cloud computing services. Data cloud storage service not only provides users with cheap storage space, but also enables users to access the cloud server and obtain their own data through the Internet anytime and anywhere, or share the data stored on the cloud server with others. The data stored by the user on the cloud server may involve confidentiality and privacy issues, or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/06G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64G06F2221/2141H04L9/0643H04L9/083H04L63/10H04L63/123H04L67/1097
Inventor 吴晨煌李慧敏陈智雄
Owner 福建中信网安信息科技有限公司