A cloud data security sharing method based on a block chain

A blockchain and cloud data technology, applied in the field of cloud data security, can solve the problems of huge computing and communication overhead and security risks for data owners, and achieve the effect of improving key distribution efficiency, avoiding frequent communication, and reducing computing overhead.

Active Publication Date: 2019-04-02
CHONGQING UNIV
View PDF7 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This invention relates to improving secure storage for sensitive or valuable digital content (such as music). It involves creation of an authenticated file system where each piece has its unique attributes such as accessing it's right based on certain rules like how many people are allowed into this space without being able to see what they belong behind them. Users also pay attention when adding new files onto these systems but cannot be seen unless encrypted correctly. Additionally, there may exist methods called BlockChain Technologies used during collaboration between different companies involved in providing services over networks. These technical improvements help protect against unauthorized copying of copyrighted material stored within servers connected across computer networks.

Problems solved by technology

Cloud storage systems have become increasing popular due to its ability to store more digital assets securely without compromising them or requiring expensive infrastructure like virtual machines (VM). While these advancements make upgrades easier than ever before, there may still exist concerns about how confidentiality protected individuals cannot freely exchange important data over internet connections. Additionally, some companies require strict regulations regarding what types of data should remain secret even during offline operations where servers actively participate. These issues impede efficient use of cloud stores despite being able to hide any type of data within certain boundaries.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud data security sharing method based on a block chain
  • A cloud data security sharing method based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0029] Such as figure 1 As shown, the ciphertext policy attribute-based encryption system model (referred to as "attribute-based encryption system") consists of entities such as trusted certificate authority, attribute authority, users including data owners and data requesters, and cloud storage servers. Each entity forms a blockchain network entity through the underlying blockchain platform, such as Ethereum or Hyperledger.

[0030] The trusted certificate authority selects security parameters to initialize the attribute-based encryption system, generates public parameters, and calls the parameter distribution smart contract to pass to For each entity in the attribute-based encryption system, users are divided into data owner users and data requester users. At the same time, the trusted certificate authority authenticates the legitimacy and authenticity of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data security sharing method based on a block chain. The method comprises the steps that 1, a trusted certificate authorization center provides a unique global identityID and a digital certificate according to identity information submitted by a user or an attribute authorization center; the attribute authorization center assigns attribute public and private key pairs for each attribute and distributes attributes for legal users; 2, encrypting and uploading the user data; 3, downloading data by the user; and 4, data decryption: the attribute key set of the usermeets the access strategy of the data, and a decryption key can be obtained through an attribute-based decryption algorithm, so that the data to be accessed can be decrypted. The method has the advantages that the data sharing safety and the data sharing efficiency are improved in an untrusted environment, and the compliance of entity behaviors is supervised.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products