Large-scale user multi-key scenario cloud encryption database system and storage query method

A multi-key, large-scale technology, applied in the field of information security, can solve the problems of difficulty in retrieving ciphertext data, single encryption key, unable to cope with performance and security challenges, etc., to achieve convenient management, simple operation, and high efficiency to achieve large-scale User request effect

Active Publication Date: 2021-06-08
XIDIAN UNIV
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solves the problem of difficulty in retrieving ciphertext data on the cloud server to a certain extent, but because of the single encryption key, it cannot cope with the performance and security challenges in the multi-key scenario of large-scale users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large-scale user multi-key scenario cloud encryption database system and storage query method
  • Large-scale user multi-key scenario cloud encryption database system and storage query method
  • Large-scale user multi-key scenario cloud encryption database system and storage query method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042]In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first" and "second" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud encryption database system and a storage query method in a large-scale user multi-key scenario, and proposes a solution to the performance and security problems of the existing cloud encryption database system in a large-scale user multi-key scenario. The best security protection technology is to encrypt data first and then store it. The existing cloud encryption database system solves the difficulty of cloud server ciphertext data retrieval to a certain extent, but the singleness of the key makes it difficult to deal with large-scale users Multiple key scenarios. The present invention uses a private cloud proxy server to perform encryption and decryption services on massive user data, and simultaneously uses a private cloud key manager to efficiently distribute and manage user group keys. The private cloud proxy server processes user requests in parallel, and the private cloud key manager hashes and stores and matches user group keys, which can efficiently implement large-scale user requests and solve the problem of existing cloud encryption database systems dealing with large-scale user multi-key Performance and security issues in the scenario.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically relates to the encryption and decryption service of massive data in a cloud server under the scenario of large-scale users with multiple keys, and the efficient distribution and management of keys. Background technique [0002] With the vigorous development of modern science and the advent of the era of informatization and big data, massive data has become an extremely important resource, and how to effectively protect the security of private data has become an important research topic. For the processing of massive data, people usually outsource their data to cloud servers for storage and management. However, cloud servers are not completely secure. Cloud server security incidents have occurred frequently in recent years, such as the 2015 NetEase email account password leak incident, the 2015 Alibaba Cloud Shield security incident, and the 2016 1.3 million postgradu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0894
Inventor 马建峰徐皖辉王祥宇马鑫迪沈玉龙卢笛杨睿康卢锴
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products