Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise management public data protection system and method based on double factors in cloud environment

A technology for enterprise management and public data, applied in digital data protection, transmission system, electronic digital data processing, etc., can solve problems such as inapplicable public data protection

Inactive Publication Date: 2019-07-05
NANJING UNIV OF INFORMATION SCI & TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As far as we know, Joseph K. Liu et al first proposed a reversible two-factor data security protection mechanism, however, their scheme is actually an identity-based scheme, and the ciphertext can only be decrypted by a single user rather than a group of users
Therefore, their solution only solves the problem of secure access to single-user data, and is not suitable for the protection of public data in cloud environments
In addition, how to implement factor revocation under the premise of protecting data security is also a challenge for the two-factor scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise management public data protection system and method based on double factors in cloud environment
  • Enterprise management public data protection system and method based on double factors in cloud environment
  • Enterprise management public data protection system and method based on double factors in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention is described in further detail now in conjunction with accompanying drawing.

[0077] Such as figure 1 As shown, the present invention provides a two-factor-based enterprise management public data protection system in a cloud environment, including: data owners, cloud service providers, authorization centers and users.

[0078]Data owner: is the owner of the data stored in the cloud, formulates access policies and conducts attribute-based primary encryption on the data before uploading the data to the cloud service provider, forms the primary ciphertext and uploads it to the cloud service provider ;

[0079] Cloud service provider: has unlimited computing power and storage capacity; performs secondary encrypted storage on the primary ciphertext uploaded by the data owner, and generates secondary ciphertext. In addition, when the cloud service provider receives the notification from the authorization center to update the secondary ciphertext, it w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an enterprise management public data protection system and method based on double factors in a cloud environment, and the system comprises: a data owner which encrypts the databased on attributes, and forms a primary ciphertext; a cloud service provider which is used for carrying out secondary encryption storage on the primary ciphertext to generate a secondary ciphertext,reserving an original secondary ciphertext when a notification of updating the secondary ciphertext of the authorization center is received, carrying out secondary encryption on the original primaryciphertext again, and storing the newly generated secondary ciphertext; an authorization center which is used for initializing the system, managing users, generating system parameters, distributing safety equipment and informing a cloud service provider of updating the second-level ciphertext; and a user which downloads the second-level ciphertext and decrypts the second-level ciphertext to meetthe requirement that the user with the special attribute obtains the data by using the secret key. An attribute-based encryption and security equipment encryption and revocation technology is adoptedto ensure that only users with attributes meeting in enterprise management can access public data, and the public data can be revoked and reissued even if the security equipment is lost.

Description

technical field [0001] The invention relates to the technical field of public data protection, in particular to a two-factor-based enterprise management public data protection system and method in a cloud environment. Background technique [0002] At present, in modern enterprise management, building a safe and efficient enterprise management system has become a trend. With the continuous improvement of management quality requirements, a large number of problems continue to appear. On the one hand, it is very important to build a secure storage space to ensure that data (such as corporate finance, core technology, trade secrets, etc.) : The needs of financial departments, research and development departments, and decision-making departments) are also a big challenge, especially how to access public data in enterprise computers safely and efficiently is a problem that needs to be solved urgently. However, it is difficult to solve such thorny problems with traditional data p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60G06F21/64H04L29/08
CPCG06F21/602G06F21/64H04L63/0478H04L63/062H04L63/10H04L63/123H04L67/1097
Inventor 沈剑姜心肇孔伟
Owner NANJING UNIV OF INFORMATION SCI & TECH