A cloud file security storage system and access control method
A technology for secure storage and cloud files, applied in the field of cloud storage, can solve the problem that cloud file storage and access methods cannot be satisfied at the same time, and achieve the effect of ensuring data privacy and optimizing file management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] A cloud file security storage system, such as figure 1 As shown, including cloud data management server, identity authentication server, and double verification server;
[0054] The cloud data management server includes public cloud storage and private cloud storage; the public cloud storage is used to store file ciphertext data and decryption keys provided by the data provider; the private cloud storage is used to store data provided by the data provider The label used to uniquely mark the ciphertext data; the label of the ciphertext data uses the data provider public key, data provider private key, and file data block abstract provided by the data provider as input information, and uses the abstract The fetching algorithm fetches the corresponding digest, as a label. The file data block summary is obtained according to the following steps:
[0055] (1) Divide the file data into n data blocks;
[0056] (2) Utilize the public SHA-1 algorithm to generate the summary o...
Embodiment 2
[0070] Embodiment 2 The user requests to access the files stored in the cloud file security storage system provided in Embodiment 1, and the specific steps are as follows:
[0071] A1. The user sends a request to the cloud data management server to access the ciphertext of the data file stored in the public cloud;
[0072]A2. The cloud data management server forwards the user's access request to the identity authentication server, namely the Kerberos server;
[0073] A3. The Kerberos server authenticates the user's identity through the user authentication protocol; if the authentication is passed, the Kerberos server generates user credentials and sends them to the user; otherwise, the user access is terminated;
[0074] A4. The user combines the received user credentials with the request in step A1, and then sends them together to the cloud data management server;
[0075] A5, the cloud data management server verifies the cloud file access permission in the user request; if ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

