Secure cloud storage method based on SGX

A technology of cloud storage and cloud storage services, applied in the field of secure cloud storage based on SGX, can solve problems such as trusted authentication and key encapsulation, and achieve the effect of increasing difficulty, ensuring integrity and confidentiality, and ensuring security

Active Publication Date: 2019-08-16
NORTHEASTERN UNIV
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the existing technical problems, the present invention provides a secure cloud storage method based on SGX, which solves the problems of credible authentication and key encapsulation of clients and servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud storage method based on SGX
  • Secure cloud storage method based on SGX

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The SGX-based secure cloud storage method provided in this embodiment is applicable to a system based on the SGX-based client / server architecture, and the method includes:

[0039] A1. Trusted identity authentication steps: the client performs two-way authentication of the trusted identity with the server through the trusted identity authentication module of the server, and after completing the trusted identity authentication, the client establishes a session with the server.

[0040]The server receives the client's identity authentication request, calls the enclave's identity information and authentication request to the application enclave, and the application enclave calls the EREPORT command to generate a REPORT for the identity information and authentication request, and then uses the enclave's report key to generate a REPORT MAC, together with REPORT, is sent to the reference enclave. Refer to the enclave to verify its integrity and whether the enclave is in the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of trusted cloud computing, and particularly relates to a secure cloud storage method based on SGX. The method is suitable for a client/server architecturesystem based on SGX, and comprises the following steps: a trusted identity authentication step: a client performs bidirectional authentication of a trusted identity with a server through a trusted identity authentication module of the server, and establishes a session with the server after the trusted identity authentication is completed; a credible operation environment authentication step: after the client passes the credible identity authentication, the client verifies the legality of the operation environment of the server to the server through a credible operation environment authentication module of the server; a credible execution step: the client transmits the data to an endclave of the server through a credible channel, and the endclave encrypts the data; and a cloud storage step: the server side sends the encrypted data to a cloud storage service provider. According to the method, the problems of trusted authentication and key packaging of the client and the server are solved.

Description

technical field [0001] The invention belongs to the technical field of trusted cloud computing, and in particular relates to an SGX-based secure cloud storage method. Background technique [0002] Under the impact of the wave of big data, cloud storage, as a concept derived and developed from cloud computing, is leading the transition from traditional storage methods to cloud storage methods. It stores resource data on the cloud, which solves various problems that cannot be satisfied by traditional storage, and allows users to access data conveniently at any time and anywhere by connecting to the cloud through any network-connected device. [0003] However, the nature of the cloud storage service itself determines that a series of fundamental security issues will arise. First, when using cloud storage, users need to upload, download, and store data. When the data is stored on the server, it may be illegally stolen or tampered with; second, the cloud storage system is the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/0428H04L63/0435H04L63/08H04L63/0823H04L63/0869H04L63/123H04L67/1097
Inventor 洪思源薛晨阳朱潜
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products