Cloud computing security data sharing method based on double-chain structure

A technology of secure data and chain structure, applied in the field of blockchain, can solve problems such as unreliability, privacy disclosure, and tediousness, and achieve the effect of real and more reliable data

Active Publication Date: 2020-04-14
JIANGSU RONGZE INFORMATION TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above methods are unreliable and cumbersome, and the data ma...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing security data sharing method based on double-chain structure
  • Cloud computing security data sharing method based on double-chain structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain is essentially a decentralized database, which is a series of data blocks associated with each other using cryptographic methods. Each data block contains a batch of network transaction information to verify the validity of its information. .

[0021] like figure 1 As shown, a cloud computing security data sharing method based on a double-chain structure adopts a "public chain + private chain" double-chain structure, and applies blockchain and data encryption technology to protect cloud platform data. The encryption system ensures that the ownership of the data is controlled in the hands of the data owner, and there will be no security risks such as tampering, illegal use, and large-scale leaks, and through the blockchain smart contract, the privacy of platform data during business proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud computing security data sharing method based on a double-chain structure. The method comprises the following steps: adopting a joint query architecture of a private blockchain and a public block chain, and protecting cloud platform data through a blockchain and a data encryption technology; guaranteeing that the ownership of the data is controlled by a data owner through an encryption system, and only returning a service result during service processing through a blockchain smart contract; during data sharing, enabling a data requester to obtain original data ofa data provider by retrieving public blockchain data, and enabling the data owner to submit the data to the requester according to an authorization certificate. Based on the blockchain technology, a double-chain structure is adopted, it is guaranteed that data is real and cannot be tampered through a unique and safe encryption system, and the privacy and safety of platform data during service processing are effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a cloud computing security data sharing method based on a double-chain structure. Background technique [0002] At present, there are three methods for data sharing and privacy protection in the cloud environment. The first is the method of member management. The membership management service is made up of several infrastructures that manage user identity and privacy on the network. These services authenticate the user's identity, register the user in the system, and provide him / her with all the credentials needed to create and / or invoke transactions as usable, compliant parameters. The information is not tampered with through the digital certificate signature. The second is the access control of the application layer. All application access needs to be authorized before the data decryption authority can be obtained, and the actual control problem of applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32
CPCH04L67/10H04L63/0442H04L9/3236
Inventor 王剑张辉
Owner JIANGSU RONGZE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products