Check patentability & draft patents in minutes with Patsnap Eureka AI!

A cloud computing security data sharing method based on double-chain structure

A technology of secure data and chain structure, applied in the field of blockchain, it can solve problems such as unreliability, cumbersomeness, and leakage of privacy, and achieve the effect of real and more reliable data

Active Publication Date: 2022-03-29
JIANGSU RONGZE INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above methods are unreliable and cumbersome, and the data may be tampered with in the middle, and there is a problem of privacy disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud computing security data sharing method based on double-chain structure
  • A cloud computing security data sharing method based on double-chain structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain is essentially a decentralized database, which is a series of data blocks associated with each other using cryptographic methods. Each data block contains a batch of network transaction information to verify the validity of its information. .

[0021] Such as figure 1 As shown, a cloud computing security data sharing method based on a double-chain structure adopts a "public chain + private chain" double-chain structure, and applies blockchain and data encryption technology to protect cloud platform data. The encryption system ensures that the ownership of the data is controlled in the hands of the data owner, and there will be no security risks such as tampering, illegal use, and large-scale leaks, and through the blockchain smart contract, the privacy of platform data during business pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a cloud computing security data sharing method based on a double-chain structure, comprising the following steps: adopting a joint query architecture of a private block chain plus a public block chain, and applying block chain and data encryption technology to protect cloud platform data , through the encryption system to ensure that the ownership of the data is controlled by the data owner, and only return the business results during business processing through the blockchain smart contract. When sharing data, the data requester retrieves the public blockchain data to obtain the data provider. The original data, the data owner submits the data to the requesting party according to the authorization certificate. The present invention is based on blockchain technology, adopts a double-chain structure, and uses a unique and secure encryption system to ensure that data is authentic and cannot be tampered with, effectively ensuring the privacy and security of platform data during business processing.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a cloud computing security data sharing method based on a double-chain structure. Background technique [0002] At present, there are three methods for data sharing and privacy protection in the cloud environment. The first is the method of member management. The membership management service is made up of several infrastructures that manage user identity and privacy on the network. These services authenticate the user's identity, register the user in the system, and provide him / her with all the credentials needed to create and / or invoke transactions as usable, compliant parameters. The information is not tampered with through the digital certificate signature. The second is the access control of the application layer. All application access needs to be authorized before the data decryption authority can be obtained, and the actual control problem of applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/10H04L9/40H04L9/32
CPCH04L67/10H04L63/0442H04L9/3236
Inventor 王剑张辉
Owner JIANGSU RONGZE INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More