Data security sharing method and system in blockchain and cloud storage environment

A data security and blockchain technology, applied in the field of Internet security, can solve problems such as single data storage format, complex access control, and incomplete decentralized operations, and achieve small size, avoid bloat, and facilitate storage and query Effect

Pending Publication Date: 2020-11-10
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the defects and improvement needs of the prior art with complex access control, incompletely decentralized operations, and single data storage format, the present invention provides a data security sharin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security sharing method and system in blockchain and cloud storage environment
  • Data security sharing method and system in blockchain and cloud storage environment
  • Data security sharing method and system in blockchain and cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] In order to make the objects, technical solutions and advantages of the present invention, the present invention will be described in detail below with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention. Further, the technical features according to each of the various embodiments described below can be combined with each other as long as they do not constitute a collision between each other.

[0061] like figure 1 , The present invention provides a data sharing method in a security block chain and a cloud storage environment, the method comprising: an initialization phase, the data encryption storage phase, the key attribute acquisition phase, phase data access and usage history data file Investigation stage. Correspondingly, the present invention provides a data sharing system safety under a cloud storage block cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security sharing method and system in a blockchain and cloud storage environment, and belongs to the field of Internet security. According to the invention, the intelligent contract is directly adopted to carry out identity authentication on the data request end, and the cloud server does not participate in authority authentication at any stage, so that the interference of malicious cloud is avoided, and the security of key generation and distribution in an attribute-based access control environment is ensured. According to the method and system, the actual dataciphertext of the user is placed on the cloud server, the metadata information is placed on the blockchain, and the actual data and the metadata are separated, so that bloating of the blockchain is avoided, the consistency of data formats is kept, and storage and query are facilitated. The data ownership end intensively delegates the authority to the intelligent contract, and the data ownership end can change the access control strategy of the data file at any time, so that the user still has the management control right of the data after uploading the data. According to the invention, an attribute encryption scheme based on a ciphertext strategy is used to achieve one-to-many fine-grained access control.

Description

technical field [0001] The invention belongs to the technical field of Internet security, and more specifically relates to a data security sharing method and system in a block chain and cloud storage environment. Background technique [0002] With the continuous development of Internet technology, the exchange of information between different institutions and organizations is gradually increasing, and the degree of data sharing is increasing day by day. At the same time, intelligentization makes mobile terminals rapidly become the key entrance of many Internet services, and data sharing through mobile devices has become an inevitable trend of social development. However, mobile terminals are limited by resources such as power, computing power, and storage power, which also prompts the emergence of cloud services. The security of cloud services is related to the security of a large number of user data privacy, and a little carelessness will cause irreparable consequences. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 李瑞轩张瑜李玉华辜希武李水祥田纹龙
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products