Data access permission updating method and device, equipment and readable storage medium

A data access and update method technology, applied in the storage field, can solve the problems of heavy data access authority update burden, complicated authority update process and high cost

Active Publication Date: 2021-05-18
QINGDAO UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there is also a way to update the data access authority by re-encrypting the ciphertext file as a whole. If the scale of the processed dat...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access permission updating method and device, equipment and readable storage medium
  • Data access permission updating method and device, equipment and readable storage medium
  • Data access permission updating method and device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] see figure 1 , figure 1 It is an implementation flowchart of a method for updating data access rights in an embodiment of the present invention, and the method may include the following steps:

[0055] S101: Analyze the detected file change event to obtain the target original file corresponding to the file change event and the target user information of the executor.

[0056] After receiving the files uploaded by each client, the cloud server detects whether there is a file change event, such as whether there is an action to modify or delete the stored file, and if so, obtains the file change event, which includes the changed The target original file and the target user information of the executor who executes the file change. The detected file change event is analyzed to obtain the target original file corresponding to the file change event and the target user information of the executor.

[0057] S102: Obtain an authorized user information group corresponding to th...

Embodiment 2

[0073] see figure 2 , figure 2 It is another implementation flowchart of the method for updating data access rights in the embodiment of the present invention, and the method may include the following steps:

[0074] S201: Analyze the detected file change event to obtain the target original file corresponding to the file change event and the target user information of the executor.

[0075] S202: Obtain an authorized user information group corresponding to the target original file, and select representative user information from all user information in the authorized user information group except the target user information.

[0076] S203: Use the original ciphertext re-encryption key corresponding to the target original file to decrypt the representative user information to obtain the original plaintext re-encryption key.

[0077] S204: Use the original plaintext re-encryption key to decrypt the pre-stored first re-encrypted ciphertext packet corresponding to the target o...

Embodiment 3

[0144] Corresponding to the above method embodiment, the present invention also provides a device for updating data access rights. The device for updating data access rights described below and the method for updating data access rights described above can be referred to in correspondence.

[0145] see image 3 , image 3 It is a structural block diagram of an apparatus for updating data access rights in an embodiment of the present invention, and the apparatus may include:

[0146] The event analysis module 31 is used to analyze the detected file change event, and obtain the target original file corresponding to the file change event and the target user information of the executor;

[0147] The information selection module 32 is used to obtain the authorized user information group corresponding to the target original file, and select representative user information from each user information in the authorized user information group except the target user information;

[014...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data access permission updating method, which comprises the following steps of: analyzing a file change event to obtain a target original file and target user information of an executor; selecting representative user information from each piece of user information except the target user information in an authorized user information group of the target original file, wherein the representative user information is used for decrypting the original ciphertext re-encryption key; decrypting a pre-stored first re-encrypted ciphertext packet by using the decrypted original plaintext re-encryption key to obtain a first ciphertext fragment of a mask ciphertext file corresponding to the target original file; performing recovering according to the first ciphertext fragment to obtain the mask ciphertext file, and generating a second random number; and calculating a target plaintext re-encryption key according to the mask ciphertext file and the second random number, and synchronizing the target plaintext re-encryption key to other user information except the target user information. According to the method, the data processing scale is reduced, and the data access permission updating burden is relieved. The invention further discloses a device, equipment and a storage medium, which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the field of storage technology, in particular to a method, device, device and computer-readable storage medium for updating data access rights. Background technique [0002] With the explosive growth of data generated by technologies such as the Internet of Things and social networks, it is difficult for users to store these large-scale data locally. Due to the advantages of cloud storage, outsourcing big data to the cloud for storage has gradually become a trend. However, directly outsourcing data to the cloud will pose a threat to the security of user data, so users choose to encrypt the data before outsourcing the data. Due to different user encryption keys, the same data will be encrypted into different ciphertexts, which brings challenges to the cloud to perform deduplication operations. [0003] However, among the existing deduplication schemes, most of the ciphertext-based deduplication schemes do not support ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6218G06F21/604G06F21/602G06F2221/2107G06F2221/2141
Inventor 郝蓉徐路君侯佳威于佳
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products