Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud computing environment data security storage system and method

A technology for data security storage and cloud computing environment, applied in the field of information security systems, it can solve the problems of protection and the lack of user data, so as to ensure data security, prevent malicious tampering or leakage, and save key generation and management. Effect

Active Publication Date: 2015-11-25
CEC CYBERSPACE GREAT WALL
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if there is a collusion attack between the key management party and the cloud platform provider, the user's data will not be properly protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud computing environment data security storage system and method
  • A cloud computing environment data security storage system and method
  • A cloud computing environment data security storage system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described below in conjunction with the accompanying drawings.

[0037] In the following description, some specific details are provided to provide those skilled in the computer arts with a general understanding of the present invention. In the embodiments, elements for realizing specific functions are shown in the form of schematic diagrams or block diagrams, so as to highlight technical points without obscuring the present invention in unnecessary details. For example, since those of ordinary skill in the art can understand the details disclosed in this field about network communication, electromagnetic signal command technology, user interface or input / output technology, etc., the maximum degree of The above technical details are omitted above, and these details are not considered to be the necessary features to obtain the complete technical solution of the present invention.

[0038] Such as figure 1 As shown, the cloud computing envi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cloud computing environmental data secure storage system and a method. The cloud computing environmental data secure storage system comprises a key management server, an encryption and decryption server, a user terminal and a cloud platform which are respectively connected with a key mapping server and conduct data exchange with the key mapping server. By preserving and maintaining a mapping relation between a key and enciphered data through the key mapping server, a direct relation between a key value and cipher test data is broken. When data memory addresses are sent to the user terminal, or user data are sent to the user terminal, the key mapping server deletes the key value, the user data and the cipher text data; when the encryption and decryption server deletes the key value, the user data and the cipher text data after completing encryption or decryption. The key value and the cipher text data do not exist at the same time in a position which a key mapping relation is preserved, the key value and the key mapping relation do not exist at the same time in a position which the cipher text data are preserved, and the key mapping relation and the cipher text data do not exist at the same time in a position which the key value is preserved, and therefore tripartite independence of the key value, the cipher text data and the key mapping relation is achieved.

Description

technical field [0001] The invention relates to an information security system and method, in particular to a cloud computing environment data security storage system and method. Background technique [0002] Cloud computing is an Internet-oriented distributed computing service. As a delivery model for IT resources and services, it can obtain the required resources from a shared pool of configurable computing resources anytime, anywhere, conveniently, and on demand. (such as networks, servers, storage, applications, services, etc.), these resources can be quickly provisioned and released, while minimizing management costs or service provider intervention. Cloud computing is the most popular technical term in the IT industry in recent years. Many experts believe that cloud computing will change the technical foundation of the Internet and even affect the entire industry structure. At present, almost all IT industry giants in the world are devoted to the research and applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 张雅哲王艳霞张大鹏
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products