Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security method of personal data in cloud storage

A data security and cloud storage technology, applied in the field of cloud storage and data security, can solve the problems of difficult key management, unavoidable security loopholes in cloud computing systems, complex data security risks, etc., to achieve high security, avoid technical bottlenecks and Complex application environment, solving the effect of key management

Active Publication Date: 2014-12-17
SAGE MICROELECTRONICS CORP
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] From a technical point of view, due to the problems of service networking, data centralization, platform sharing, and diversification of participating roles, security vulnerabilities in cloud computing systems are unavoidable; in addition, key management is also a difficult problem
In short, the data security risks faced by cloud computing are more complex than traditional information systems, and there are many technical difficulties in implementing customer data security protection in the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security method of personal data in cloud storage
  • Security method of personal data in cloud storage
  • Security method of personal data in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0062] On the contrary, the invention covers any alternatives, modifications, equivalent methods and schemes within the spirit and scope of the invention as defined by the claims. Further, in order to make the public have a better understanding of the present invention, some specific details are described in detail in the detailed description of the present invention below. The present invention can be fully understood by those skilled in the art without the description of these detailed parts.

[0063] see figure 1 , is shown as a flow chart of the method for cloud storage personal data security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security method of personal data in cloud storage. The security method includes, in the process of uploading of local data, encrypting the data by means of hardware encryption and then uploading the same to a cloud storage system so as to keep the data stored in the cloud storage system encrypted; in the process of downloading the data to a local device from the cloud storage system, decrypting the data by means of hardware decryption and then storing the same to the local device. According to the technical scheme, encryption and decryption of client files in cloud disks are independent of network and cloud computing systems, all the operations of encryption and decryption are completed on the client side, technical bottleneck and complicated application environment to implementation of data security measures on the cloud side are avoided, and the security method has the advantages of high safety, reliability and usability and the like.

Description

technical field [0001] The invention relates to the field of cloud storage and data security, in particular to a method for cloud storage of personal data security. Background technique [0002] At present, cloud computing (including cloud storage) has become a recognized development focus of the global ICT industry, and data leakage is the most worrying issue of cloud storage to the public, and it is also a huge obstacle blocking the commercialization of cloud computing. Many threats may lead to the loss and leakage of customer cloud disk (network disk) data, such as hacker attacks, etc., and further raise the issue of customer trust in cloud storage services. In addition, according to relevant data leakage investigation reports, 48% of data leakage is due to malicious insiders, such as management and maintenance personnel of cloud computing service providers, supplier employees, and so on. [0003] From a technical point of view, due to the problems of service networking,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 骆建军
Owner SAGE MICROELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products