Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key updating method for cloud storage and implementation method of cloud data auditing system

A key update and cloud storage technology, applied in the field of network security, to achieve the effect of small network bandwidth, reduced computing burden, and low computing cost

Inactive Publication Date: 2015-07-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to propose a key update method for cloud storage in view of possible problems such as key leakage and digital certificate expiration in cloud storage, so as to ensure that after the cloud user updates the key, there is no need to update the key from the cloud. Download the entire file on the server, but only need to download the file label and data block label corresponding to each file, and update the content of these labels to complete the key update, so as to reduce the gap between the cloud server and the cloud user caused by the key update. Inter-communication costs, reducing the computational complexity of cloud users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key updating method for cloud storage and implementation method of cloud data auditing system
  • Secret key updating method for cloud storage and implementation method of cloud data auditing system
  • Secret key updating method for cloud storage and implementation method of cloud data auditing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0049] Based on the theory of cryptography, the present invention provides a method for realizing cloud data auditing with functions of key update and data privacy protection. At first the cryptography theory applied in the present invention is briefly introduced:

[0050] (1) Public key infrastructure PKI (public key infrastructure)

[0051] PKI technology is a key management platform that follows established standards. It can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications. In simple terms, PKI is an infrastructure for providing security services established using public key theory and technology. As a security technology, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key updating method for cloud storage and an implementation method of a cloud data auditing system, and belongs to the technical field of network security. The secret key updating method for cloud storage comprises the steps that when a cloud user needs to update a secret key, a CA server is requested to generate a new secret key, and a new file label and a new data block label are generated based on a file label and a data block label downloaded from a cloud server, the old secret key and the new secret key at present, are uploaded to the cloud server, and are used for replacing the corresponding old file label and the corresponding old data block label in the cloud server. Meanwhile, the invention further discloses the implementation method of the cloud data auditing system on the basis of zero-knowledge verification. When the cloud user needs to update the secret key, the corresponding file label and the corresponding data block label on the cloud server are updated based on the secret key updating method for cloud storage. The secret key updating method for cloud storage and the implementation method of the cloud data auditing system are used in a cloud network, the communication cost, caused by changing of the secret key, between the cloud server and the cloud user can be remarkably reduced, the calculation cost of the operation that the cloud user calculates the labels again is reduced, and the data privacy can be effectively protected in the auditing process.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a cloud storage key update method and an implementation method of a cloud data audit system based thereon. Background technique [0002] Cloud computing is the product of the integration of traditional computer technology and network technology such as distributed computing, grid computing, parallel computing, distributed storage, and virtualization. It is an important innovation in information technology, and it is also a strategic opportunity for my country's information technology industry to achieve innovative breakthroughs and leapfrog development. [0003] Cloud computing has brought super computing power and huge economic benefits, and its advantages are beyond doubt. However, security issues have become a "blocker" in the promotion of cloud computing and an important factor restricting the rapid development of cloud computing. In April 2010, Gartner's...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/08
Inventor 禹勇李艳楠邱佳惠张亚芳薛靓
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products