Lightweight file remote encryption method under mobile cloud computing environment

A computing environment, encryption method technology, applied in the computer field

Active Publication Date: 2016-12-07
XIDIAN UNIV
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through remote encryption, ciphertext file sharing, and integrity verification, the present invention can ensure the confidentiality of the key and the integrity of the file, effectively solve the problem of leakage of user files and keys caused by the attack on the cloud, and further strengthen the use of file security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight file remote encryption method under mobile cloud computing environment
  • Lightweight file remote encryption method under mobile cloud computing environment
  • Lightweight file remote encryption method under mobile cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] The present invention will be further described below in conjunction with the accompanying drawings.

[0094] Refer to attachedfigure 1 , to further describe the specific steps for realizing the present invention.

[0095] Step 1, verify the mobile terminal user.

[0096] Using the user authentication method, the private cloud authenticates the mobile terminal user.

[0097] The specific steps to implement the user authentication method are as follows:

[0098] Step 1, the mobile terminal sends the mobile terminal user identification code ID, password psd, the file name fn of the file to be encrypted, the privacy level PrivLevel and the time stamp t of the file to be encrypted 1 Encrypt with the public key of the private cloud, and send the encrypted message to the private cloud.

[0099] In the second step, the private cloud decrypts the received message with its own private key, and obtains the mobile terminal user identification code ID and password psd.

[0100]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight file remote encryption method under mobile cloud computing environment, and relates to the interaction of a mobile terminal, a private cloud and a public cloud. The implementation steps are as follows: (1) the mobile terminal interacting with the private cloud to remotely encrypt a to-be-encrypted file; (2) the private cloud sharing ciphertext file to the public cloud; (3) using the private cloud as the credible third party to replace the mobile terminal to verify the integrity of the ciphertext file at the public cloud at fixed time; (4) the public cloud returning the ciphertext file to the private cloud when a mobile terminal user needs to use the file; (5) the mobile terminal interacting with the private cloud to remotely decrypt the ciphertext returned by the public cloud. Through the adoption of the method disclosed by the invention, the storage and computation burden of the mobile terminal are effectively reduced, the advantage of the cloud computation is played, the confidentiality of the key and the file information are improved, the security of the data used by the user is guaranteed, and the user privacy is protected.

Description

technical field [0001] The invention belongs to the field of computer technology, and further relates to a remote encryption method for lightweight files in a mobile cloud computing environment in the field of mobile cloud computing security technology. The present invention can prevent the private cloud from knowing the encryption key through remote encryption during the file encryption process of the user, thereby ensuring the security of the file and the key, thereby avoiding the problem of user privacy leakage caused by the attack on the cloud . Background technique [0002] With the widespread popularization of mobile terminals (MT, Mobile Terminal), people prefer to use mobile terminals to access and use networks than using traditional terminals such as computers. Mobile terminals have many advantages, such as small size, easy to carry, fast, interactive, and not limited by time and space anytime and anywhere, so they are favored by the majority of users, and their ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/083H04L63/123H04L63/126
Inventor 杨力韩孜怡周亚胜韦腾司杨涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products