Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data security protection method and device based on cloud computing

A technology for data security and protection devices, which is applied in the field of data security to achieve the effects of high security performance, security privacy, and security

Inactive Publication Date: 2018-08-24
中经汇通电子商务有限公司
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current cloud computing market, cloud computing service providers such as Alibaba Cloud, Google Cloud, Microsoft Cloud, and Amazon Cloud provide data owners with cloud storage and computing services on the cloud platform, which helps data owners to solve Solving the storage and management problems of these massive data materials can save the local storage space and management costs of the data owners. However, how to process and calculate user data under the premise of protecting data privacy can help data owners truly Capturing the intrinsic value of the desired data, such as correlation, causation, etc., is a problem that has not been fully solved so far
Although the popularity of cloud computing online computing services has solved the problem of data computing, it has challenged the protection of user data security and privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device based on cloud computing
  • Data security protection method and device based on cloud computing
  • Data security protection method and device based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0042] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0043] Such as figure 1 As shown, the cloud computing-based data security protection method in this embodiment is suitable for user terminals and includes the following steps:

[0044] S102, call t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security protection method and device based on cloud computing. The method comprises the following steps of calling a key generation function, inputting security parameters and outputting an encryption and decryption key pair; sharing an encryption key in the encryption and decryption key pair to a data master terminal; negotiating with the data master terminal to determine a maximum value of the number of data entries in order to make the data master terminal form ciphertext data according to the encryption key and the maximum value of the number of data entries,and uploading the ciphertext data to a cloud server for storage; and receiving encryption data information sent by the cloud server and / or a proxy server, and decrypting according to a decryption keyin the encryption and decryption key pair. According to the technical scheme, the local storage space and the data management cost of the data master terminal are saved, and meanwhile, the faster andmore accurate computing capability is obtained by utilizing the functions of the cloud computing, and the privacy of user data and the privacy of related computing requests are effectively protected.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular, to a data security protection method based on cloud computing and a data security protection device based on cloud computing. Background technique [0002] In the current cloud computing market, cloud computing service providers such as Alibaba Cloud, Google Cloud, Microsoft Cloud, and Amazon Cloud provide data owners with cloud storage and computing services on the cloud platform, which helps data owners to solve Solving the storage and management problems of these massive data materials can save the local storage space and management costs of the data owners. However, how to process and calculate user data under the premise of protecting data privacy can help data owners truly Capturing the intrinsic value of the desired data, such as correlation, causation, etc., is a problem that has not been fully solved so far. Although the popularity of cloud computing online ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/64G06F21/62
CPCH04L63/123G06F21/6245G06F21/64H04L63/0471
Inventor 郝波晏金成
Owner 中经汇通电子商务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products