Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User security access structure and method oriented to data resource blocked storage

A data-oriented, block-based storage technology, applied in the field of security services, can solve problems such as data resource leaks, enhancements, and data resource security threats

Active Publication Date: 2019-09-03
HANGZHOU DIANZI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although split storage can maintain the security of data resources in cloud servers to a certain extent, with the continuous enrichment and development of data resources, the number of users has increased sharply, and various user behaviors (such as data mining, data search, etc.) The security of data resources is affected, which greatly enhances the possibility of data resources being leaked
At the same time, the means and methods for illegal users to obtain data resources through network attacks are constantly updated, their behavior is becoming more and more secretive, and the security threat to their data resources is increasing.
In this case, the data resources stored in the cloud server cannot avoid the problems of illegal operation, theft and disguise
The existence of these problems makes legitimate users full of doubts about the data resources provided by the cloud server, and it is difficult to believe that the data resources provided by the cloud server are real and safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User security access structure and method oriented to data resource blocked storage
  • User security access structure and method oriented to data resource blocked storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The present invention will be further described below in conjunction with accompanying drawing.

[0082] The user security access method oriented to block storage of data resources of the present invention includes: a structural model and a signature authentication algorithm for user security access oriented to block storage of data resources. The structural model for user security access to block storage of data resources is as follows: figure 1 As shown, it mainly includes two parts: cloud server and user. In the cloud server, it includes: virtual machine manager, virtual machine 1, virtual machine 2, . . . virtual machine n. Among them, the main functions of the virtual machine manager are: to manage the virtual machine, verify the identity of the user, receive the information sent by the user, provide retrieval and service for the user's access application, and transmit the key information sent by the user to the virtual machine ;The main functions of the virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user security access structure and method for data resource blocked storage. The structure comprises a cloud server and a user, and the cloud server comprises a virtual machine manager and a plurality of virtual machines. The method comprises the steps: applying a data resource demand of a user; the virtual machine manager authenticating the identity of the user; the virtual machine manager retrieving data resources required by the user and sending retrieval result information to the user; the user receiving the retrieval result information; the user generating parameter information of the data block public key and the data block private key according to the received retrieval result information; the user transmitting the parameter information of the data block private key to the virtual machine manager; the virtual machine manager transmitting private key parameter information and a transmission command sent by a user to the virtual machine; generating a datablock private key in the virtual machine; signing and transmitting a data block in the virtual machine; receiving and authenticating the signature data block by the user; and merging the data blocksby the user. And a legal user can access resources more safely.

Description

technical field [0001] The invention belongs to the field of security services for data resource storage in cloud servers, and in particular relates to a user security access structure and method for block storage of data resources. Background technique [0002] The combination of the Internet of Things and cloud storage technology has led to the rapid growth of data resources in cloud computing. More and more sensor data are transmitted to cloud servers and provide data services to users through cloud servers. At the same time, the destruction, theft and disguise of cloud data resources by illegal users are also increasing. In this case, in the cloud server, legitimate users face more serious security threats to the use of data resources. [0003] In order to maintain the security of data resources on the cloud server side, when the sensing data is stored in the cloud server, people use block storage, that is, divide and store data resources and store them in different vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/32H04L29/06H04L29/08G06F9/455H04L9/08
CPCH04L63/10H04L9/0825H04L63/166H04L67/1097H04L9/3252H04L9/3247H04L9/3066G06F9/45533G06F2009/45587
Inventor 李运发
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products