Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-data encryption system and method of cloud computing system

A data encryption and cloud computing technology, which is applied in the field of cloud computing, can solve the problems of high encryption complexity and low efficiency of cloud computing operation, and achieve high decryption efficiency, avoid data security problems, and make cracking difficult.

Active Publication Date: 2021-04-30
CHECC DATA CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the high complexity of encryption, the operating efficiency of cloud computing is reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-data encryption system and method of cloud computing system
  • Multi-data encryption system and method of cloud computing system
  • Multi-data encryption system and method of cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 As shown, a multiple data encryption system of a cloud computing system, the system includes: a data extraction device, a data processing device, a data encryption group and a password resource device that are located in a cloud computing environment and connected in sequence; the data processing device is configured It is used to establish data link keyword information for user data, and perform multiple encryptions through the data encryption group according to the data link keyword information to generate matching data ciphertext chains and data extraction features, and encrypt and decrypt user data, Store the encrypted data, store the data ciphertext chain and data storage address in the data extraction device, and pass the data extraction features to the user; when the user needs to share data with other users, the user will pass the data extraction features to the For the other users, the data extraction device is configured to manage the data cip...

Embodiment 2

[0035] On the basis of the previous embodiment, the data encryption group includes: a first data encryption device, a second data encryption device and a third data encryption device; the first data encryption device is configured to perform encryption on the data to be encrypted Randomly divide twice to get three divided data, which are divided into the first data, the second data and the third data, and record the position of the division point in the data to be encrypted when the random division is performed twice at the same time, as Data link connection features, and encrypt the first data to obtain the first encrypted data; the second data encryption device is configured to encrypt the second data to obtain the second encrypted data; the third data encryption device , configured to encrypt the third data to obtain the third encrypted data, and at the same time, based on the data link connection characteristics recorded by the first data encryption device, connect the firs...

Embodiment 3

[0038] On the basis of the previous embodiment, after the data processing device generates the matching data ciphertext chain and data extraction features, it also generates a data integrity check code, and the data integrity check code is stored in the data extraction device ; After the data extraction device extracts the data from the cloud storage platform, it first performs data integrity verification according to the data integrity check code.

[0039] Specifically, in the process of data transmission, it will be affected by various interferences, such as pulse interference, random noise interference and artificial interference, etc., which will cause data errors. In order to control the errors in the transmission process, the communication system must take effective measures to control the generation of errors.

[0040] Commonly used error control methods allow each transmitted data unit to have redundant information sufficient to enable the receiving end to discover err...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing, in particular to a multi-data encryption system and method of a cloud computing system. The system comprises a data extraction device, a data processing device, a data encryption group and a password resource device which are located in a cloud computing environment and are connected in sequence, and the data processing device is configured to establish data chain keyword information for user data, and perform multiple encryption through the data encryption group according to the data chain keyword information to generate a matched data ciphertext chain and data extraction features. Data segmentation is performed through data in cloud computing, and then multiple encryption is performed on the segmented data, so that the security of the data in the cloud computing system is improved, and the method has the advantage of high cracking difficulty; and meanwhile, the data ciphertext chain and the data extraction features are utilized to decrypt the user data, and compared with a decryption mode based on symmetric encryption or asymmetric encryption, the decryption efficiency is higher, and the efficiency of the cloud computing system is improved.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a multiple data encryption system and method of a cloud computing system. Background technique [0002] Cloud computing (cloud computing) is a kind of distributed computing, which refers to decomposing a huge data computing processing program into countless small programs through the network "cloud", and then processing and analyzing these programs through a system composed of multiple devices. The applet gets the result and returns it to the user. In the early days of cloud computing, simply put, it was simple distributed computing, solving task distribution, and merging calculation results. Therefore, cloud computing is also called grid computing. Through this technology, the processing of tens of thousands of data can be completed in a very short period of time (a few seconds), so as to achieve powerful network services. [0003] In the cloud computing e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/0435H04L63/126
Inventor 桑洪升
Owner CHECC DATA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products