Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for storing confidential information in cloud computing environment

A cloud computing environment and confidential technology, applied in computer security devices, calculations, instruments, etc., can solve problems such as strong attackability, poor security, unfavorable storage of confidential content, etc., to ensure privacy and confidentiality, correctness assurance, The effect of ensuring confidentiality

Pending Publication Date: 2021-05-14
广东浩云长盛网络股份有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for storing confidential information in a cloud computing environment, so as to solve the problem that the security and privacy of information in a cloud environment are particularly important in the above-mentioned background technology, but the existing storage in a cloud environment The method has poor security and strong attackability, which is not conducive to the storage of confidential content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing confidential information in cloud computing environment
  • Method for storing confidential information in cloud computing environment
  • Method for storing confidential information in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will be combined with the Figure 1 to Figure 4 The present invention is described in detail, and the technical solutions in the embodiments of the present invention are clearly and completely described. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0059] It should be noted that when a component is referred to as being "fixed to" another component, it can be directly on the other component or there may also be a centered component. When a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be a co-existence of an intervening component. When a component is considered to be "set on" anothe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer storage methods, in particular to a method for storing confidential information in a cloud computing environment, which comprises the following processes: (1) determinin participants; (2) adopting an encryption algorithm; (3) building an architecture model of the SCBRHD; (4) carrying out SCBRHD scheme operation; and (5) carrying out an SCBRHD algorithm process. The method has the advantages that the RSA algorithm and the DES algorithm are used for executing encryption, decryption and data authentication, the safety of the data is ensured by calculating the Hash abstract and comparing, in the SCBRHD, only the EU can decrypt the data received from the trusted third party TPA, because the data is encrypted by the public key d2 of the EU, only the corresponding private key pk2 can performdecryption. The private key is only known by the EU, so that the correctness of the data is ensured, and when the EU wants to read the data stored on the CS, the TPA requires to execute data integrity verification on the data from the CS, so that the integrity of the data is ensured.

Description

technical field [0001] The invention relates to the technical field of computer storage methods, in particular to a storage method of confidential information in a cloud computing environment. Background technique [0002] Cloud computing is a new technology that provides various hardware, software and application services through the Internet. Due to its high resource utilization, large storage space, super processing power and other characteristics, it will become the mainstream computing in the future. However, due to the open nature of cloud computing, various services are provided to end users through the Internet, so there are potential security risks. Data privacy protection and secure storage problems have become huge obstacles to the promotion of cloud computing. According to a survey, 74% of IT industry executives and office staff do not want to store their information on cloud servers because of security and privacy risks, therefore, a new service architecture is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F21/64
CPCG06F21/6245G06F21/602G06F21/64G06F2221/2107
Inventor 朱红兵
Owner 广东浩云长盛网络股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products