Data anti-leakage protection method for cloud storage environment

A cloud storage and anti-leakage technology, applied in the field of information security, can solve problems such as unsatisfactory data leakage protection, retention, complex calculation process, etc.

Active Publication Date: 2016-01-20
WUHAN UNIV OF TECH
View PDF1 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of method is still at the stage of theoretical exploration. The calculation process is very

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data anti-leakage protection method for cloud storage environment
  • Data anti-leakage protection method for cloud storage environment
  • Data anti-leakage protection method for cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The present invention will be further described in detail below in conjunction with examples, but these examples should not be construed as limiting the present invention.

[0067] In step 2), select the security parameter λ shown below and the group generator g to be paired p , g r , Y and the parameters a, a′, g in the master key 2 , used to generate the public key PK L and master key MK:

[0068] λ=2 160

[0069] g p =[7809132837767772651573398790375403753462635003623019020044719272892058114280169545363627979672267814658276323812421368981173841647068218684446465465855241,7406643807957608305790166986115601778083675130710226906362591601230255575641360818656017098156052158125464120405691949210352493932149295057446052059530714]

[0070] g r =[4927806246087013323176344129922077121049761463643223330379875014379649792357196308368218031913996561191471542282649512239400384858148590491435071205008076,3959556302535778130756496571193265082800275622456294723604146789658349454

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data anti-leakage protection method for a cloud storage environment. The method comprises the following steps of setting system symbols and parameters; performing system initialization; sending a user attribute list L to an authorization mechanism TA and requesting generation of an attribute secret key by a user; after the authorization mechanism TA receives the user attribute list L, generating a private key SKL of the user; performing data encryption; performing keyword encryption; generating a trap door; performing server search; and performing data decryption. Compared with the prior art, the method can directly search encrypted information stored in a cloud storage server effectively in a non-trusted environment, ensures safety of data and privacy of the user, and can support search access control of different user fine grits. The method provides reliable guaranteed for data safety in the cloud storage environment and has a good application prospect.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products