CN102571771B - Safety authentication method of cloud storage system - Google Patents

Safety authentication method of cloud storage system Download PDF

Info

Publication number
CN102571771B
CN102571771B CN201110444484.5A CN201110444484A CN102571771B CN 102571771 B CN102571771 B CN 102571771B CN 201110444484 A CN201110444484 A CN 201110444484A CN 102571771 B CN102571771 B CN 102571771B
Authority
CN
China
Prior art keywords
user
access
client
return
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110444484.5A
Other languages
Chinese (zh)
Other versions
CN102571771A (en
Inventor
周可
李春花
陈杰
雷栋梁
罗芳
申爱花
李坦
刘相文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201110444484.5A priority Critical patent/CN102571771B/en
Publication of CN102571771A publication Critical patent/CN102571771A/en
Application granted granted Critical
Publication of CN102571771B publication Critical patent/CN102571771B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a safety authentication method of a cloud storage system, belonging to the field of storage technology and information security technology of computers. The method solves the problems that the existing safety authentication methods are complex in authentication process and great in authentication consumption, and aims at providing simple, flexible and efficient authentication with high expandability and high safety for service safety of a cloud storage system, so as to prevent invasion of external or internal attackers to the storage system. The method comprises a client process, an authentication end progress and a storage end progress; the client loads the user identifiers of all login users, and the authentication end loads an access control library. The method checks whether the operation authorization of the user is legal by calculating the verifying identifier, the storage end does not need to maintain the access control library any longer, and verification on the access request of the user can be completed with simple calculation, thereby greatly reducing expense of the storage system on access control, and providing flexible, safe, reliable and efficient file access for users having operation authorization in the large-scale cloud storage system.

Description

A kind of safety certifying method of cloud storage system
Technical field
The invention belongs to computer memory technical and field of information security technology, be specifically related to a kind of safety certifying method of cloud storage system.
Background technology
Cloud storage system is that cloud storage system, to user, does not refer to some concrete equipment, and refers to an aggregate being made up of many memory devices and server in the conceptive extension of cloud computing and a development new concept out.The safety of cloud storage system, basic target is to guarantee storage and the safety of visit data, so carrying out before authorized user visit data, cloud storage system should authenticate this user's identity.In the time that user accesses a data object, by inquire about the Access Control List (ACL) of this data object in certification end, if can find this user's access control entry, and while thering is the authority of solicit operation, just can authorize user accesses data, otherwise refusal user's request.Under the environment of cloud storage system, storage end direct-connected in complicated customer network to obtain the high concurrency of system, therefore, certification end and storage end all need the access rights of authentication of users to file.
How to provide have simple, flexibly, the authentication of efficient, enhanced scalability and high security, become the purpose of design of cloud storage system safety certification.The safety certifying method of existing cloud storage system, storage end and certification end must safeguard that same list of access rights carrys out authentication of users whether file is had to access rights.In the time that user and quantity of documents sharply rise, will inevitably produce the Access Control List (ACL) of huge information content, certification end and storage end need to spend great network control expense and go to safeguard same list of access rights, guarantee that the information of access rights is consistent; Meanwhile, the time complexity of queried access control list can increase and increase along with the information content of Access Control List (ACL).
Below the explanation of nouns in the present invention:
Action type, comprises " reading ", " writing " and " deletion ", with string representation;
Access control storehouse is the database that records the Access Control List (ACL) of All Files;
Access Control List (ACL) is the list of all access control entries of corresponding a file;
Access control entry, represents the access rights of designated user to file;
Access rights are the set that combined by different action types; For example { " reading ", " writing " }, { " writing ", " deletion " };
Access control string is the character string that user ID, file identification and access rights connect and compose;
Access tickets is that certification end is the binary data that user's file operation requests calculates;
Checking bill is the binary data that storage end calculates for user's user access request;
Expired time point, is the expired time of access tickets, exceedes corresponding access tickets of this time and loses efficacy;
Global secret is the secret binary data that certification end and storage end are shared;
Escape way, is to make communicating pair obtain safely common key by the mode of key agreement, carrys out coded communication message and guarantee the safety of communication information transmission with this key.
Summary of the invention
The present invention proposes a kind of safety certifying method of cloud storage system, solve verification process complexity, the huge problem of authentication consumption that existing safety certifying method exists, for cloud storage system service safe provide simply, flexibly, the authentication of efficient, enhanced scalability and high security, prevent outside or the person of the internaling attack intrusion to storage system.
The safety certifying method of a kind of cloud storage system of the present invention, comprises client process, certification end process and storage end process; Client is loaded the user ID of all login user, and access control storehouse is loaded in certification end; After startup, client, certification end, storage end connect respectively each other between two, between certification end and storage end, set up escape way;
It is characterized in that:
A. described client process, comprises the steps:
(A1) client generates an access request sequence number R0 at random, send to storage end, wait the return information of end to be stored, receive after the return information of storage end, judge that whether sequence number storage successfully indicates this information, is to go to step (A2); Otherwise go to step (A1);
(A2) wait for that user initiates file operation requests, receive after file operation requests, go to step (A3);
Wherein, file operation requests comprises user ID, file identification and action type, and action type comprises " reading ", " writing " and " deletion ";
(A3) submitting file operation requests to certification end, then judge whether certification end returns to user rs authentication result, is cache user the result, goes to step (A4); Otherwise forbid user's file operation requests, go to step (A2);
Wherein, user rs authentication result comprises access tickets TK, expired time point ET and access control string V;
(A4) judge whether current time exceedes the expired time point ET in user rs authentication result, is to delete this user rs authentication result, goes to step (A3); Otherwise generate an access request sequence number R1 of synchronizeing with storage end, user's the result, calculates access identities TG:
TG=H(TK,R1,V);
Wherein, H () represents the variable uses hash algorithm in bracket to calculate, and goes to step (A5);
(A5) by access identities TG, access character string V, expired time point ET and file operation requests composition user access request, send to storage end, then the information type that judgement storage end returns: desired data, return to request desired data to user, delete this user rs authentication result, go to step (A2); Ask expiredly, go to step (A4); Denied access, the file operation requests of forbidding user, deletes this user rs authentication result, goes to step (A2);
Wherein, storage end return information is divided into desired data, asks expired and denied access;
B. described certification end process comprises the steps:
(B1) certification end generates a global secret K at random, sends global secret K by escape way to storage end; Etc. the return information of end to be stored, receive the return information of storage end, judge whether global secret storage successfully indicates this information, is to carry out step (B2), goes to step (B4) simultaneously; Otherwise go to step (B1);
(B2), after stand-by period T, go to step (B3); T=0.01 second~1 year, by default;
(B3) generate at random a new global secret, then submit replacing key request by escape way to storage end, change key request and comprise new global secret; Judge whether key updating successfully indicates the information that storage end returns, and is to use new global secret to replace former global secret, goes to step (B3) after stand-by period T; Otherwise go to step (B3);
(B4) file operation requests of wait client, receive after the file operation requests that client submits, whether the Access Control List (ACL) that the file identification in use file operation requests is searched corresponding document in access control storehouse exists, and is to go to step (B5); Otherwise return to denied access to client, go to step (B4);
(B5) whether the access control entry that uses user ID in file operation requests to search relative users in Access Control List (ACL) exists, and is to go to step (B6); Otherwise return to denied access to client, go to step (B4);
(B6) judging the whether subset of access rights in access control entry of action type in file operation requests, is that user has the authority of access file, goes to step (B7); Otherwise user does not have the authority of access file, returns to denied access to client, go to step (B4);
(B7) certification end is connected the access rights in user ID, file identification and access control entry as access control string V, chooses expired time point ET, calculates access tickets TK:
TK=H(K,V,ET);
By TK, ET and V composition user rs authentication result, return to client by escape way; Go to step (B4);
C. described storage end process comprises the steps:
(C1) wait for that certification end sends global secret K, receive the global secret K that certification end sends, buffer memory global secret K also judges whether to store successfully, is to return to global secret storage successfully to indicate to certification end, go to step (C2), go to step (C3) simultaneously; Otherwise return to global secret storage failure flags to certification end, go to step (C1);
(C2) wait for that certification end sends replacing key request, receive and change after key request, use the new global secret of changing in key request to replace former global secret; Judge whether global secret is updated successfully, and is to be updated successfully mark to certification end " return " key", goes to step (C2); Otherwise upgrade failure flags to certification end " return " key", go to step (C2);
(C3) wait for the access request sequence number R0 that client sends, receive after the access request sequence number R0 of client transmission, by its buffer memory and judge whether to store successfully, be to return to sequence number storage to client successfully to indicate, go to step (C4); Otherwise return to sequence number storage failure flags to client, go to step (C3);
(C4) wait for the user access request of client, receive after the user access request that client submits, extract the action type of file operation requests in user access request, and extract the access rights that in user access request, access control string comprises; Then judging the whether subset of access rights of this action type, is that user has the authority of access file, goes to step (C5); Otherwise return to denied access to client, go to step (C4);
(C5) judging whether current time exceedes the expired time point ET in user access request, is that to return to client-requested expired, goes to step (C4); Otherwise go to step (C6);
(C6) storage end generates an access request sequence number R1 of synchronizeing with client; Use access control string V, expired time point ET in global secret K and user access request to calculate checking bill TK ':
TK’=H(K,V,ET),
Use access request sequence number R1, calculate checking mark TG ':
TG’=H(TK’,R1,V);
Go to step (C7);
(C7) judge whether the access identities TG in checking mark TG ' and user access request equates, is to return to respective request desired data according to the file operation requests in user access request to user, goes to step (C4); Otherwise return to denied access to client, go to step (C4).
Use time of the present invention, in the time that storage end is received the access request from user, whether legally verify that by calculating mark is carried out the operating right of inspection user, therefore make storage end no longer need maintenance access control storehouse, user access request is verified to simple computation and just can completes, reduced dramatically the expense of storage system for access control; Simultaneously, guaranteeing to transmit under the confidentiality prerequisite of confidentiality in access tickets process and shared global secret, the present invention is for the user in extensive cloud storage system with operating right provides flexible, safe, reliable and efficient file access, also can effectively stop have no right, unauthorized user or internal-external assailant's access and attack.
Accompanying drawing explanation
Fig. 1 is schematic flow sheet of the present invention;
Fig. 2 is client process schematic diagram;
Fig. 3 is certification end process schematic diagram;
Fig. 4 is storage end process schematic diagram;
Fig. 5 is work flow sequential chart.
Embodiment
The invention describes a kind of safety certifying method and realization of cloud storage system, and realize in a kind of distributed file system.
Below in conjunction with embodiment and accompanying drawing, the present invention is further described.
As shown in Figure 1, embodiments of the invention, comprise client process, certification end process and storage end process, operate in respectively on client host, certification end main frame and the storage end main frame of distributed file system; Client is loaded the user ID of all login user, and access control storehouse is loaded in certification end;
A. as shown in Figure 2, described client process, comprises the steps:
(A1) client generates an access request sequence number R0 at random, send to storage end, wait the return information of end to be stored, receive after the return information of storage end, judge that whether sequence number storage successfully indicates this information, is to go to step (A2); Otherwise go to step (A1);
(A2) wait for that user initiates file operation requests, receive after file operation requests, go to step (A3);
Wherein, file operation requests is divided into five fields, is command number, order length successively, user ID, and file identification and action type, action type comprises " reading ", " writing " and " deletion "; The form of file operation requests is as follows:
Command number Order length User ID File identification Action type
Command number is set to code name corresponding to file operation requests, order length is set to the length of file operation requests, user ID is set to user ID, and file identification is set to filename, and action type is set to corresponding action type; Mail to after setting completed certification end;
(A3) submitting file operation requests to certification end, then judge whether certification end returns to user rs authentication result, is cache user the result, goes to step (A4); Otherwise forbid user's file operation requests, go to step (A2);
Wherein, user rs authentication result comprises access tickets TK, expired time point ET and access control string V;
(A4) judge whether current time exceedes the expired time point ET in user rs authentication result, is to delete this user rs authentication result, goes to step (A3); Otherwise generate an access request sequence number R1 of synchronizeing with storage end, user's the result, calculates access identities TG:
TG=H(TK,R1,V);
Wherein, H () represents the variable uses hash algorithm in bracket to calculate, and goes to step (A5);
(A5) by access identities TG, access character string V, expired time point ET and file operation requests composition user access request, send to storage end, then the information type that judgement storage end returns: desired data, return to request desired data to user, delete this user rs authentication result, go to step (A2); Ask expiredly, go to step (A4); Denied access, the file operation requests of forbidding user, deletes this user rs authentication result, goes to step (A2);
Wherein, storage end return information is divided into desired data, asks expired and denied access;
Wherein, user access request is divided into seven fields, is command number, order length, expired time point, access identities, access control string length, access control string and file operation requests successively, and the form of user access request is as follows:
Command number Order length Expired time point Access identities Access control string length Access control string File operation requests
Command number is set to code name corresponding to user access request, order length is set to the length of user access request, expired time point is set to corresponding expired time point, access identities is set to corresponding access identities, access control string length is set to corresponding access control string length, access control tandem arrangement is corresponding access control string, and file operation requests is set to corresponding file operation requests; Mail to after setting completed client;
B. as shown in Figure 3, described certification end process comprises the steps:
(B1) certification end generates a global secret K at random, sends global secret K by escape way to storage end; Etc. the return information of end to be stored, receive the return information of storage end, judge whether global secret storage successfully indicates this information, is to carry out step (B2), goes to step (B4) simultaneously; Otherwise go to step (B1);
(B2), after stand-by period T=24h, go to step (B3);
Time T is by default, span 0.01 second~1 year, and T is the cycle time that represents to change global secret, the less replacing global secret of T value is more frequent; When system is during in unstable or unsafe condition, T value is little; When system is during in stable or safe state, T is can value large;
(B3) generate at random a new global secret, then submit replacing key request by escape way to storage end, change key request and comprise new global secret; Judge whether key updating successfully indicates the information that storage end returns, and is to use new global secret to replace former global secret, goes to step (B3) after stand-by period T; Otherwise go to step (B3);
(B4) file operation requests of wait client, receive after the file operation requests that client submits, whether the Access Control List (ACL) that the file identification in use file operation requests is searched corresponding document in access control storehouse exists, and is to go to step (B5); Otherwise return to denied access to client, go to step (B4);
File identification uses filename to represent, uses filename to search access control storehouse, and for example lookup result is following Access Control List (ACL):
102 { " reading " }
501 { " reading ", " writing " }
502 { " writing ", " deletion " }
Wherein, first row represents user ID, and secondary series represents access rights; The user that for example user ID is 501 is { " reading ", " writing " } to the access rights of file;
(B5) whether the access control entry that uses user ID in file operation requests to search relative users in Access Control List (ACL) exists, and is to go to step (B6); Otherwise return to denied access to client, go to step (B4);
(B6) judging the whether subset of access rights in access control entry of action type in file operation requests, is that user has the authority of access file, goes to step (B7); Otherwise user does not have the authority of access file, returns to denied access to client, go to step (B4);
User ID user ID represents, for example user ID is 501, action type is " writing ", access control entry corresponding to this user is { 501 so, { " reading ", " writing " } }, it is access rights { " reading " that action type " is write ", " write " } a subset, so this user has the authority of access file;
(B7) certification end is connected the access rights in user ID, file identification and access control entry as access control string V, chooses expired time point ET, calculates access tickets TK:
TK=H(K,V,ET);
By TK, ET and V composition user rs authentication result, return to client by escape way; Go to step (B4);
Wherein, user rs authentication result is divided into six fields, is command number, order length, expired time point ET, access tickets TK, access control string length and access control string V successively, and the form of user rs authentication result is as follows:
Command number Order length Expired time point Access tickets Access control string length Access control string
Command number is set to code name corresponding to user rs authentication result, order length is set to the length of user rs authentication result, expired time point is set to corresponding expired time point, and access tickets is set to corresponding access tickets, and access control string length is set to corresponding access control string length; Corresponding access control string is put in access control displacement; Mail to after setting completed client;
C. as shown in Figure 4, described storage end process comprises the steps:
(C1) wait for that certification end sends global secret K, receive the global secret K that certification end sends, buffer memory global secret K also judges whether to store successfully, is to return to global secret storage successfully to indicate to certification end, go to step (C2), go to step (C3) simultaneously; Otherwise return to global secret storage failure flags to certification end, go to step (C1);
(C2) wait for that certification end sends replacing key request, receive and change after key request, use the new global secret of changing in key request to replace former global secret; Judge whether global secret is updated successfully, and is to be updated successfully mark to certification end " return " key", goes to step (C2); Otherwise upgrade failure flags to certification end " return " key", go to step (C2);
(C3) wait for the access request sequence number R0 that client sends, receive after the access request sequence number R0 of client transmission, by its buffer memory and judge whether to store successfully, be to return to sequence number storage to client successfully to indicate, go to step (C4); Otherwise return to sequence number storage failure flags to client, go to step (C3);
(C4) wait for the user access request of client, receive after the user access request that client submits, extract the action type of file operation requests in user access request, and extract the access rights that in user access request, access control string comprises; Then judging the whether subset of access rights of this action type, is that user has the authority of access file, goes to step (C5); Otherwise return to denied access to client, go to step (C4);
(C5) judging whether current time exceedes the expired time point ET in user access request, is that to return to client-requested expired, goes to step (C4); Otherwise go to step (C6);
(C6) storage end generates an access request sequence number R1 of synchronizeing with client; Use access control string V, expired time point ET in global secret K and user access request to calculate checking bill TK ':
TK’=H(K,V,ET),
Use access request sequence number R1, calculate checking mark TG ':
TG’=H(TK’,R1,V);
Go to step (C7);
(C7) judge whether the access identities TG in checking mark TG ' and user access request equates, is to return to respective request desired data according to the file operation requests in user access request to user, goes to step (C4); Otherwise return to denied access to client, go to step (C4).
Fig. 5 is work flow sequential chart, and in figure, the longitudinal axis represents time sequencing from top to bottom.

Claims (1)

1. a safety certifying method for cloud storage system, comprises client process, certification end process and storage end process; Client is loaded the user ID of all login user, and access control storehouse is loaded in certification end; After startup, client, certification end, storage end connect respectively each other between two, between certification end and storage end, set up escape way;
It is characterized in that:
A. described client process, comprises the steps:
(A1) client generates an access request sequence number R0 at random, send to storage end, wait the return information of end to be stored, receive after the return information of storage end, judge that whether sequence number storage successfully indicates this information, is to go to step (A2); Otherwise go to step (A1);
(A2) wait for that user initiates file operation requests, receive after file operation requests, go to step (A3);
Wherein, file operation requests comprises user ID, file identification and action type, and action type comprises " reading ", " writing " and " deletion ";
(A3) submitting file operation requests to certification end, then judge whether certification end returns to user rs authentication result, is cache user the result, goes to step (A4); Otherwise forbid user's file operation requests, go to step (A2);
Wherein, user rs authentication result comprises access tickets TK, expired time point ET and access control string V;
(A4) judge whether current time exceedes the expired time point ET in user rs authentication result, is to delete this user rs authentication result, goes to step (A3); Otherwise generate an access request sequence number R1 of synchronizeing with storage end, user's the result, calculates access identities TG:
TG=H(TK,R1,V);
Wherein, H () represents the variable uses hash algorithm in bracket to calculate, and goes to step (A5);
(A5) by access identities TG, access character string V, expired time point ET and file operation requests composition user access request, send to storage end, then the information type that judgement storage end returns: desired data, return to request desired data to user, delete this user rs authentication result, go to step (A2); Ask expiredly, go to step (A4); Denied access, the file operation requests of forbidding user, deletes this user rs authentication result, goes to step (A2);
Wherein, storage end return information is divided into desired data, asks expired and denied access;
B. described certification end process comprises the steps:
(B1) certification end generates a global secret K at random, sends global secret K by escape way to storage end; Etc. the return information of end to be stored, receive the return information of storage end, judge whether global secret storage successfully indicates this information, is to carry out step (B2), goes to step (B4) simultaneously; Otherwise go to step (B1);
(B2), after stand-by period T, go to step (B3); T=0.01 second~1 year, by default;
(B3) generate at random a new global secret, then submit replacing key request by escape way to storage end, change key request and comprise new global secret; Judge whether key updating successfully indicates the information that storage end returns, and is to use new global secret to replace former global secret, then after stand-by period T, goes to step (B3); Otherwise go to step (B3);
(B4) file operation requests of wait client, receive after the file operation requests that client submits, whether the Access Control List (ACL) that the file identification in use file operation requests is searched corresponding document in access control storehouse exists, and is to go to step (B5); Otherwise return to denied access to client, go to step (B4);
(B5) whether the access control entry that uses user ID in file operation requests to search relative users in Access Control List (ACL) exists, and is to go to step (B6); Otherwise return to denied access to client, go to step (B4);
(B6) judging the whether subset of access rights in access control entry of action type in file operation requests, is that user has the authority of access file, goes to step (B7); Otherwise user does not have the authority of access file, returns to denied access to client, go to step (B4);
(B7) certification end is connected the access rights in user ID, file identification and access control entry as access control string V, chooses expired time point ET, calculates access tickets TK:
TK=H(K,V,ET);
By TK, ET and V composition user rs authentication result, return to client by escape way; Go to step (B4);
C. described storage end process comprises the steps:
(C1) wait for that certification end sends global secret K, receive the global secret K that certification end sends, buffer memory global secret K also judges whether to store successfully, is to return to global secret storage successfully to indicate to certification end, go to step (C2), go to step (C3) simultaneously; Otherwise return to global secret storage failure flags to certification end, go to step (C1);
(C2) wait for that certification end sends replacing key request, receive and change after key request, use the new global secret of changing in key request to replace former global secret; Judge whether global secret is updated successfully, and is to be updated successfully mark to certification end " return " key", goes to step (C2); Otherwise upgrade failure flags to certification end " return " key", go to step (C2);
(C3) wait for the access request sequence number R0 that client sends, receive after the access request sequence number R0 of client transmission, by its buffer memory and judge whether to store successfully, be to return to sequence number storage to client successfully to indicate, go to step (C4); Otherwise return to sequence number storage failure flags to client, go to step (C3);
(C4) wait for the user access request of client, receive after the user access request that client submits, extract the action type of file operation requests in user access request, and extract the access rights that in user access request, access control string comprises; Then judging the whether subset of access rights of this action type, is that user has the authority of access file, goes to step (C5); Otherwise return to denied access to client, go to step (C4);
(C5) judging whether current time exceedes the expired time point ET in user access request, is that to return to client-requested expired, goes to step (C4); Otherwise go to step (C6);
(C6) storage end generates an access request sequence number R1 of synchronizeing with client; Use access control string V, expired time point ET in global secret K and user access request to calculate checking bill TK':
TK’=H(K,V,ET),
Use access request sequence number R1, calculate checking mark TG ':
TG'=H(TK’,R1,V);
Go to step (C7);
(C7) judge whether the access identities TG in checking mark TG' and user access request equates, is to return to respective request desired data according to the file operation requests in user access request to user, goes to step (C4); Otherwise return to denied access to client, go to step (C4).
CN201110444484.5A 2011-12-23 2011-12-23 Safety authentication method of cloud storage system Active CN102571771B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110444484.5A CN102571771B (en) 2011-12-23 2011-12-23 Safety authentication method of cloud storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110444484.5A CN102571771B (en) 2011-12-23 2011-12-23 Safety authentication method of cloud storage system

Publications (2)

Publication Number Publication Date
CN102571771A CN102571771A (en) 2012-07-11
CN102571771B true CN102571771B (en) 2014-06-04

Family

ID=46416247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110444484.5A Active CN102571771B (en) 2011-12-23 2011-12-23 Safety authentication method of cloud storage system

Country Status (1)

Country Link
CN (1) CN102571771B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077337B (en) * 2013-01-09 2015-09-16 大唐移动通信设备有限公司 User right method of calibration and device
CN104216907B (en) * 2013-06-02 2018-12-18 上海诺基亚贝尔股份有限公司 It is a kind of for providing the method, apparatus and system of Access and control strategy of database
JP6175679B2 (en) * 2013-10-16 2017-08-09 株式会社 日立産業制御ソリューションズ Business management system
CN104092652B (en) * 2013-12-25 2017-08-01 腾讯数码(天津)有限公司 Data handling system and method
WO2015149309A1 (en) * 2014-04-02 2015-10-08 华为终端有限公司 Data processing method and terminal
CN104980401B (en) * 2014-04-09 2018-05-01 北京亿赛通科技发展有限责任公司 Nas server date safety storing system, secure storage and read method
US10223363B2 (en) * 2014-10-30 2019-03-05 Microsoft Technology Licensing, Llc Access control based on operation expiry data
CN104331346B (en) * 2014-11-21 2017-08-25 四川神琥科技有限公司 A kind of data guard method
CN105007279B (en) * 2015-08-04 2018-11-27 北京百度网讯科技有限公司 Authentication method and Verification System
CN106487856A (en) * 2015-09-01 2017-03-08 天脉聚源(北京)科技有限公司 A kind of method and system of network file storage
CN107332836B (en) * 2017-06-27 2021-04-23 张海洋 Data sharing method and device
CN108737377A (en) * 2018-04-17 2018-11-02 深圳市网心科技有限公司 Data guard method, server and computer readable storage medium
TWI698754B (en) * 2018-05-29 2020-07-11 普安科技股份有限公司 Method for managing the access authority to cloud storage and the system therefor
CN117371030A (en) * 2023-09-27 2024-01-09 上海嗨普智能信息科技股份有限公司 Multi-tenant limited access object storage method and management system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050246311A1 (en) * 2004-04-29 2005-11-03 Filenet Corporation Enterprise content management network-attached system
CN102263804A (en) * 2010-05-26 2011-11-30 中华电信股份有限公司 cloud storage system and method
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system
CN102281285A (en) * 2011-06-17 2011-12-14 程旭 Method and device for establishing safe and efficient Internet of Things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050246311A1 (en) * 2004-04-29 2005-11-03 Filenet Corporation Enterprise content management network-attached system
CN102263804A (en) * 2010-05-26 2011-11-30 中华电信股份有限公司 cloud storage system and method
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system
CN102281285A (en) * 2011-06-17 2011-12-14 程旭 Method and device for establishing safe and efficient Internet of Things

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《云存储技术及应用》;周可等;《中兴通讯技术》;20100830;第16卷(第4期);第24-27页 *
US2005、0246311A1 2005.11.03
周可等.《云存储技术及应用》.《中兴通讯技术》.2010,第16卷(第4期),第24-27页.

Also Published As

Publication number Publication date
CN102571771A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN102571771B (en) Safety authentication method of cloud storage system
CN109074433B (en) Method and system for verifying digital asset integrity using a distributed hash table and a peer-to-peer distributed ledger
CN101316273B (en) Distributed safety memory system
CN103078859B (en) Operation system right management method, equipment and system
US20180285839A1 (en) Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
CN104580395B (en) A kind of cloudy collaboration Storage Middleware Applying system based on existing cloud storage platform
CN102546664A (en) User and authority management method and system for distributed file system
CN103259663A (en) User unified authentication method in cloud computing environment
CN104468615A (en) Data sharing based file access and permission change control method
CN106789875A (en) A kind of block chain service unit, block chain service system and its communication means
CN111988338A (en) Permission-controllable Internet of things cloud platform based on block chain and data interaction method
US20190141048A1 (en) Blockchain identification system
US20180145983A1 (en) Distributed data storage system using a common manifest for storing and accessing versions of an object
US11580206B2 (en) Project-based permission system
CN102571380A (en) Multi-instance GIS platform unified user management method and system
CN112118269A (en) Identity authentication method, system, computing equipment and readable storage medium
CN113966597B (en) Resolving a dispersion identifier using multiple resolvers
CN108573308A (en) The automated construction method and system of soft project knowledge base based on big data
EP3915060A1 (en) Methods for self-aware, self-healing, and self-defending data
CN110149198A (en) A kind of autonomous system and method that safeguard protection and storage controllably are carried out to data
CN109284622B (en) Contact information processing method and device and storage medium
CN115022070A (en) Attribute-based block chain data access control method and system
CN109033882A (en) A kind of safe dissemination method of retrospective big data and system
CN111200638A (en) Distributed memory blockchain system
Wang et al. Distributed Electronic Data Storage and Proof System Based on Blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant