{"title":"A Cloud Storage Solution Based on State Secret Algorithm","authors":"Qianting Tu, Haibo Luo, Wenxing Chen, Zhenjia Li","doi":"10.1109/ISCEIC53685.2021.00029","DOIUrl":null,"url":null,"abstract":"While the Cloud is widely used, it is also facing threats. This paper introduces the status quo and development trend of Cloud security research and described separately from the aspects of data, user identity authentication, key storage and key distribution. Furthermore, a solution involving browsers, identity authentication, and key management is proposed. Finally, the SM4 and SM9 algorithms in the State Secret Algorithm are used to verify the feasibility of the scheme. The research of the thesis makes the use of the State Secret Algorithm in various application systems to be realized, which has certain reference significance.","PeriodicalId":342968,"journal":{"name":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCEIC53685.2021.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
While the Cloud is widely used, it is also facing threats. This paper introduces the status quo and development trend of Cloud security research and described separately from the aspects of data, user identity authentication, key storage and key distribution. Furthermore, a solution involving browsers, identity authentication, and key management is proposed. Finally, the SM4 and SM9 algorithms in the State Secret Algorithm are used to verify the feasibility of the scheme. The research of the thesis makes the use of the State Secret Algorithm in various application systems to be realized, which has certain reference significance.