CN103685162A - File storing and sharing method - Google Patents

File storing and sharing method Download PDF

Info

Publication number
CN103685162A
CN103685162A CN201210326062.2A CN201210326062A CN103685162A CN 103685162 A CN103685162 A CN 103685162A CN 201210326062 A CN201210326062 A CN 201210326062A CN 103685162 A CN103685162 A CN 103685162A
Authority
CN
China
Prior art keywords
file
key
ciphertext block
block data
storage server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210326062.2A
Other languages
Chinese (zh)
Inventor
王珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201210326062.2A priority Critical patent/CN103685162A/en
Publication of CN103685162A publication Critical patent/CN103685162A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a file storing and sharing method. The file storing method comprises the following steps: splitting a file into a plurality of data blocks by a client side; calculating the content of each data block respectively through a Hash algorithm, and taking the obtained Hash values as content secret keys to encrypt the data blocks respectively to obtain a plurality of ciphertext data blocks; uploading the ciphertext data blocks to a storage server; encrypting the position of each ciphertext data block in the storage server, the position of each ciphertext data block in a source file and the content secret keys respectively through a mapping secret key to generate mapping information, encrypting the mapping secret key through a public key of a file possessor to generate secret key information, and transmitting the mapping information, the secret key information, the filename and the identification of the file possessor together to a metadata server. According to the file storing method disclosed by the application, file storing safety can be improved; during file sharing, the file can be shared only by setting different re-encrypting secret keys for authorized users, and the secret keys are not needed to be updated frequently.

Description

File storage and share method
Technical field
The application relates to file storage and shares method.
Background technology
In order to improve Information Security and storage efficiency, can be to storing after file encryption and sharing, particularly, can client to file ask for cryptographic Hash make a summary and upload onto the server end judge whether file to be stored exists, if repeat, only return to the position of repeating data piece on server and the key of repeating data piece, if do not repeat, the file after encrypting is not uploaded, uploaded encryption key to server so that other are uncommitted but uploaded and repeated with this document and deleted user can understand afterwards simultaneously.
But, in such scheme, to different Authorized Groups, need constantly update key, server and manager thereof are had to higher credible requirement, key and content are likely revealed to server.
As the existing scheme of another kind, can to each piecemeal, use polymerization to encrypt in client to file block, ciphertext fragment is sent to server end and compare judgement, the position that abandons and notify existing fragment if repeat, the position of not repeating this fragment to be deposited is returned; According to corresponding piecemeal, after the positional alignment of original text, use mapping key encryption to be uploaded to metadata store server these piecemeal keys and memory location, after this mapping key being used to the public key encryption that is authorized to user, be stored on meta data server simultaneously, when reading, authorized user's request can obtain the mapping key after corresponding encryption, use own private key can solve mapping key, then solve piecemeal key, finally realize readable to piecemeal.
, whether according to this scheme, no matter repeat all needs to upload to make comparisons at every turn, the too large bandwidth waste and time-consuming that exists of transmission quantity; On meta data server, need to store the mapping key after more encryption, and it can increase according to authorized number of users.
Summary of the invention
In order to solve the problem existing in the storage of above-mentioned existing encrypt file and shared method, the application has proposed a kind of storage and shared method of file.
According to the application aspect, a kind of file memory method has been proposed.The method can comprise: client becomes a plurality of data blocks by file division; With the first hash algorithm, respectively the content of each data block is calculated, the cryptographic Hash that obtains of usining is encrypted data block respectively as the content key of each data block, obtains a plurality of ciphertext block datas; Each ciphertext block data is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server; With mapping key, to each ciphertext block data, the position of the position in storage server/in original and content key encryption generate map information respectively, with the possessory PKI of file, described mapping key is encrypted and generated key information, and map information is sent to meta data server with key information together with filename and file owner sign.
According to another aspect of the application, a kind of file sharing method has been proposed, wherein, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and described mapping key is encrypted to the key information generating with the possessory PKI of file.This document is shared method and can be comprised: the file owner generates authorized user list and each authorized user's re-encrypted private key and is sent to meta data server; Meta data server determines that according to list of authorized users whether request shared file user is authorized user, if so, carries out re-encryption with described request shared file user's re-encrypted private key to described key information; Meta data server sends to described request shared file user by described map information with through the key information of re-encryption; Described request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
By the application's file memory method, can improve the fail safe of file storage, and when carrying out file-sharing, only need different re-encrypted private key be set to each authorized user and just can realize the shared of file, without frequent new key more.
Accompanying drawing explanation
Fig. 1 is according to the flow chart of the file memory method of an embodiment of the application; And
Fig. 2 is according to the flow chart of the file sharing method of an embodiment of the application.
Embodiment
With reference to the accompanying drawings, the application's embodiment is elaborated.
As shown in Figure 1, according to the file memory method of an embodiment of the application, can carry out as follows.
Client upper layer application is initiated, after file write operation, by client, this document to be divided into a plurality of data blocks (step S1002).Be appreciated that cut apart a plurality of data blocks are the data blocks that do not overlap each other, and can adopt arbitrary partitioning algorithm to carry out cutting operation.
Client is calculated cutting apart the content of each data block obtaining respectively with hash algorithm, for each data block obtains cryptographic Hash, as the content key of each data block.For each in a plurality of data blocks, client is encrypted operation with the content key of data block to this data block, thereby obtains a plurality of ciphertext block datas (step S1004) identical with a plurality of data block quantity that are split to form.Therefore, content key is other key of block level, and its object is to guarantee the safety of a data block.
Be appreciated that because the key that a data block is encrypted is that the content of this data block is carried out to the cryptographic Hash that hash algorithm obtains, therefore, identical data block can be become identical ciphertext by identical content key encryption.
Next at step S1006, by client, each in a plurality of ciphertext block datas is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server.
Then, client generates map information and key information, and map information is sent to meta data server (step S1008) with key information together with filename and file owner sign.Particularly, with mapping key, to each ciphertext block data, the position in storage server, the position in original and content key encryption generate map information to client respectively, with the possessory PKI of file, mapping secret key encryption are generated to key information.According to the present embodiment, the map information, key information and the filename that are uploaded to meta data server have formed the metadata of file together with file owner sign.
According to the present embodiment, the key that mapping key is file-level, for guaranteeing the safety of a file, and in order further to guarantee the fail safe of mapping key, adopts the file owner's (being file uploader) PKI to encrypt it.
According to an exemplary, after obtaining ciphertext block data, client can be calculated each ciphertext block data by hash algorithm, usings the cryptographic Hash that the obtains identifier as each ciphertext block data.
In the present embodiment, the hash algorithm that obtains identifier and the hash algorithm that obtains content key can be different hash algorithms, can be also identical hash algorithms.
By hash algorithm, obtaining in the embodiment of encrypt data block identifier, with mapping key, to each ciphertext block data, the content key of the position in storage server and the position in original and this ciphertext block data and identifier are encrypted and generate map information client respectively.
In this case, the step that ciphertext block data is uploaded to storage server can be not the ciphertext block data of directly uploading each acquisition, but the identifier of the ciphertext block data that first will be uploaded by client is sent to storage server.
First storage server can pass through received identifier and determine whether ciphertext block data to be uploaded had previously been stored, if store, by identifier and the position of having stored data block return to client, like this, client just needn't be uploaded the ciphertext block data of having stored again, can either save communication overhead, can save again the storage overhead of storage server, thereby raise the efficiency.
On the other hand, if storage server determines that by identifier ciphertext block data to be uploaded is not stored, the information that comprises position to be stored and described identifier can be returned to client, now, client is uploaded to storage server by ciphertext block data corresponding to described identifier, is stored to the position to be stored that storage server distributes.
According to an embodiment, client is uploaded to ciphertext block data corresponding to identifier after storage server, storage server is before carrying out storage operation, can first according to the ciphertext block data and the identifier that receive, carry out consistency checking, after being verified, again described ciphertext block data is stored to described position to be stored, to prevent goal conflict attack, guarantees integrality and the consistency of data.
Be appreciated that, according in the file memory method of the application's embodiment, data block is encrypted to the algorithm that forms the algorithm of ciphertext block data and encrypt with formation map information and is symmetric encipherment algorithm, that is, content key and mapping key are symmetric key.
Next with reference to Fig. 2, describe according to the file sharing method of the application's embodiment.
According to method shown in Fig. 1, file is being stored to storage server, metadata store to meta data server, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, wherein, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and described mapping key is encrypted to the key information generating with the possessory PKI of file.
As shown in Figure 2, when carrying out file-sharing operation, need be generated by the file owner authorized user list and each authorized user's re-encrypted private key, and be sent to meta data server (step S2002).Therefore meta data server preserves the authorized user database of each file, comprising the re-encrypted private key of list of authorized users and each authorized user.
The re-encrypted private key that is appreciated that authorized user can be by generating under client's end line, generate at every turn re-encrypted private key can before first judge whether to have had this key, if having, do not need regeneration, to save computing cost.
When having user to ask shared file, meta data server can determine whether request shared file user is authorized user according to list of authorized users, if so, with described request shared file user's re-encrypted private key, the key information in file metadata is carried out to re-encryption (step S2004).If request shared file user is not authorized user, forbid sharing operation.
Next at step S2006, meta data server sends to request shared file user by the map information in file metadata with through the key information of re-encryption.
After receiving the information that meta data server sends, at step S2008, request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
According to a specific embodiments, the file metadata being stored in meta data server can comprise with mapping key the map information that the decruption key of the position in storage server and the position in original and this ciphertext block data and identifier encryption generate to each ciphertext block data respectively.
In the present embodiment, request shared file user's client is after having obtained the information of meta data server transmission, key information that can the re-encryption of private key solution crammed obtains mapping key, with mapping key, map information is decrypted, obtain the position of each ciphertext block data in storage server and decruption key and the identifier of the position in original and this ciphertext block data, a plurality of ciphertext block datas of storing in position acquisition storage server by each ciphertext block data in storage server, identifier by each ciphertext block data carries out consistency checking to ciphertext block data, by the decruption key of ciphertext block data and the shared file of position acquisition request in original.
File is after duplicate removal stores processor, original file is broken up as ciphertext block data independently mutually, relevant ciphertext block data to be reassembled as to complete file, just need position, encrypt data block identifier, the decruption key of ciphertext block data, the ciphertext block data position in original of ciphertext block data in storage server.After obtaining these information, just can to storage server, data block read requests be proposed in the position in storage server according to data block, obtain after ciphertext block data and identifier, the consistency of checking ciphertext block data and identifier, use corresponding decruption key deciphering to draw block of plaintext data, last according to data block, thereby the position integral data piece in original reverts to readable original, and so far client completes and reads.
By the application's file memory method, can improve the fail safe of file storage, and when carrying out file-sharing, only need different re-encrypted private key be set to each authorized user and just can realize the shared of file, without frequent new key more.
According to experiment showed, that the extra metadata information scale that this programme is introduced can be along with not sharing increasing of quantity of documents, the advantage aspect space hold is obvious; Before upload file, first with identifier, judge repetition, if repeat, notify client not need to upload corresponding sub-block, reduced internodal data volume; Can resist goal conflict attacks.
With reference to accompanying drawing, the application's exemplary embodiment is described above.The example that it should be appreciated by those skilled in the art that above-mentioned embodiment to be only used to the object of explanation and lift, rather than be used for limiting.Any modification of doing under all instructions in the application and claim protection range, be equal to replacement etc., all should be included in the claimed scope of the application.

Claims (9)

1. file memory method, comprising:
Client becomes a plurality of data blocks by file division;
With the first hash algorithm, respectively the content of each data block is calculated, the cryptographic Hash that obtains of usining is encrypted described a plurality of data blocks respectively as the content key of each data block, obtains a plurality of ciphertext block datas;
Each ciphertext block data is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server; And
With mapping key, to each ciphertext block data, the position in storage server, the position in original and content key encryption generate map information respectively, with the possessory PKI of file, described mapping key is encrypted and generated key information, and map information is sent to meta data server with key information together with filename and file owner sign.
2. the method for claim 1, further comprises: client is calculated each ciphertext block data with the second hash algorithm, usings the cryptographic Hash that obtains as the identifier of each ciphertext block data,
Wherein, with mapping key, to each ciphertext block data, the content key of the position in storage server and the position in original and this ciphertext block data and identifier are encrypted and generate map information client respectively.
3. method as claimed in claim 2, wherein, described the first hash algorithm and described the second hash algorithm are identical algorithm or different algorithms.
4. method as claimed in claim 2, wherein, the step of client upload ciphertext block data further comprises:
Client is sent to storage server by the identifier of this ciphertext block data;
If storage server determines that by described identifier ciphertext block data to be uploaded stores, described identifier and the position of having stored data block are returned to client; And
If storage server determines that by described identifier ciphertext block data to be uploaded do not store, the information that comprises position to be stored and described identifier is returned to client, by client, ciphertext block data corresponding to described identifier is uploaded to storage server.
5. method as claimed in claim 3, wherein, client is uploaded to ciphertext block data corresponding to described identifier after storage server, storage server carries out consistency checking according to the ciphertext block data and the described identifier that receive, after being verified, described ciphertext block data is stored to described position to be stored.
6. the method as described in any one in claim 2 to 5, wherein, described content key and described mapping key are symmetric keys.
7. file sharing method, wherein, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and with the possessory PKI of file, described mapping key is encrypted the key information generating, described method comprises:
The file owner generates authorized user list and each authorized user's re-encrypted private key and is sent to meta data server;
Meta data server determines that according to list of authorized users whether request shared file user is authorized user, if so, carries out re-encryption with described request shared file user's re-encrypted private key to described key information;
Meta data server sends to described request shared file user by described map information with through the key information of re-encryption; And
Described request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
8. method as claimed in claim 7, wherein, file metadata comprises with mapping key the map information that the decruption key of the position in storage server and the position in original and this ciphertext block data and identifier encryption generate to each ciphertext block data respectively.
9. method as claimed in claim 8, wherein, described request shared file user's client is obtained the position of each ciphertext block data in storage server and decruption key and the identifier of the position in original and this ciphertext block data to described map information deciphering, a plurality of ciphertext block datas of storing in position acquisition storage server by each ciphertext block data in storage server, identifier by each ciphertext block data carries out consistency checking to ciphertext block data, by the decruption key of ciphertext block data and the shared file of position acquisition request in original.
CN201210326062.2A 2012-09-05 2012-09-05 File storing and sharing method Pending CN103685162A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210326062.2A CN103685162A (en) 2012-09-05 2012-09-05 File storing and sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210326062.2A CN103685162A (en) 2012-09-05 2012-09-05 File storing and sharing method

Publications (1)

Publication Number Publication Date
CN103685162A true CN103685162A (en) 2014-03-26

Family

ID=50321495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210326062.2A Pending CN103685162A (en) 2012-09-05 2012-09-05 File storing and sharing method

Country Status (1)

Country Link
CN (1) CN103685162A (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530284A (en) * 2014-10-21 2016-04-27 三星Sds株式会社 Method for synchronizing file
CN105631347A (en) * 2014-10-27 2016-06-01 鸿富锦精密工业(深圳)有限公司 File storage method and client device
CN106059762A (en) * 2016-07-26 2016-10-26 江苏国泰新点软件有限公司 Data security processing method and apparatus
CN107085688A (en) * 2016-02-16 2017-08-22 中国移动通信集团湖北有限公司 File authorizing method and mobile terminal
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN107612763A (en) * 2017-11-08 2018-01-19 山东浪潮通软信息科技有限公司 Metadata management method, application server, operation system, medium and controller
WO2018029464A1 (en) 2016-08-08 2018-02-15 Record Sure Limited A method of generating a secure record of a conversation
CN108390759A (en) * 2018-03-21 2018-08-10 平安普惠企业管理有限公司 Code encryption, decryption method, device, computer equipment and storage medium
CN109074394A (en) * 2016-05-05 2018-12-21 万事达卡国际股份有限公司 Method and system for the Distributed Storage with permanent completeness guarantee
CN109241757A (en) * 2018-08-22 2019-01-18 石数字技术成都有限公司 A kind of file browsing method based on recognition of face
WO2019019853A1 (en) * 2017-07-27 2019-01-31 华为技术有限公司 Data processing method, terminal device, and network device
CN109324998A (en) * 2018-09-18 2019-02-12 郑州云海信息技术有限公司 A kind of document handling method, apparatus and system
CN109471844A (en) * 2018-10-10 2019-03-15 深圳市达仁基因科技有限公司 File sharing method, device, computer equipment and storage medium
CN109525388A (en) * 2017-09-19 2019-03-26 中兴通讯股份有限公司 A kind of combined ciphering method and system of cipher key separation
CN109587132A (en) * 2018-11-29 2019-04-05 苏宁易购集团股份有限公司 A kind of data transferring method and device based on alliance's chain
CN109889324A (en) * 2018-12-27 2019-06-14 深圳市安云信息科技有限公司 Encrypt storage method, storage medium and device
CN109995821A (en) * 2017-12-29 2019-07-09 中移(苏州)软件技术有限公司 Method and system, the client, server, object storage system of file upload
CN109992563A (en) * 2019-01-18 2019-07-09 阿里巴巴集团控股有限公司 A kind of service scripts storage method and device based on block chain
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
CN110197722A (en) * 2019-05-31 2019-09-03 贵州精准健康数据有限公司 AI-CPU system platform
CN110430192A (en) * 2019-08-06 2019-11-08 北京握奇数据股份有限公司 A kind of method of file encryption-decryption, system, controller and storage medium
CN110602146A (en) * 2019-09-30 2019-12-20 北京大米科技有限公司 Data encryption and decryption method, readable storage medium and electronic equipment
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111209585A (en) * 2020-02-11 2020-05-29 广州电力交易中心有限责任公司 Data processing method and system based on electric power transaction
CN111314287A (en) * 2019-12-20 2020-06-19 淮北师范大学 Public key encryption communication mode and device
US10783277B2 (en) 2019-05-31 2020-09-22 Alibaba Group Holding Limited Blockchain-type data storage
CN111739190A (en) * 2020-05-27 2020-10-02 深圳市元征科技股份有限公司 Vehicle diagnostic file encryption method, device, equipment and storage medium
CN111931219A (en) * 2020-09-22 2020-11-13 支付宝(杭州)信息技术有限公司 Data storage method and device and data query method and device
WO2020238248A1 (en) * 2019-05-31 2020-12-03 创新先进技术有限公司 Data storage method, apparatus and device
CN112182600A (en) * 2020-09-18 2021-01-05 北京云钥网络科技有限公司 Data encryption method, data decryption method and electronic equipment
CN112868011A (en) * 2018-10-09 2021-05-28 Emc Ip控股有限公司 Multi-cloud transactional storage for availability and security
CN113127895A (en) * 2021-03-17 2021-07-16 嘉兴职业技术学院 Cloud data protection method based on distributed storage
CN113196702A (en) * 2018-11-16 2021-07-30 先进信息技术公司 System and method for distributed data storage and transfer using blockchains
CN113273163A (en) * 2020-05-26 2021-08-17 深圳元戎启行科技有限公司 File uploading method, file downloading method and file management device
CN113449314A (en) * 2020-03-25 2021-09-28 北京京东振世信息技术有限公司 Data processing method and device
CN113553611A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 File encryption storage method and system, user terminal, cloud platform and storage medium
CN113572614A (en) * 2020-04-28 2021-10-29 万维数码智能有限公司 Security method and system for data transmission
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption
WO2021253850A1 (en) * 2020-06-14 2021-12-23 苏州浪潮智能科技有限公司 Data security realization method and system based on k-db database
CN114143098A (en) * 2021-12-03 2022-03-04 建信金融科技有限责任公司 Data storage method and data storage device
CN114448999A (en) * 2021-12-21 2022-05-06 杭州华橙软件技术有限公司 Data storage method, device, system, electronic device and storage medium
CN114726643A (en) * 2022-04-27 2022-07-08 中国银行股份有限公司 Data storage and access method and device on cloud platform
CN115842833A (en) * 2022-11-24 2023-03-24 国家电投集团重庆狮子滩发电有限公司 Processing method, device and system for super-fusion virtual storage
CN115933993A (en) * 2023-01-04 2023-04-07 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) System and method for evaluating antifouling function of karst fracture network type aqueous medium
CN117010003A (en) * 2023-10-07 2023-11-07 北京国电通网络技术有限公司 File decryption method based on file fragmentation and hash storage and electronic equipment

Cited By (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530284A (en) * 2014-10-21 2016-04-27 三星Sds株式会社 Method for synchronizing file
CN105530284B (en) * 2014-10-21 2020-10-02 三星Sds株式会社 File synchronization method
CN105631347A (en) * 2014-10-27 2016-06-01 鸿富锦精密工业(深圳)有限公司 File storage method and client device
CN105631347B (en) * 2014-10-27 2018-11-09 鸿富锦精密工业(深圳)有限公司 File access method and client terminal device
CN107085688A (en) * 2016-02-16 2017-08-22 中国移动通信集团湖北有限公司 File authorizing method and mobile terminal
CN109074394B (en) * 2016-05-05 2022-10-11 万事达卡国际股份有限公司 Method and system for distributed data storage with permanent integrity assurance
CN109074394A (en) * 2016-05-05 2018-12-21 万事达卡国际股份有限公司 Method and system for the Distributed Storage with permanent completeness guarantee
CN106059762A (en) * 2016-07-26 2016-10-26 江苏国泰新点软件有限公司 Data security processing method and apparatus
CN106059762B (en) * 2016-07-26 2019-05-14 江苏国泰新点软件有限公司 Data safety processing method and device
WO2018029464A1 (en) 2016-08-08 2018-02-15 Record Sure Limited A method of generating a secure record of a conversation
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN107204986B (en) * 2017-06-27 2019-10-18 四川捷云信通信息技术有限公司 Cloud stores encryption method, decryption method and cloud and stores encryption device
WO2019019853A1 (en) * 2017-07-27 2019-01-31 华为技术有限公司 Data processing method, terminal device, and network device
CN109309650A (en) * 2017-07-27 2019-02-05 华为技术有限公司 Handle method, terminal device and the network equipment of data
CN109525388A (en) * 2017-09-19 2019-03-26 中兴通讯股份有限公司 A kind of combined ciphering method and system of cipher key separation
CN107612763A (en) * 2017-11-08 2018-01-19 山东浪潮通软信息科技有限公司 Metadata management method, application server, operation system, medium and controller
CN107612763B (en) * 2017-11-08 2020-10-02 浪潮通用软件有限公司 Metadata management method, application server, service system, medium and controller
CN109995821A (en) * 2017-12-29 2019-07-09 中移(苏州)软件技术有限公司 Method and system, the client, server, object storage system of file upload
CN108390759A (en) * 2018-03-21 2018-08-10 平安普惠企业管理有限公司 Code encryption, decryption method, device, computer equipment and storage medium
CN109241757A (en) * 2018-08-22 2019-01-18 石数字技术成都有限公司 A kind of file browsing method based on recognition of face
CN109324998A (en) * 2018-09-18 2019-02-12 郑州云海信息技术有限公司 A kind of document handling method, apparatus and system
CN112868011B (en) * 2018-10-09 2023-05-02 Emc Ip控股有限公司 Multi-cloud transactional storage for availability and security
CN112868011A (en) * 2018-10-09 2021-05-28 Emc Ip控股有限公司 Multi-cloud transactional storage for availability and security
US11385958B2 (en) 2018-10-09 2022-07-12 EMC IP Holding Company LLC Multi cloud transactional storage for availability and security
CN109471844B (en) * 2018-10-10 2022-02-18 深圳市达仁基因科技有限公司 File sharing method and device, computer equipment and storage medium
CN109471844A (en) * 2018-10-10 2019-03-15 深圳市达仁基因科技有限公司 File sharing method, device, computer equipment and storage medium
CN113196702A (en) * 2018-11-16 2021-07-30 先进信息技术公司 System and method for distributed data storage and transfer using blockchains
CN109587132A (en) * 2018-11-29 2019-04-05 苏宁易购集团股份有限公司 A kind of data transferring method and device based on alliance's chain
CN109587132B (en) * 2018-11-29 2021-03-26 南京苏宁软件技术有限公司 Data transmission method and device based on alliance chain
CN109889324A (en) * 2018-12-27 2019-06-14 深圳市安云信息科技有限公司 Encrypt storage method, storage medium and device
CN109992563A (en) * 2019-01-18 2019-07-09 阿里巴巴集团控股有限公司 A kind of service scripts storage method and device based on block chain
CN110138749B (en) * 2019-04-23 2021-12-21 华为技术有限公司 Data security protection method and related equipment
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
WO2020238248A1 (en) * 2019-05-31 2020-12-03 创新先进技术有限公司 Data storage method, apparatus and device
CN110197722A (en) * 2019-05-31 2019-09-03 贵州精准健康数据有限公司 AI-CPU system platform
US10783277B2 (en) 2019-05-31 2020-09-22 Alibaba Group Holding Limited Blockchain-type data storage
CN110430192A (en) * 2019-08-06 2019-11-08 北京握奇数据股份有限公司 A kind of method of file encryption-decryption, system, controller and storage medium
CN110602146A (en) * 2019-09-30 2019-12-20 北京大米科技有限公司 Data encryption and decryption method, readable storage medium and electronic equipment
CN111314287A (en) * 2019-12-20 2020-06-19 淮北师范大学 Public key encryption communication mode and device
CN111143870B (en) * 2019-12-30 2022-05-13 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111209585B (en) * 2020-02-11 2020-12-18 广州电力交易中心有限责任公司 Data processing method and system based on electric power transaction
CN111209585A (en) * 2020-02-11 2020-05-29 广州电力交易中心有限责任公司 Data processing method and system based on electric power transaction
CN113449314B (en) * 2020-03-25 2023-11-03 北京京东振世信息技术有限公司 Data processing method and device
CN113449314A (en) * 2020-03-25 2021-09-28 北京京东振世信息技术有限公司 Data processing method and device
CN113553611A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 File encryption storage method and system, user terminal, cloud platform and storage medium
CN113572614A (en) * 2020-04-28 2021-10-29 万维数码智能有限公司 Security method and system for data transmission
CN113572614B (en) * 2020-04-28 2023-07-14 万维数码智能有限公司 Security method and system for data transmission
CN113273163A (en) * 2020-05-26 2021-08-17 深圳元戎启行科技有限公司 File uploading method, file downloading method and file management device
WO2021237467A1 (en) * 2020-05-26 2021-12-02 深圳元戎启行科技有限公司 File uploading method, file downloading method and file management apparatus
CN111739190A (en) * 2020-05-27 2020-10-02 深圳市元征科技股份有限公司 Vehicle diagnostic file encryption method, device, equipment and storage medium
CN111739190B (en) * 2020-05-27 2022-09-20 深圳市元征科技股份有限公司 Vehicle diagnostic file encryption method, device, equipment and storage medium
WO2021253850A1 (en) * 2020-06-14 2021-12-23 苏州浪潮智能科技有限公司 Data security realization method and system based on k-db database
CN112182600A (en) * 2020-09-18 2021-01-05 北京云钥网络科技有限公司 Data encryption method, data decryption method and electronic equipment
CN111931219B (en) * 2020-09-22 2021-04-23 支付宝(杭州)信息技术有限公司 Data storage method and device and data query method and device
CN111931219A (en) * 2020-09-22 2020-11-13 支付宝(杭州)信息技术有限公司 Data storage method and device and data query method and device
CN113127895A (en) * 2021-03-17 2021-07-16 嘉兴职业技术学院 Cloud data protection method based on distributed storage
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption
CN114143098B (en) * 2021-12-03 2023-08-15 建信金融科技有限责任公司 Data storage method and data storage device
CN114143098A (en) * 2021-12-03 2022-03-04 建信金融科技有限责任公司 Data storage method and data storage device
CN114448999A (en) * 2021-12-21 2022-05-06 杭州华橙软件技术有限公司 Data storage method, device, system, electronic device and storage medium
CN114726643A (en) * 2022-04-27 2022-07-08 中国银行股份有限公司 Data storage and access method and device on cloud platform
CN114726643B (en) * 2022-04-27 2024-04-16 中国银行股份有限公司 Data storage and access methods and devices on cloud platform
CN115842833A (en) * 2022-11-24 2023-03-24 国家电投集团重庆狮子滩发电有限公司 Processing method, device and system for super-fusion virtual storage
CN115842833B (en) * 2022-11-24 2023-12-15 国家电投集团重庆狮子滩发电有限公司 Processing method, device and system for super-fusion virtual storage
CN115933993A (en) * 2023-01-04 2023-04-07 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) System and method for evaluating antifouling function of karst fracture network type aqueous medium
CN115933993B (en) * 2023-01-04 2023-05-30 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) Karst fracture network type aqueous medium antifouling function evaluation system and method
CN117010003A (en) * 2023-10-07 2023-11-07 北京国电通网络技术有限公司 File decryption method based on file fragmentation and hash storage and electronic equipment

Similar Documents

Publication Publication Date Title
CN103685162A (en) File storing and sharing method
CN109995505B (en) Data security duplicate removal system and method in fog computing environment and cloud storage platform
CN106254324B (en) A kind of encryption method and device of storage file
CN110213042A (en) A kind of cloud data duplicate removal method based on no certification agency re-encryption
KR101285281B1 (en) Security system and its security method for self-organization storage
CN108881195A (en) Data safety sharing method and device based on cloud environment
US10685141B2 (en) Method for storing data blocks from client devices to a cloud storage system
CN113346998B (en) Key updating and file sharing method, device, equipment and computer storage medium
CN103414682A (en) Method for cloud storage of data and system
CN103763362A (en) Safe distributed duplicated data deletion method
Yan et al. A scheme to manage encrypted data storage with deduplication in cloud
CN1910532A (en) Backup and restoration of DRM security data
Akhila et al. A study on deduplication techniques over encrypted data
CN102693398A (en) Data encryption method and system
US11595188B2 (en) Method for storing a data file
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN108632385A (en) Multiway tree data directory structure cloud storage method for secret protection based on time series
Ma et al. CP-ABE-based secure and verifiable data deletion in cloud
CN112685753A (en) Method and equipment for storing encrypted data
CN109787747B (en) Anti-quantum-computation multi-encryption cloud storage method and system based on multiple asymmetric key pools
CN104794243B (en) Third party's cipher text retrieval method based on filename
Li et al. A data assured deletion scheme in cloud storage
CN108494552B (en) Cloud storage data deduplication method supporting efficient convergence key management
CN113824713B (en) Key generation method, system and storage medium
KR101790757B1 (en) Cloud system for storing secure data and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326

RJ01 Rejection of invention patent application after publication