CN103685162A - File storing and sharing method - Google Patents
File storing and sharing method Download PDFInfo
- Publication number
- CN103685162A CN103685162A CN201210326062.2A CN201210326062A CN103685162A CN 103685162 A CN103685162 A CN 103685162A CN 201210326062 A CN201210326062 A CN 201210326062A CN 103685162 A CN103685162 A CN 103685162A
- Authority
- CN
- China
- Prior art keywords
- file
- key
- ciphertext block
- block data
- storage server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application discloses a file storing and sharing method. The file storing method comprises the following steps: splitting a file into a plurality of data blocks by a client side; calculating the content of each data block respectively through a Hash algorithm, and taking the obtained Hash values as content secret keys to encrypt the data blocks respectively to obtain a plurality of ciphertext data blocks; uploading the ciphertext data blocks to a storage server; encrypting the position of each ciphertext data block in the storage server, the position of each ciphertext data block in a source file and the content secret keys respectively through a mapping secret key to generate mapping information, encrypting the mapping secret key through a public key of a file possessor to generate secret key information, and transmitting the mapping information, the secret key information, the filename and the identification of the file possessor together to a metadata server. According to the file storing method disclosed by the application, file storing safety can be improved; during file sharing, the file can be shared only by setting different re-encrypting secret keys for authorized users, and the secret keys are not needed to be updated frequently.
Description
Technical field
The application relates to file storage and shares method.
Background technology
In order to improve Information Security and storage efficiency, can be to storing after file encryption and sharing, particularly, can client to file ask for cryptographic Hash make a summary and upload onto the server end judge whether file to be stored exists, if repeat, only return to the position of repeating data piece on server and the key of repeating data piece, if do not repeat, the file after encrypting is not uploaded, uploaded encryption key to server so that other are uncommitted but uploaded and repeated with this document and deleted user can understand afterwards simultaneously.
But, in such scheme, to different Authorized Groups, need constantly update key, server and manager thereof are had to higher credible requirement, key and content are likely revealed to server.
As the existing scheme of another kind, can to each piecemeal, use polymerization to encrypt in client to file block, ciphertext fragment is sent to server end and compare judgement, the position that abandons and notify existing fragment if repeat, the position of not repeating this fragment to be deposited is returned; According to corresponding piecemeal, after the positional alignment of original text, use mapping key encryption to be uploaded to metadata store server these piecemeal keys and memory location, after this mapping key being used to the public key encryption that is authorized to user, be stored on meta data server simultaneously, when reading, authorized user's request can obtain the mapping key after corresponding encryption, use own private key can solve mapping key, then solve piecemeal key, finally realize readable to piecemeal.
, whether according to this scheme, no matter repeat all needs to upload to make comparisons at every turn, the too large bandwidth waste and time-consuming that exists of transmission quantity; On meta data server, need to store the mapping key after more encryption, and it can increase according to authorized number of users.
Summary of the invention
In order to solve the problem existing in the storage of above-mentioned existing encrypt file and shared method, the application has proposed a kind of storage and shared method of file.
According to the application aspect, a kind of file memory method has been proposed.The method can comprise: client becomes a plurality of data blocks by file division; With the first hash algorithm, respectively the content of each data block is calculated, the cryptographic Hash that obtains of usining is encrypted data block respectively as the content key of each data block, obtains a plurality of ciphertext block datas; Each ciphertext block data is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server; With mapping key, to each ciphertext block data, the position of the position in storage server/in original and content key encryption generate map information respectively, with the possessory PKI of file, described mapping key is encrypted and generated key information, and map information is sent to meta data server with key information together with filename and file owner sign.
According to another aspect of the application, a kind of file sharing method has been proposed, wherein, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and described mapping key is encrypted to the key information generating with the possessory PKI of file.This document is shared method and can be comprised: the file owner generates authorized user list and each authorized user's re-encrypted private key and is sent to meta data server; Meta data server determines that according to list of authorized users whether request shared file user is authorized user, if so, carries out re-encryption with described request shared file user's re-encrypted private key to described key information; Meta data server sends to described request shared file user by described map information with through the key information of re-encryption; Described request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
By the application's file memory method, can improve the fail safe of file storage, and when carrying out file-sharing, only need different re-encrypted private key be set to each authorized user and just can realize the shared of file, without frequent new key more.
Accompanying drawing explanation
Fig. 1 is according to the flow chart of the file memory method of an embodiment of the application; And
Fig. 2 is according to the flow chart of the file sharing method of an embodiment of the application.
Embodiment
With reference to the accompanying drawings, the application's embodiment is elaborated.
As shown in Figure 1, according to the file memory method of an embodiment of the application, can carry out as follows.
Client upper layer application is initiated, after file write operation, by client, this document to be divided into a plurality of data blocks (step S1002).Be appreciated that cut apart a plurality of data blocks are the data blocks that do not overlap each other, and can adopt arbitrary partitioning algorithm to carry out cutting operation.
Client is calculated cutting apart the content of each data block obtaining respectively with hash algorithm, for each data block obtains cryptographic Hash, as the content key of each data block.For each in a plurality of data blocks, client is encrypted operation with the content key of data block to this data block, thereby obtains a plurality of ciphertext block datas (step S1004) identical with a plurality of data block quantity that are split to form.Therefore, content key is other key of block level, and its object is to guarantee the safety of a data block.
Be appreciated that because the key that a data block is encrypted is that the content of this data block is carried out to the cryptographic Hash that hash algorithm obtains, therefore, identical data block can be become identical ciphertext by identical content key encryption.
Next at step S1006, by client, each in a plurality of ciphertext block datas is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server.
Then, client generates map information and key information, and map information is sent to meta data server (step S1008) with key information together with filename and file owner sign.Particularly, with mapping key, to each ciphertext block data, the position in storage server, the position in original and content key encryption generate map information to client respectively, with the possessory PKI of file, mapping secret key encryption are generated to key information.According to the present embodiment, the map information, key information and the filename that are uploaded to meta data server have formed the metadata of file together with file owner sign.
According to the present embodiment, the key that mapping key is file-level, for guaranteeing the safety of a file, and in order further to guarantee the fail safe of mapping key, adopts the file owner's (being file uploader) PKI to encrypt it.
According to an exemplary, after obtaining ciphertext block data, client can be calculated each ciphertext block data by hash algorithm, usings the cryptographic Hash that the obtains identifier as each ciphertext block data.
In the present embodiment, the hash algorithm that obtains identifier and the hash algorithm that obtains content key can be different hash algorithms, can be also identical hash algorithms.
By hash algorithm, obtaining in the embodiment of encrypt data block identifier, with mapping key, to each ciphertext block data, the content key of the position in storage server and the position in original and this ciphertext block data and identifier are encrypted and generate map information client respectively.
In this case, the step that ciphertext block data is uploaded to storage server can be not the ciphertext block data of directly uploading each acquisition, but the identifier of the ciphertext block data that first will be uploaded by client is sent to storage server.
First storage server can pass through received identifier and determine whether ciphertext block data to be uploaded had previously been stored, if store, by identifier and the position of having stored data block return to client, like this, client just needn't be uploaded the ciphertext block data of having stored again, can either save communication overhead, can save again the storage overhead of storage server, thereby raise the efficiency.
On the other hand, if storage server determines that by identifier ciphertext block data to be uploaded is not stored, the information that comprises position to be stored and described identifier can be returned to client, now, client is uploaded to storage server by ciphertext block data corresponding to described identifier, is stored to the position to be stored that storage server distributes.
According to an embodiment, client is uploaded to ciphertext block data corresponding to identifier after storage server, storage server is before carrying out storage operation, can first according to the ciphertext block data and the identifier that receive, carry out consistency checking, after being verified, again described ciphertext block data is stored to described position to be stored, to prevent goal conflict attack, guarantees integrality and the consistency of data.
Be appreciated that, according in the file memory method of the application's embodiment, data block is encrypted to the algorithm that forms the algorithm of ciphertext block data and encrypt with formation map information and is symmetric encipherment algorithm, that is, content key and mapping key are symmetric key.
Next with reference to Fig. 2, describe according to the file sharing method of the application's embodiment.
According to method shown in Fig. 1, file is being stored to storage server, metadata store to meta data server, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, wherein, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and described mapping key is encrypted to the key information generating with the possessory PKI of file.
As shown in Figure 2, when carrying out file-sharing operation, need be generated by the file owner authorized user list and each authorized user's re-encrypted private key, and be sent to meta data server (step S2002).Therefore meta data server preserves the authorized user database of each file, comprising the re-encrypted private key of list of authorized users and each authorized user.
The re-encrypted private key that is appreciated that authorized user can be by generating under client's end line, generate at every turn re-encrypted private key can before first judge whether to have had this key, if having, do not need regeneration, to save computing cost.
When having user to ask shared file, meta data server can determine whether request shared file user is authorized user according to list of authorized users, if so, with described request shared file user's re-encrypted private key, the key information in file metadata is carried out to re-encryption (step S2004).If request shared file user is not authorized user, forbid sharing operation.
Next at step S2006, meta data server sends to request shared file user by the map information in file metadata with through the key information of re-encryption.
After receiving the information that meta data server sends, at step S2008, request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
According to a specific embodiments, the file metadata being stored in meta data server can comprise with mapping key the map information that the decruption key of the position in storage server and the position in original and this ciphertext block data and identifier encryption generate to each ciphertext block data respectively.
In the present embodiment, request shared file user's client is after having obtained the information of meta data server transmission, key information that can the re-encryption of private key solution crammed obtains mapping key, with mapping key, map information is decrypted, obtain the position of each ciphertext block data in storage server and decruption key and the identifier of the position in original and this ciphertext block data, a plurality of ciphertext block datas of storing in position acquisition storage server by each ciphertext block data in storage server, identifier by each ciphertext block data carries out consistency checking to ciphertext block data, by the decruption key of ciphertext block data and the shared file of position acquisition request in original.
File is after duplicate removal stores processor, original file is broken up as ciphertext block data independently mutually, relevant ciphertext block data to be reassembled as to complete file, just need position, encrypt data block identifier, the decruption key of ciphertext block data, the ciphertext block data position in original of ciphertext block data in storage server.After obtaining these information, just can to storage server, data block read requests be proposed in the position in storage server according to data block, obtain after ciphertext block data and identifier, the consistency of checking ciphertext block data and identifier, use corresponding decruption key deciphering to draw block of plaintext data, last according to data block, thereby the position integral data piece in original reverts to readable original, and so far client completes and reads.
By the application's file memory method, can improve the fail safe of file storage, and when carrying out file-sharing, only need different re-encrypted private key be set to each authorized user and just can realize the shared of file, without frequent new key more.
According to experiment showed, that the extra metadata information scale that this programme is introduced can be along with not sharing increasing of quantity of documents, the advantage aspect space hold is obvious; Before upload file, first with identifier, judge repetition, if repeat, notify client not need to upload corresponding sub-block, reduced internodal data volume; Can resist goal conflict attacks.
With reference to accompanying drawing, the application's exemplary embodiment is described above.The example that it should be appreciated by those skilled in the art that above-mentioned embodiment to be only used to the object of explanation and lift, rather than be used for limiting.Any modification of doing under all instructions in the application and claim protection range, be equal to replacement etc., all should be included in the claimed scope of the application.
Claims (9)
1. file memory method, comprising:
Client becomes a plurality of data blocks by file division;
With the first hash algorithm, respectively the content of each data block is calculated, the cryptographic Hash that obtains of usining is encrypted described a plurality of data blocks respectively as the content key of each data block, obtains a plurality of ciphertext block datas;
Each ciphertext block data is uploaded to storage server and obtains the position of each ciphertext block data storage server from storage server; And
With mapping key, to each ciphertext block data, the position in storage server, the position in original and content key encryption generate map information respectively, with the possessory PKI of file, described mapping key is encrypted and generated key information, and map information is sent to meta data server with key information together with filename and file owner sign.
2. the method for claim 1, further comprises: client is calculated each ciphertext block data with the second hash algorithm, usings the cryptographic Hash that obtains as the identifier of each ciphertext block data,
Wherein, with mapping key, to each ciphertext block data, the content key of the position in storage server and the position in original and this ciphertext block data and identifier are encrypted and generate map information client respectively.
3. method as claimed in claim 2, wherein, described the first hash algorithm and described the second hash algorithm are identical algorithm or different algorithms.
4. method as claimed in claim 2, wherein, the step of client upload ciphertext block data further comprises:
Client is sent to storage server by the identifier of this ciphertext block data;
If storage server determines that by described identifier ciphertext block data to be uploaded stores, described identifier and the position of having stored data block are returned to client; And
If storage server determines that by described identifier ciphertext block data to be uploaded do not store, the information that comprises position to be stored and described identifier is returned to client, by client, ciphertext block data corresponding to described identifier is uploaded to storage server.
5. method as claimed in claim 3, wherein, client is uploaded to ciphertext block data corresponding to described identifier after storage server, storage server carries out consistency checking according to the ciphertext block data and the described identifier that receive, after being verified, described ciphertext block data is stored to described position to be stored.
6. the method as described in any one in claim 2 to 5, wherein, described content key and described mapping key are symmetric keys.
7. file sharing method, wherein, a plurality of ciphertext block datas of configuration file are stored in storage server, file metadata is stored in meta data server, file metadata comprises with mapping key the map information that the encryption of the decruption key of the position in storage server and the position in original and this ciphertext block data generates to each ciphertext block data respectively, and with the possessory PKI of file, described mapping key is encrypted the key information generating, described method comprises:
The file owner generates authorized user list and each authorized user's re-encrypted private key and is sent to meta data server;
Meta data server determines that according to list of authorized users whether request shared file user is authorized user, if so, carries out re-encryption with described request shared file user's re-encrypted private key to described key information;
Meta data server sends to described request shared file user by described map information with through the key information of re-encryption; And
Described request shared file user's client is obtained described mapping key with the described key information through re-encryption of private key deciphering, with described mapping key, described map information is decrypted, and by the shared file of information acquisition request after deciphering.
8. method as claimed in claim 7, wherein, file metadata comprises with mapping key the map information that the decruption key of the position in storage server and the position in original and this ciphertext block data and identifier encryption generate to each ciphertext block data respectively.
9. method as claimed in claim 8, wherein, described request shared file user's client is obtained the position of each ciphertext block data in storage server and decruption key and the identifier of the position in original and this ciphertext block data to described map information deciphering, a plurality of ciphertext block datas of storing in position acquisition storage server by each ciphertext block data in storage server, identifier by each ciphertext block data carries out consistency checking to ciphertext block data, by the decruption key of ciphertext block data and the shared file of position acquisition request in original.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210326062.2A CN103685162A (en) | 2012-09-05 | 2012-09-05 | File storing and sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210326062.2A CN103685162A (en) | 2012-09-05 | 2012-09-05 | File storing and sharing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103685162A true CN103685162A (en) | 2014-03-26 |
Family
ID=50321495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210326062.2A Pending CN103685162A (en) | 2012-09-05 | 2012-09-05 | File storing and sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685162A (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530284A (en) * | 2014-10-21 | 2016-04-27 | 三星Sds株式会社 | Method for synchronizing file |
CN105631347A (en) * | 2014-10-27 | 2016-06-01 | 鸿富锦精密工业(深圳)有限公司 | File storage method and client device |
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
CN107085688A (en) * | 2016-02-16 | 2017-08-22 | 中国移动通信集团湖北有限公司 | File authorizing method and mobile terminal |
CN107204986A (en) * | 2017-06-27 | 2017-09-26 | 四川捷云信通信息技术有限公司 | High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device |
CN107612763A (en) * | 2017-11-08 | 2018-01-19 | 山东浪潮通软信息科技有限公司 | Metadata management method, application server, operation system, medium and controller |
WO2018029464A1 (en) | 2016-08-08 | 2018-02-15 | Record Sure Limited | A method of generating a secure record of a conversation |
CN108390759A (en) * | 2018-03-21 | 2018-08-10 | 平安普惠企业管理有限公司 | Code encryption, decryption method, device, computer equipment and storage medium |
CN109074394A (en) * | 2016-05-05 | 2018-12-21 | 万事达卡国际股份有限公司 | Method and system for the Distributed Storage with permanent completeness guarantee |
CN109241757A (en) * | 2018-08-22 | 2019-01-18 | 石数字技术成都有限公司 | A kind of file browsing method based on recognition of face |
WO2019019853A1 (en) * | 2017-07-27 | 2019-01-31 | 华为技术有限公司 | Data processing method, terminal device, and network device |
CN109324998A (en) * | 2018-09-18 | 2019-02-12 | 郑州云海信息技术有限公司 | A kind of document handling method, apparatus and system |
CN109471844A (en) * | 2018-10-10 | 2019-03-15 | 深圳市达仁基因科技有限公司 | File sharing method, device, computer equipment and storage medium |
CN109525388A (en) * | 2017-09-19 | 2019-03-26 | 中兴通讯股份有限公司 | A kind of combined ciphering method and system of cipher key separation |
CN109587132A (en) * | 2018-11-29 | 2019-04-05 | 苏宁易购集团股份有限公司 | A kind of data transferring method and device based on alliance's chain |
CN109889324A (en) * | 2018-12-27 | 2019-06-14 | 深圳市安云信息科技有限公司 | Encrypt storage method, storage medium and device |
CN109995821A (en) * | 2017-12-29 | 2019-07-09 | 中移(苏州)软件技术有限公司 | Method and system, the client, server, object storage system of file upload |
CN109992563A (en) * | 2019-01-18 | 2019-07-09 | 阿里巴巴集团控股有限公司 | A kind of service scripts storage method and device based on block chain |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
CN110197722A (en) * | 2019-05-31 | 2019-09-03 | 贵州精准健康数据有限公司 | AI-CPU system platform |
CN110430192A (en) * | 2019-08-06 | 2019-11-08 | 北京握奇数据股份有限公司 | A kind of method of file encryption-decryption, system, controller and storage medium |
CN110602146A (en) * | 2019-09-30 | 2019-12-20 | 北京大米科技有限公司 | Data encryption and decryption method, readable storage medium and electronic equipment |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111209585A (en) * | 2020-02-11 | 2020-05-29 | 广州电力交易中心有限责任公司 | Data processing method and system based on electric power transaction |
CN111314287A (en) * | 2019-12-20 | 2020-06-19 | 淮北师范大学 | Public key encryption communication mode and device |
US10783277B2 (en) | 2019-05-31 | 2020-09-22 | Alibaba Group Holding Limited | Blockchain-type data storage |
CN111739190A (en) * | 2020-05-27 | 2020-10-02 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
CN111931219A (en) * | 2020-09-22 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data storage method and device and data query method and device |
WO2020238248A1 (en) * | 2019-05-31 | 2020-12-03 | 创新先进技术有限公司 | Data storage method, apparatus and device |
CN112182600A (en) * | 2020-09-18 | 2021-01-05 | 北京云钥网络科技有限公司 | Data encryption method, data decryption method and electronic equipment |
CN112868011A (en) * | 2018-10-09 | 2021-05-28 | Emc Ip控股有限公司 | Multi-cloud transactional storage for availability and security |
CN113127895A (en) * | 2021-03-17 | 2021-07-16 | 嘉兴职业技术学院 | Cloud data protection method based on distributed storage |
CN113196702A (en) * | 2018-11-16 | 2021-07-30 | 先进信息技术公司 | System and method for distributed data storage and transfer using blockchains |
CN113273163A (en) * | 2020-05-26 | 2021-08-17 | 深圳元戎启行科技有限公司 | File uploading method, file downloading method and file management device |
CN113449314A (en) * | 2020-03-25 | 2021-09-28 | 北京京东振世信息技术有限公司 | Data processing method and device |
CN113553611A (en) * | 2020-04-26 | 2021-10-26 | 中国电信股份有限公司 | File encryption storage method and system, user terminal, cloud platform and storage medium |
CN113572614A (en) * | 2020-04-28 | 2021-10-29 | 万维数码智能有限公司 | Security method and system for data transmission |
CN113824728A (en) * | 2021-09-27 | 2021-12-21 | 南京华远时代科技有限公司 | Network communication method and system based on data encryption |
WO2021253850A1 (en) * | 2020-06-14 | 2021-12-23 | 苏州浪潮智能科技有限公司 | Data security realization method and system based on k-db database |
CN114143098A (en) * | 2021-12-03 | 2022-03-04 | 建信金融科技有限责任公司 | Data storage method and data storage device |
CN114448999A (en) * | 2021-12-21 | 2022-05-06 | 杭州华橙软件技术有限公司 | Data storage method, device, system, electronic device and storage medium |
CN114726643A (en) * | 2022-04-27 | 2022-07-08 | 中国银行股份有限公司 | Data storage and access method and device on cloud platform |
CN115842833A (en) * | 2022-11-24 | 2023-03-24 | 国家电投集团重庆狮子滩发电有限公司 | Processing method, device and system for super-fusion virtual storage |
CN115933993A (en) * | 2023-01-04 | 2023-04-07 | 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) | System and method for evaluating antifouling function of karst fracture network type aqueous medium |
CN117010003A (en) * | 2023-10-07 | 2023-11-07 | 北京国电通网络技术有限公司 | File decryption method based on file fragmentation and hash storage and electronic equipment |
-
2012
- 2012-09-05 CN CN201210326062.2A patent/CN103685162A/en active Pending
Cited By (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530284A (en) * | 2014-10-21 | 2016-04-27 | 三星Sds株式会社 | Method for synchronizing file |
CN105530284B (en) * | 2014-10-21 | 2020-10-02 | 三星Sds株式会社 | File synchronization method |
CN105631347A (en) * | 2014-10-27 | 2016-06-01 | 鸿富锦精密工业(深圳)有限公司 | File storage method and client device |
CN105631347B (en) * | 2014-10-27 | 2018-11-09 | 鸿富锦精密工业(深圳)有限公司 | File access method and client terminal device |
CN107085688A (en) * | 2016-02-16 | 2017-08-22 | 中国移动通信集团湖北有限公司 | File authorizing method and mobile terminal |
CN109074394B (en) * | 2016-05-05 | 2022-10-11 | 万事达卡国际股份有限公司 | Method and system for distributed data storage with permanent integrity assurance |
CN109074394A (en) * | 2016-05-05 | 2018-12-21 | 万事达卡国际股份有限公司 | Method and system for the Distributed Storage with permanent completeness guarantee |
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
CN106059762B (en) * | 2016-07-26 | 2019-05-14 | 江苏国泰新点软件有限公司 | Data safety processing method and device |
WO2018029464A1 (en) | 2016-08-08 | 2018-02-15 | Record Sure Limited | A method of generating a secure record of a conversation |
CN107204986A (en) * | 2017-06-27 | 2017-09-26 | 四川捷云信通信息技术有限公司 | High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device |
CN107204986B (en) * | 2017-06-27 | 2019-10-18 | 四川捷云信通信息技术有限公司 | Cloud stores encryption method, decryption method and cloud and stores encryption device |
WO2019019853A1 (en) * | 2017-07-27 | 2019-01-31 | 华为技术有限公司 | Data processing method, terminal device, and network device |
CN109309650A (en) * | 2017-07-27 | 2019-02-05 | 华为技术有限公司 | Handle method, terminal device and the network equipment of data |
CN109525388A (en) * | 2017-09-19 | 2019-03-26 | 中兴通讯股份有限公司 | A kind of combined ciphering method and system of cipher key separation |
CN107612763A (en) * | 2017-11-08 | 2018-01-19 | 山东浪潮通软信息科技有限公司 | Metadata management method, application server, operation system, medium and controller |
CN107612763B (en) * | 2017-11-08 | 2020-10-02 | 浪潮通用软件有限公司 | Metadata management method, application server, service system, medium and controller |
CN109995821A (en) * | 2017-12-29 | 2019-07-09 | 中移(苏州)软件技术有限公司 | Method and system, the client, server, object storage system of file upload |
CN108390759A (en) * | 2018-03-21 | 2018-08-10 | 平安普惠企业管理有限公司 | Code encryption, decryption method, device, computer equipment and storage medium |
CN109241757A (en) * | 2018-08-22 | 2019-01-18 | 石数字技术成都有限公司 | A kind of file browsing method based on recognition of face |
CN109324998A (en) * | 2018-09-18 | 2019-02-12 | 郑州云海信息技术有限公司 | A kind of document handling method, apparatus and system |
CN112868011B (en) * | 2018-10-09 | 2023-05-02 | Emc Ip控股有限公司 | Multi-cloud transactional storage for availability and security |
CN112868011A (en) * | 2018-10-09 | 2021-05-28 | Emc Ip控股有限公司 | Multi-cloud transactional storage for availability and security |
US11385958B2 (en) | 2018-10-09 | 2022-07-12 | EMC IP Holding Company LLC | Multi cloud transactional storage for availability and security |
CN109471844B (en) * | 2018-10-10 | 2022-02-18 | 深圳市达仁基因科技有限公司 | File sharing method and device, computer equipment and storage medium |
CN109471844A (en) * | 2018-10-10 | 2019-03-15 | 深圳市达仁基因科技有限公司 | File sharing method, device, computer equipment and storage medium |
CN113196702A (en) * | 2018-11-16 | 2021-07-30 | 先进信息技术公司 | System and method for distributed data storage and transfer using blockchains |
CN109587132A (en) * | 2018-11-29 | 2019-04-05 | 苏宁易购集团股份有限公司 | A kind of data transferring method and device based on alliance's chain |
CN109587132B (en) * | 2018-11-29 | 2021-03-26 | 南京苏宁软件技术有限公司 | Data transmission method and device based on alliance chain |
CN109889324A (en) * | 2018-12-27 | 2019-06-14 | 深圳市安云信息科技有限公司 | Encrypt storage method, storage medium and device |
CN109992563A (en) * | 2019-01-18 | 2019-07-09 | 阿里巴巴集团控股有限公司 | A kind of service scripts storage method and device based on block chain |
CN110138749B (en) * | 2019-04-23 | 2021-12-21 | 华为技术有限公司 | Data security protection method and related equipment |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
WO2020238248A1 (en) * | 2019-05-31 | 2020-12-03 | 创新先进技术有限公司 | Data storage method, apparatus and device |
CN110197722A (en) * | 2019-05-31 | 2019-09-03 | 贵州精准健康数据有限公司 | AI-CPU system platform |
US10783277B2 (en) | 2019-05-31 | 2020-09-22 | Alibaba Group Holding Limited | Blockchain-type data storage |
CN110430192A (en) * | 2019-08-06 | 2019-11-08 | 北京握奇数据股份有限公司 | A kind of method of file encryption-decryption, system, controller and storage medium |
CN110602146A (en) * | 2019-09-30 | 2019-12-20 | 北京大米科技有限公司 | Data encryption and decryption method, readable storage medium and electronic equipment |
CN111314287A (en) * | 2019-12-20 | 2020-06-19 | 淮北师范大学 | Public key encryption communication mode and device |
CN111143870B (en) * | 2019-12-30 | 2022-05-13 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111209585B (en) * | 2020-02-11 | 2020-12-18 | 广州电力交易中心有限责任公司 | Data processing method and system based on electric power transaction |
CN111209585A (en) * | 2020-02-11 | 2020-05-29 | 广州电力交易中心有限责任公司 | Data processing method and system based on electric power transaction |
CN113449314B (en) * | 2020-03-25 | 2023-11-03 | 北京京东振世信息技术有限公司 | Data processing method and device |
CN113449314A (en) * | 2020-03-25 | 2021-09-28 | 北京京东振世信息技术有限公司 | Data processing method and device |
CN113553611A (en) * | 2020-04-26 | 2021-10-26 | 中国电信股份有限公司 | File encryption storage method and system, user terminal, cloud platform and storage medium |
CN113572614A (en) * | 2020-04-28 | 2021-10-29 | 万维数码智能有限公司 | Security method and system for data transmission |
CN113572614B (en) * | 2020-04-28 | 2023-07-14 | 万维数码智能有限公司 | Security method and system for data transmission |
CN113273163A (en) * | 2020-05-26 | 2021-08-17 | 深圳元戎启行科技有限公司 | File uploading method, file downloading method and file management device |
WO2021237467A1 (en) * | 2020-05-26 | 2021-12-02 | 深圳元戎启行科技有限公司 | File uploading method, file downloading method and file management apparatus |
CN111739190A (en) * | 2020-05-27 | 2020-10-02 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
CN111739190B (en) * | 2020-05-27 | 2022-09-20 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
WO2021253850A1 (en) * | 2020-06-14 | 2021-12-23 | 苏州浪潮智能科技有限公司 | Data security realization method and system based on k-db database |
CN112182600A (en) * | 2020-09-18 | 2021-01-05 | 北京云钥网络科技有限公司 | Data encryption method, data decryption method and electronic equipment |
CN111931219B (en) * | 2020-09-22 | 2021-04-23 | 支付宝(杭州)信息技术有限公司 | Data storage method and device and data query method and device |
CN111931219A (en) * | 2020-09-22 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data storage method and device and data query method and device |
CN113127895A (en) * | 2021-03-17 | 2021-07-16 | 嘉兴职业技术学院 | Cloud data protection method based on distributed storage |
CN113824728A (en) * | 2021-09-27 | 2021-12-21 | 南京华远时代科技有限公司 | Network communication method and system based on data encryption |
CN114143098B (en) * | 2021-12-03 | 2023-08-15 | 建信金融科技有限责任公司 | Data storage method and data storage device |
CN114143098A (en) * | 2021-12-03 | 2022-03-04 | 建信金融科技有限责任公司 | Data storage method and data storage device |
CN114448999A (en) * | 2021-12-21 | 2022-05-06 | 杭州华橙软件技术有限公司 | Data storage method, device, system, electronic device and storage medium |
CN114726643A (en) * | 2022-04-27 | 2022-07-08 | 中国银行股份有限公司 | Data storage and access method and device on cloud platform |
CN114726643B (en) * | 2022-04-27 | 2024-04-16 | 中国银行股份有限公司 | Data storage and access methods and devices on cloud platform |
CN115842833A (en) * | 2022-11-24 | 2023-03-24 | 国家电投集团重庆狮子滩发电有限公司 | Processing method, device and system for super-fusion virtual storage |
CN115842833B (en) * | 2022-11-24 | 2023-12-15 | 国家电投集团重庆狮子滩发电有限公司 | Processing method, device and system for super-fusion virtual storage |
CN115933993A (en) * | 2023-01-04 | 2023-04-07 | 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) | System and method for evaluating antifouling function of karst fracture network type aqueous medium |
CN115933993B (en) * | 2023-01-04 | 2023-05-30 | 山东省地质矿产勘查开发局八〇一水文地质工程地质大队(山东省地矿工程勘察院) | Karst fracture network type aqueous medium antifouling function evaluation system and method |
CN117010003A (en) * | 2023-10-07 | 2023-11-07 | 北京国电通网络技术有限公司 | File decryption method based on file fragmentation and hash storage and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685162A (en) | File storing and sharing method | |
CN109995505B (en) | Data security duplicate removal system and method in fog computing environment and cloud storage platform | |
CN106254324B (en) | A kind of encryption method and device of storage file | |
CN110213042A (en) | A kind of cloud data duplicate removal method based on no certification agency re-encryption | |
KR101285281B1 (en) | Security system and its security method for self-organization storage | |
CN108881195A (en) | Data safety sharing method and device based on cloud environment | |
US10685141B2 (en) | Method for storing data blocks from client devices to a cloud storage system | |
CN113346998B (en) | Key updating and file sharing method, device, equipment and computer storage medium | |
CN103414682A (en) | Method for cloud storage of data and system | |
CN103763362A (en) | Safe distributed duplicated data deletion method | |
Yan et al. | A scheme to manage encrypted data storage with deduplication in cloud | |
CN1910532A (en) | Backup and restoration of DRM security data | |
Akhila et al. | A study on deduplication techniques over encrypted data | |
CN102693398A (en) | Data encryption method and system | |
US11595188B2 (en) | Method for storing a data file | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN108632385A (en) | Multiway tree data directory structure cloud storage method for secret protection based on time series | |
Ma et al. | CP-ABE-based secure and verifiable data deletion in cloud | |
CN112685753A (en) | Method and equipment for storing encrypted data | |
CN109787747B (en) | Anti-quantum-computation multi-encryption cloud storage method and system based on multiple asymmetric key pools | |
CN104794243B (en) | Third party's cipher text retrieval method based on filename | |
Li et al. | A data assured deletion scheme in cloud storage | |
CN108494552B (en) | Cloud storage data deduplication method supporting efficient convergence key management | |
CN113824713B (en) | Key generation method, system and storage medium | |
KR101790757B1 (en) | Cloud system for storing secure data and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140326 |
|
RJ01 | Rejection of invention patent application after publication |