CN106612285A - Distributed cloud data management method and system based on peer-to-peer network - Google Patents

Distributed cloud data management method and system based on peer-to-peer network Download PDF

Info

Publication number
CN106612285A
CN106612285A CN201611269919.6A CN201611269919A CN106612285A CN 106612285 A CN106612285 A CN 106612285A CN 201611269919 A CN201611269919 A CN 201611269919A CN 106612285 A CN106612285 A CN 106612285A
Authority
CN
China
Prior art keywords
data
encryption
peer
storage
user node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611269919.6A
Other languages
Chinese (zh)
Other versions
CN106612285B (en
Inventor
何志安
朱信杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201611269919.6A priority Critical patent/CN106612285B/en
Publication of CN106612285A publication Critical patent/CN106612285A/en
Application granted granted Critical
Publication of CN106612285B publication Critical patent/CN106612285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention belongs to the technical field of electronics, and provides a distributed cloud data management method and system based on a peer-to-peer network. The peer-to-peer network comprises a plurality of user nodes, and each user node in the peer-to-peer network can encrypt data via a private key of a user of the node and then upload the data to the peer-to-peer network to store the encrypted data to other user nodes of the peer-to-peer network in a distributed manner. By encrypting data and storing the data to the user nodes of the peer-to-peer network in the distributed manner, mass data can be stored, so that the storage security of data is effectively guaranteed while the existing storage space is expanded.

Description

Distributed cloud data managing method and system based on peer-to-peer network
Technical field
The embodiment of the present invention belongs to electronic technology field, more particularly to a kind of distributed cloud data pipe based on peer-to-peer network Reason method and system.
Background technology
As the electric terminals such as the continuous popularization of various electric terminals, mobile phone, panel computer, personal computer have become Living and studying instrument indispensable in people's daily life, people are got used to saving the data in electric terminal.Due to Personal electric terminal memory capacity is limited, and people would generally save the data in (example on the memory space of third-party server Such as network cloud disk), to extend existing memory space, so as to store more data.
However, saving the data in third-party server stores larger potential safety hazard, the private data being used for is possible to Can be stolen or be distorted by third-party server operator, it is very dangerous.
The content of the invention
The embodiment of the present invention provides a kind of distributed cloud data managing method and system based on peer-to-peer network, by logarithm According to being encrypted and being stored in data distribution formula in the user node of peer-to-peer network, can store big data is realized, with While extending existing memory space, the storage safety of data is effectively ensured.
On the one hand the embodiment of the present invention provides a kind of distributed cloud data managing method based on peer-to-peer network, the equity Network includes multiple user nodes, and the distributed cloud data managing method is applied to first user node, the distributed cloud Data managing method includes:
Storage request is received, the storage is asked for first object data distribution formula is stored into the peer-to-peer network User node;
The first encryption key corresponding with the first object data is generated, the first encryption key includes the first public key With the first private key;
The first object data according to first public key encryption, obtain first object encryption data, and by described One target encryption data is divided at least one encrypted data chunk;
By the default meta-data index storage of metadata information write of the first object encryption data, the default metadata There is between memory block and the plurality of user node default communication connection relation;
The first storage contract corresponding with the first object encryption data is generated, and obtains signing first storage and closed The CAMEL-Subscription-Information of all second user nodes about, the first storage contract are used to define the first object encryption data Memory requirement and storage income;
By at least one encrypted data chunk distributed storage in all second user nodes, and by described first The CAMEL-Subscription-Information of the store path of target encrypted data chunk and the first storage contract writes the default meta-data index storage.
On the other hand the embodiment of the present invention also provides a kind of distributed cloud data management system based on peer-to-peer network, described Peer-to-peer network includes multiple user nodes, and the distributed cloud data management system is applied to first user node, the distribution Formula cloud data management system includes:
Human-computer interaction module, for receiving storage request, the storage is asked for first object data distribution formula is deposited Store up the user node into the peer-to-peer network;
Key management module, for generating the first encryption key corresponding with the first object data, described first adds Close key includes the first public key and the first private key;
Data encrypting and deciphering module, for the first object data according to first public key encryption, obtains first object Encryption data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module, deposits for the default metadata of metadata information write by the first object encryption data Storage area, has default communication connection relation between the default meta-data index storage and the plurality of user node;
Contract administration module, for generating the first storage contract corresponding with the first object encryption data, and obtains Contract the first storage contract all second user nodes CAMEL-Subscription-Information, the first storage contract is used to defining described The memory requirement and storage income of first object encryption data;
Distributed Storage module, for by least one encrypted data chunk distributed storage in described all Two user nodes, and the CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write Enter the default meta-data index storage.
The embodiment of the present invention is by being encrypted to data and saving the user for being stored in peer-to-peer network of data distribution formula In point, can store big data is realized, to extend while existing memory space, the storage safety of data be effectively ensured.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings Figure.
Fig. 1 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 2 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 3 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 4 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 5 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 6 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 7 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram;
Fig. 8 is the structure of the distributed cloud data management system based on peer-to-peer network that one embodiment of the present of invention is provided Block diagram.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, is explicitly described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is the present invention one The embodiment divided, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing The every other embodiment obtained under the premise of going out creative work, should all belong to the scope of protection of the invention.
Term " including " and their any deformations in description and claims of this specification and above-mentioned accompanying drawing, meaning Figure is to cover non-exclusive including.Process, method or system, product or the equipment for for example including series of steps or unit does not have The step of listing or unit are defined in, but alternatively also include the step of not listing or unit, or alternatively also wrapped Include other intrinsic for these processes, method, product or equipment step or unit.Additionally, term " first ", " second " and " 3rd " etc. is for distinguishing different objects, not for description particular order.
As shown in figure 1, one embodiment of the present of invention provides one kind based on peer-to-peer network (Peer to Peer, P2P) Distributed cloud data managing method, the peer-to-peer network include multiple user nodes.
In the present embodiment, user node specifically refers to the client with physical store function being connected in peer-to-peer network End, for example:Mobile phone, panel computer, personal pc client etc..First user node refers to any user section in peer-to-peer network Point, second user node refer to other any user nodes in peer-to-peer network in addition to first user node.Peer-to-peer network Any user node in network can store data distribution formula to other users node, to realize the extension of memory space.
Below using first user node as executive agent describing the distributed cloud data managing method in detail, which includes:
Step S101:Receive storage request, the storage request is for first object data distribution formula is stored to described User node in peer-to-peer network.
In a particular application, first object data refer to active user needs to store to the data of peer-to-peer network.Step S101 specifically can be performed by the human-computer interaction interface of first user node, and active user is man-machine by first user node Interactive interface input storage request, the storage request can specifically pass through to click on or press virtual or real on human-computer interaction interface Body button is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S101:
File selection instruction is received, choosing needs the first object data for being uploaded to peer-to-peer network.
Step S102:Generate the first encryption key corresponding with the first object data, the first encryption key bag Include the first public key and the first private key.
In the present embodiment, the first encryption key is specially the encryption key based on rivest, shamir, adelman, active user The the first private key decryption that can only be set by active user by the data of the first public key encryption of the first encryption key.
In a particular application, when user needs to upload multiple data and preserves to peer-to-peer network, can be respectively per number According to corresponding encryption key is generated, to realize the independent encryption to each data.
Step S103:The first object data according to first public key encryption, obtain first object encryption data, and The first object encryption data is divided into at least one encrypted data chunk.
In a particular application, the size of data of encrypted data chunk and the redundancy of piecemeal is carried out to target encryption data can be with It is adjusted according to the needs of user.For example, target encryption data that can be by a size of data for 1,000,000,000 (MB) is divided For 10 encrypted data chunks, the size of each data block is 100,000,000;Redundancy then refers to that user needs to enter target encryption data The quantity of row backup, for example, if user needs three backups (to include target encryption data itself and replicate two for obtaining altogether Target encryption data), then as a example by the target encryption data by size of data for 1,000,000,000 (MB), need distributed being stored in entirely The size of data of the target encryption data in peer-to-peer network is 1000 × 3=3,000 million, if every part of target encryption data is divided into 10 encrypted data chunks, then the distributed number for being stored in encrypted data chunk in whole peer-to-peer network is 10 × 3=30..
Step S104:Meta-data index storage is preset in the metadata information write of the first object encryption data, it is described There is between default meta-data index storage and the plurality of user node default communication connection relation.
In a particular application, metadata (Metadata), also known as broker data, relay data, is the data for describing data (data about data), mainly describes the information of data attribute (property), for support as indicate storage location, The functions such as historical data, resource lookup, file record.
In the present embodiment, all user nodes during default meta-data index storage is specifically referred to by peer-to-peer network are tieed up jointly The block catenary system of shield.Arbitrary user node being connected in peer-to-peer network is set up communication connection with the block catenary system and is closed But system, can access not have authority arbitrarily to change the data in the block catenary system.
Step S105:The first storage contract corresponding with the first object encryption data is generated, and it is described to obtain signing The CAMEL-Subscription-Information of all second user nodes of the first storage contract, the first storage contract are used to define the first object The memory requirement and storage income of encryption data.
In a particular application, store contract to be mainly used in by the formal definition second user node of electronics contract storage the The storage condition observed and the storage income that can be obtained, storage condition is needed specifically may be used during the data that one user node is uploaded So that including data confidentiality agreement, data integrity protection's agreement etc., storage income can specifically include remuneration, reward etc., remuneration Can be specifically electronic money, reward can be specifically that reward second user node can freely store a certain size data extremely Peer-to-peer network.User can be made to be more willing to preserve what other users node was uploaded by its user node by setting storage income Data.User can voluntarily change the storage condition and storage income of storage contract according to actual needs.
In a particular application, signing first stores contract and specifically refers to receive storage condition and storage defined in the contract Income, the CAMEL-Subscription-Information produced by the first storage contract of contracting will be saved to the block that all user nodes are safeguarded jointly Catenary system, that is, preset in meta-data index storage, and which the second use first user node can check by the block catenary system Family endorsed the first storage contract, and CAMEL-Subscription-Information can also be stored in locally for signing contract by second user node simultaneously In hardware or software module (the contract administration modules in i.e. following systems).
Step S106:By at least one encrypted data chunk distributed storage in all second user nodes, and The CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write into the default unit Data storage area.
The present embodiment by being encrypted to data and being stored in data distribution formula in the user node of peer-to-peer network, The storage safety of data can be effectively ensured while extending existing memory space big data storage is realized.
In one embodiment of the invention, active user can download the data which is stored into peer-to-peer network, this reality Apply in example, by taking first object encryption data as an example in detail, the process for downloading first object encryption data is described in detail.
In certain embodiments of the present invention, based on the method and step in the embodiment corresponding to Fig. 1, the distributed cloud Data managing method can also include being downloaded, delete for the data to distributed storage in peer-to-peer network, sharing or The method and step of transaction.
As shown in Fig. 2 the present embodiment specifically includes the side that the data to distributed storage in peer-to-peer network are downloaded Method step, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 also includes:
Step S201:Download request is received, and the download request is used to distributed storage is downloaded in the peer-to-peer network The first object encryption data.
In a particular application, step S201 can be performed by the human-computer interaction interface of first user node, active user Download request is input into by the human-computer interaction interface of first user node.The download request specifically by clicking on or can press people Virtual or entity button on machine interactive interface is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S201:
File selection instruction is received, the first object encryption data for needing from peer-to-peer network to download is chosen.
Step S202:The storage road of the first object encryption data write in reading the default meta-data index storage Footpath;
Step S203:Download the first object encryption pointed by the store path of the first object encrypted data chunk Data, and down operation record is write into the default meta-data index storage;
Step S204:Obtain first private key;
Step S205:The first object encryption data is decrypted by first private key.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage and the encryption data is entered by downloading active user Row decryption so that active user can download the data of its storage according to their needs anywhere or anytime from peer-to-peer network.
In one embodiment of the invention, active user can delete the data which is stored into peer-to-peer network, this reality Apply in example, by taking first object encryption data as an example in detail, the process for deleting first object encryption data is described in detail.
As shown in figure 3, the present embodiment specifically includes the side deleted by the data to distributed storage in peer-to-peer network Method step, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 also includes:
Step S301:Removal request is received, and the removal request is used to distributed storage is deleted in the peer-to-peer network The first object encryption data.
In a particular application, step S301 can be performed by the human-computer interaction interface of first user node, active user Removal request is input into by the human-computer interaction interface of first user node.The removal request specifically by clicking on or can press people Virtual or entity button on machine interactive interface is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S301:
File selection instruction is received, the first object encryption data for needing from peer-to-peer network to delete is chosen.
Step S302:The storage of the first object encrypted data chunk write in reading the default meta-data index storage Path;
Step S303:Delete the first object encryption number pointed by the store path of the first object encryption data According to, and deletion action record is write into the default meta-data index storage.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage by deleting active user so that active user can be with Delete the data of its storage according to their needs anywhere or anytime from peer-to-peer network.
In one embodiment of the invention, active user can be stored data sharing into peer-to-peer network to which He is user, it is also possible to obtain the data that other users are shared into peer-to-peer network, in the present embodiment, with first object encryption data As a example by, process of the shared first object encryption data to second user node is described in detail in detail.
As shown in figure 4, the present embodiment specifically includes the data sharing by distributed storage in peer-to-peer network using to other The method and step at family, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 is also wrapped Include:
Step S401:The first sharing request that the second user node sends is received, first sharing request is used for The first object encryption data of the distributed storage in the peer-to-peer network is shared to into the second user node.
In a particular application, step S401 can be performed by the human-computer interaction interface of first user node, when receiving During the first sharing request, the human-computer interaction interface of first user node shows first sharing request, and active user can pass through The virtual or entity button on human-computer interaction interface is clicked on or is pressed responding first sharing request, it is also possible to by word Or the mode that the mode of voice is input into is responded.
In one embodiment, include before step 401:
File selection instruction is received, the first object encryption number that second user node is shared in needing peer-to-peer network is chosen According to.
Step S402:If response first sharing request, obtains the second public key that the second user node sends;
Step S403:Key is encrypted by described in second public key encryption first and the second user section is sent to Point.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage to other users by sharing active user so that when Front user can share the data of its storage according to their needs anywhere or anytime.
In one embodiment of the invention, active user can obtain other users and share the number into peer-to-peer network According to, in the present embodiment, by taking the second target encryption data of second user nodes sharing to peer-to-peer network as an example, describing acquisition in detail The process of the second target encryption data of two user's nodes sharings.
As shown in figure 5, the present embodiment specifically includes acquisition other users sharing to distributed storage in peer-to-peer network In the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 is also wrapped the method and step of data Include:
Step S501:The second sharing request is sent to the second user node, second sharing request is used to obtain The second user Node distribution formula is stored in the second target encryption data of the peer-to-peer network.
In a particular application, step S501 can be performed by the human-computer interaction interface of first user node, active user Second sharing request is input into by the human-computer interaction interface of first user node and second user node is sent to.This second share Request specifically can be input into by clicking on or pressing the virtual or entity button on human-computer interaction interface, it is also possible to by word Or the mode of voice is input into.
In one embodiment, include before step 501:
File selection instruction is received, the second target in the second user nodes sharing to peer-to-peer network for needing to obtain is chosen Encryption data.
Step S502:If detecting the second user node responds second sharing request, described second is downloaded Target encryption data;
Step S503:First public key is sent to the second user node, and it is anti-to obtain the second user node The second encryption key by first public key encryption of feedback, the second encryption key include the second public key and second private Key;
Step S504:The second encryption key is decrypted by first private key, and is decrypted according to second private key The second target encryption data.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage by obtaining other users so that active user can be with Obtain other users according to their needs anywhere or anytime and share the data into peer-to-peer network.
In one embodiment of the invention, active user can be uploaded to the data in peer-to-peer network, used as friendship Easily object in the present embodiment, by taking first object encryption data as an example, describes the first mesh of transaction in detail being traded with other users Mark encryption data process.
As shown in fig. 6, the present embodiment specifically includes the data being stored in peer-to-peer network in a distributed manner as trading object The method and step being traded with other users, in the present embodiment, the distributed cloud number provided by the embodiment corresponding to Fig. 1 According to management method, also include:
Step S601:The first transaction request that the second user node sends is received, first transaction request is used for Using distributed storage in the peer-to-peer network the first object encryption data as trading object and the second user section Point is traded.
In a particular application, step S601 can be performed by the human-computer interaction interface of first user node, when receiving During the first sharing request, the human-computer interaction interface of first user node shows first transaction request, and active user can pass through The virtual or entity button on human-computer interaction interface is clicked on or is pressed responding first transaction request, it is also possible to by word Or the mode that the mode of voice is input into is responded.
In one embodiment, include before step 601:
File selection instruction is received, the first object encryption number for needing to be traded with second user node is chosen According to.
Step S602:If response first transaction request, corresponding with the first object encryption data the is generated One transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage, described first hands over Easily contract is used for the terms of trade for defining the first object encryption data;
Step S603:Obtain the second public key that the second user node sends;
Step S604:Key is encrypted by described in second public key encryption first and the second user section is sent to Point.
In a particular application, key is encrypted by the second public key encryption first so that the only user of second user node Can only by the second private key corresponding with the second public key decryption first encrypt key, and other users cannot decrypt obtain first plus Close key, so as to the user for ensureing only second user node can decrypt first object encryption text by the first encryption key Part.
The present embodiment is by carrying out data trade with other users so that active user can according to their needs at any time with The data shared into peer-to-peer network on ground are traded with other users as trading object.
In one embodiment of the invention, active user can be uploaded in peer-to-peer network as friendship for other users The data of easily object are traded with other users, in the present embodiment, are uploaded to the second of peer-to-peer network with second user node As a example by target encryption data in detail, the second target encryption data process of transaction is described in detail.
As shown in fig. 7, the present embodiment specifically include data using other users distributed storage in peer-to-peer network as The method and step that trading object is traded with other users, in the present embodiment, what the embodiment corresponding to Fig. 1 was provided divides Cloth cloud data managing method, also includes:
Step S701:To the second user node send the second transaction request, second transaction request for institute State second user node to be traded to obtain the second target encryption data;
In a particular application, step S701 can be performed by the human-computer interaction interface of first user node, active user Second transaction request is input into by the human-computer interaction interface of first user node and second user node is sent to.Second transaction Request specifically can be input into by clicking on or pressing the virtual or entity button on human-computer interaction interface, it is also possible to by word Or the mode of voice is input into.
In one embodiment, include before step 701:
File selection instruction is received, the second target encryption data for needing to be traded with second user node is chosen.
Step S702:If detecting the second user node responds second transaction request, described second is downloaded Target encryption data;
Step S703:First public key is sent to the second user node, and it is anti-to obtain the second user node The second encryption key by first public key encryption of feedback, the second encryption key include the second public key and second private Key;
Step S704:The second encryption key is decrypted by first private key, and is decrypted by second private key The second target encryption data;
Step S705:The contract information of the second transaction contract is obtained from the default meta-data index storage, according to institute State terms of trade defined in the contract information of the second transaction contract and perform the second transaction contract.
In a particular application, it is uploaded to what the transaction principles of the data that peer-to-peer network is traded were just as, therefore, in advance The corresponding second transaction contract of the second target encryption data if meta-data index storage is stored with, the second transaction contract are used In the terms of trade for defining the second target encryption data.
The present embodiment is by carrying out data trade with other users so that active user can according to their needs at any time with Ground the data in other users to share to peer-to-peer network are traded as trading object with other users.
As shown in figure 8, one embodiment of the present of invention provides a kind of distributed cloud data management system based on peer-to-peer network System 100, for performing the method and step in the embodiment corresponding to Fig. 1.The distributed cloud data management system 100 is applied to One user node, which includes:
Human-computer interaction module 101, for receiving storage request, the storage request is for by first object data distribution formula Store the user node into the peer-to-peer network;
Key management module 102, for generate it is corresponding with the first object data first encryption key, described first Encryption key includes the first public key and the first private key;
Data encrypting and deciphering module 103, for the first object data according to first public key encryption, obtains the first mesh Mark encryption data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module 104, for the default unit's number of metadata information write by the first object encryption data According to memory block, there is between the default meta-data index storage and the plurality of user node default communication connection relation;
Contract administration module 105, for generating the first storage contract corresponding with the first object encryption data, and obtains The CAMEL-Subscription-Information of all second user nodes of signing the first storage contract is taken, the first storage contract is used to define institute State the memory requirement and storage income of first object encryption data;
Distributed Storage module 106, for by least one encrypted data chunk distributed storage in the institute There is second user node, and the signing of the store path of the first object encrypted data chunk and the first storage contract is believed The breath write default meta-data index storage.
In a particular application, what user node was specifically referred to is connected to the visitor with physical store function in peer-to-peer network Family end, for example:Mobile phone, panel computer, personal pc client etc..Human-computer interaction module 101 can specifically include touching display screen Or keyboard.
The present embodiment by being encrypted to data and being stored in data distribution formula in the user node of peer-to-peer network, The storage safety of data can be effectively ensured while extending existing memory space big data storage is realized.
In one embodiment of the invention, the distributed cloud data management system 100 shown in Fig. 8 can be also used for performing The method and step in embodiment corresponding to Fig. 2~7.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 2:
Human-computer interaction module 101 is used to receive download request, and the download request is used to download distributed storage in described The first object encryption data of peer-to-peer network;
The first object encryption that tadata memory module 104 is write in being used to read the default meta-data index storage The store path of data;
Distributed Storage module 106 is used to download pointed by the store path of the first object encrypted data chunk The first object encryption data, and down operation record is write into the default meta-data index storage;
Key management module 102 is used to obtain first private key;
Data encrypting and deciphering module 103 is used to decrypt the first object encryption data by first private key.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 3:
Human-computer interaction module 101 is used to receive removal request, and the removal request is used to delete distributed storage in described The first object encryption data of peer-to-peer network;
The first object encryption that tadata memory module 104 is write in being used to read the default meta-data index storage The store path of data block;
Distributed Storage module 106 is used to delete the institute pointed by the store path of the first object encryption data First object encryption data is stated, and deletion action record is write into the default meta-data index storage.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 4:
Human-computer interaction module 101 is used to receive the first sharing request that the second user node sends, and described first altogether Enjoy request the second user is shared to for the first object encryption data by distributed storage in the peer-to-peer network Node;
If key management module 102 is used to respond first sharing request, obtains the second user node and send The second public key;
Data encrypting and deciphering module 103 is used for by the first encryption key described in second public key encryption and is sent to described Second user node.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 5:
Human-computer interaction module 101 for sending the second sharing request to the second user node, described second it is shared please Seek the second target encryption data that the peer-to-peer network is stored in for obtaining the second user Node distribution formula;
If Distributed Storage module 106 be used to detecting second user node response it is described second it is shared please Ask, then download the second target encryption data;
Key management module 102 is for sending first public key to the second user node, and obtains described second The second encryption key by first public key encryption of user node feedback, the second encryption key include the second public key With the second private key;
Data encrypting and deciphering module 103 is used to decrypt the second encryption key by first private key, and according to described Second private key decrypts the second target encryption data.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 6:
Human-computer interaction module 101 is used to receive the first transaction request that the second user node sends, and described first hands over Easily ask for using distributed storage in the peer-to-peer network the first object encryption data as trading object with it is described Second user node is traded;
If contract administration module 105 is used to respond first transaction request, generate and number is encrypted with the first object According to the corresponding first transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage, The first transaction contract is used to define the terms of trade of the first object encryption data;
Key management module 102 is used to obtain the second public key that the second user node sends;
Data encrypting and deciphering module 103 is used for by the first encryption key described in second public key encryption and is sent to described Second user node.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 7:
, for sending the second transaction request to the second user node, second transaction please for human-computer interaction module 101 Ask for being traded to obtain the second target encryption data with the second user node;
If Distributed Storage module 106 is additionally operable to detect the second user node response, and second transaction please Ask, then download the second target encryption data;
If key management module 102 is used to detect the second user node response second transaction request, to The second user node sends first public key, and obtain the second user node feeding back by first public key Second encryption key of encryption, the second encryption key include the second public key and the second private key;
Data encrypting and deciphering module 103 is used to decrypt the second encryption key by first private key, and by described Second private key decrypts the second target encryption data;
Contract administration module 105 is believed for the contract that the second transaction contract is obtained from the default meta-data index storage Breath, terms of trade defined in the contract information of contract of concluding the business according to described second perform the second transaction contract.
Module in all embodiments of the invention, can be by universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, special IC) realizing.
All user nodes in the present invention are respectively provided with identical operation principle and structure.
Step in present invention method can carry out order adjustment according to actual needs, merge and delete.
Module in embodiment of the present invention device can be merged according to actual needs, divides and be deleted.
One of ordinary skill in the art will appreciate that all or part of flow process in realizing above-described embodiment method, can be Instruct related hardware to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Presently preferred embodiments of the present invention is the foregoing is only, not to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (10)

1. a kind of distributed cloud data managing method based on peer-to-peer network, the peer-to-peer network include multiple user nodes, its It is characterised by, the distributed cloud data managing method is applied to first user node, the distributed cloud data managing method Including:
Storage request is received, the storage is asked for first object data distribution formula to be stored the use into the peer-to-peer network Family node;
The first encryption key corresponding with the first object data is generated, the first encryption key includes the first public key and the One private key;
The first object data according to first public key encryption, obtain first object encryption data, and by first mesh Mark encryption data is divided at least one encrypted data chunk;
By the default meta-data index storage of metadata information write of the first object encryption data, the default metadata storage There is between area and the plurality of user node default communication connection relation;
The first storage contract corresponding with the first object encryption data is generated, and obtains signing the first storage contract The CAMEL-Subscription-Information of all second user nodes, the first storage contract are used to define the storage of the first object encryption data Require and store income;
By at least one encrypted data chunk distributed storage in all second user nodes, and by the first object The CAMEL-Subscription-Information of the store path of encrypted data chunk and the first storage contract writes the default meta-data index storage.
2. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution Formula cloud data managing method also includes:
Download request is received, the download request adds in the first object of the peer-to-peer network for downloading distributed storage Ciphertext data;
The store path of the first object encryption data write in reading the default meta-data index storage;
The first object encryption data pointed by the store path of the first object encrypted data chunk is downloaded, and will be downloaded Operation note writes the default meta-data index storage;
Obtain first private key;
The first object encryption data is decrypted by first private key.
3. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution Formula cloud data managing method also includes:
Removal request is received, the removal request adds in the first object of the peer-to-peer network for deleting distributed storage Ciphertext data;
The store path of the first object encrypted data chunk write in reading the default meta-data index storage;
The first object encryption data pointed by the store path of the first object encryption data is deleted, and behaviour will be deleted Note down and write the default meta-data index storage.
4. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution Formula cloud data managing method also includes:
Receive the first sharing request that the second user node sends, first sharing request for by distributed storage in The first object encryption data of the peer-to-peer network shares to the second user node;
If response first sharing request, obtains the second public key that the second user node sends;
Key is encrypted by described in second public key encryption first and the second user node is sent to;
The second sharing request is sent to the second user node, second sharing request is used to obtain the second user section Point distributed storage is in the second target encryption data of the peer-to-peer network;
If detecting the second user node responds second sharing request, the second target encryption data is downloaded;
Send first public key to the second user node, and obtain the second user node feeding back by described the Second encryption key of one public key encryption, the second encryption key include the second public key and the second private key;
The second encryption key is decrypted by first private key, and second target is decrypted according to second private key and added Ciphertext data.
5. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution Formula cloud data managing method also includes:
Receive the first transaction request that the second user node sends, first transaction request for by distributed storage in The first object encryption data of the peer-to-peer network is traded with the second user node as trading object;
If response first transaction request, the first transaction contract corresponding with the first object encryption data is generated, and The contract information of the described first transaction contract is write into the default meta-data index storage, the first transaction contract is used to define The terms of trade of the first object encryption data;
Obtain the second public key that the second user node sends;
Key is encrypted by described in second public key encryption first and the second user node is sent to;
To the second user node send the second transaction request, second transaction request for the second user node It is traded to obtain the second target encryption data;
If detecting the second user node responds second transaction request, the second target encryption data is downloaded;
Send first public key to the second user node, and obtain the second user node feeding back by described the Second encryption key of one public key encryption, the second encryption key include the second public key and the second private key;By described first Private key decryption the second encryption key, and the second target encryption data is decrypted by second private key;
The contract information of the second transaction contract is obtained from the default meta-data index storage, according to the described second transaction contract Contract information defined in terms of trade perform it is described second transaction contract.
6. a kind of distributed cloud data management system based on peer-to-peer network, the peer-to-peer network include multiple user nodes, its It is characterised by, the distributed cloud data management system is applied to first user node, the distributed cloud data management system Including:
Human-computer interaction module, for receive storage request, it is described storage request for by first object data distribution formula store to User node in the peer-to-peer network;
Key management module, for generating the first encryption key corresponding with the first object data, first encryption is secret Key includes the first public key and the first private key;
Data encrypting and deciphering module, for the first object data according to first public key encryption, obtains first object encryption Data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module, for the default metadata storage of metadata information write by the first object encryption data Area, has default communication connection relation between the default meta-data index storage and the plurality of user node;
Contract administration module, for generating the first storage contract corresponding with the first object encryption data, and obtains signing The CAMEL-Subscription-Information of all second user nodes of the first storage contract, the first storage contract are used to define described first The memory requirement and storage income of target encryption data;
Distributed Storage module, at least one encrypted data chunk distributed storage is used in described all second Family node, and the CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write into institute State default meta-data index storage.
7. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive download request, and the download request is used to download distributed storage in described right Deng the first object encryption data of network;
The first object encryption that the tadata memory module is write in being additionally operable to read the default meta-data index storage The store path of data;
The Distributed Storage module is additionally operable to download pointed by the store path of the first object encrypted data chunk The first object encryption data, and down operation record is write into the default meta-data index storage;
The key management module is additionally operable to obtain first private key;
The data encrypting and deciphering module is additionally operable to decrypt the first object encryption data by first private key.
8. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive removal request, and the removal request is used to delete distributed storage in described right Deng the first object encryption data of network;
The first object encryption that the tadata memory module is write in being additionally operable to read the default meta-data index storage The store path of data block;
The Distributed Storage module is additionally operable to delete the institute pointed by the store path of the first object encryption data First object encryption data is stated, and deletion action record is write into the default meta-data index storage.
9. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive the first sharing request that the second user node sends, and described first shares Ask to share to the second user section for the first object encryption data by distributed storage in the peer-to-peer network Point;
If the key management module is additionally operable to response first sharing request, obtain what the second user node sent Second public key;
The data encrypting and deciphering module is additionally operable to by the first encryption key described in second public key encryption and is sent to described Second user node;
The human-computer interaction module is additionally operable to send the second sharing request, second sharing request to the second user node The second target encryption data of the peer-to-peer network is stored in for obtaining the second user Node distribution formula;
If the Distributed Storage module is additionally operable to detect the second user node response second sharing request, The second target encryption data is downloaded then;
The key management module is additionally operable to send first public key to the second user node, and obtains second use Family node feeding back by first public key encryption second encryption key, it is described second encryption key include the second public key and Second private key;
The data encrypting and deciphering module is additionally operable to decrypt the second encryption key by first private key, and according to described the Two private keys decrypt the second target encryption data.
10. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive the first transaction request that the second user node sends, first transaction Ask for using distributed storage in the peer-to-peer network the first object encryption data as trading object and described Two user nodes are traded;
If the contract administration module is additionally operable to response first transaction request, generate and the first object encryption data Corresponding first transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage, institute The first transaction contract is stated for defining the terms of trade of the first object encryption data;
The key management module is additionally operable to obtain the second public key that the second user node sends;
The data encrypting and deciphering module is additionally operable to by the first encryption key described in second public key encryption and is sent to described Second user node;
The human-computer interaction module is additionally operable to send the second transaction request, second transaction request to the second user node For being traded to obtain the second target encryption data with the second user node;
If the Distributed Storage module is additionally operable to detect the second user node response second transaction request, The second target encryption data is downloaded then;
The key management module is additionally operable to send first public key to the second user node, and obtains second use Family node feeding back by first public key encryption second encryption key, it is described second encryption key include the second public key and Second private key;
The data encrypting and deciphering module is additionally operable to decrypt the second encryption key by first private key, and by described the Two private keys decrypt the second target encryption data;
The contract administration module is additionally operable to obtain the contract letter of the second transaction contract from the default meta-data index storage Breath, terms of trade defined in the contract information of contract of concluding the business according to described second perform the second transaction contract.
CN201611269919.6A 2016-12-30 2016-12-30 Distributed cloud data management method and system based on peer-to-peer network Active CN106612285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611269919.6A CN106612285B (en) 2016-12-30 2016-12-30 Distributed cloud data management method and system based on peer-to-peer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611269919.6A CN106612285B (en) 2016-12-30 2016-12-30 Distributed cloud data management method and system based on peer-to-peer network

Publications (2)

Publication Number Publication Date
CN106612285A true CN106612285A (en) 2017-05-03
CN106612285B CN106612285B (en) 2020-05-19

Family

ID=58636834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611269919.6A Active CN106612285B (en) 2016-12-30 2016-12-30 Distributed cloud data management method and system based on peer-to-peer network

Country Status (1)

Country Link
CN (1) CN106612285B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948253A (en) * 2017-11-10 2018-04-20 江苏通付盾科技有限公司 Decentralization date storage method and system, electronic equipment, storage medium
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108710643A (en) * 2018-04-20 2018-10-26 广东省科技基础条件平台中心 Data sharing method, device, computer equipment and storage medium
CN108718341A (en) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 Shared and search the method for data
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN109117096A (en) * 2018-09-03 2019-01-01 安徽太阳石科技有限公司 Distributed data storage method and system based on block chain
CN109241756A (en) * 2018-08-20 2019-01-18 深圳市腾讯网络信息技术有限公司 Data processing method, system, server and medium based on block chain
CN109271115A (en) * 2018-10-11 2019-01-25 重庆晨鲸科技有限公司 Store sharing method, device, block chain distributed network topology
CN109379184A (en) * 2018-09-28 2019-02-22 北京金山安全软件有限公司 Block chain private key storage method and device and electronic equipment
CN109492419A (en) * 2018-11-27 2019-03-19 众安信息技术服务有限公司 For obtaining the method, apparatus and storage medium of the data in block chain
CN109618190A (en) * 2018-12-07 2019-04-12 深圳市云歌人工智能技术有限公司 Based on the method, apparatus and storage medium for promoting video setting and acquisition reward
CN109862119A (en) * 2019-03-15 2019-06-07 深圳市网心科技有限公司 Memory capacity sharing method, device, service server, user terminal and system
CN109995715A (en) * 2017-12-29 2019-07-09 百度在线网络技术(北京)有限公司 Private data encipher-decipher method, device, equipment and the storage medium of block chain
CN110990407A (en) * 2018-04-27 2020-04-10 腾讯科技(深圳)有限公司 Block chain based data storage method and device, server and storage medium
CN111382458A (en) * 2018-12-28 2020-07-07 富泰华工业(深圳)有限公司 Data batch sealing method and device and computer storage medium
CN112291356A (en) * 2020-11-02 2021-01-29 大连理工大学 Self-verification variable name distributed storage method based on CNFS protocol
CN113157207A (en) * 2021-04-07 2021-07-23 橙色云互联网设计有限公司 Data processing method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192924A (en) * 2006-11-24 2008-06-04 北京大学 P2P storage system coding method based on Reed-Solomon code
CN101605148A (en) * 2009-05-21 2009-12-16 何吴迪 The framework method of the parallel system of cloud storage
CN103034814A (en) * 2012-12-11 2013-04-10 浙江大学 Data access method
CN103442057A (en) * 2013-08-27 2013-12-11 玉林师范学院 Cloud storage system based on user collaboration cloud

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192924A (en) * 2006-11-24 2008-06-04 北京大学 P2P storage system coding method based on Reed-Solomon code
CN101605148A (en) * 2009-05-21 2009-12-16 何吴迪 The framework method of the parallel system of cloud storage
CN103034814A (en) * 2012-12-11 2013-04-10 浙江大学 Data access method
CN103442057A (en) * 2013-08-27 2013-12-11 玉林师范学院 Cloud storage system based on user collaboration cloud

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948253A (en) * 2017-11-10 2018-04-20 江苏通付盾科技有限公司 Decentralization date storage method and system, electronic equipment, storage medium
CN107948253B (en) * 2017-11-10 2021-03-02 江苏通付盾科技有限公司 Decentralized data storage method and system, electronic device and storage medium
CN109995715A (en) * 2017-12-29 2019-07-09 百度在线网络技术(北京)有限公司 Private data encipher-decipher method, device, equipment and the storage medium of block chain
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108710643A (en) * 2018-04-20 2018-10-26 广东省科技基础条件平台中心 Data sharing method, device, computer equipment and storage medium
CN108710643B (en) * 2018-04-20 2020-11-24 广东省科技基础条件平台中心 Data sharing method and device, computer equipment and storage medium
CN110990407B (en) * 2018-04-27 2020-11-10 腾讯科技(深圳)有限公司 Block chain based data storage method and device, server and storage medium
CN110990407A (en) * 2018-04-27 2020-04-10 腾讯科技(深圳)有限公司 Block chain based data storage method and device, server and storage medium
CN108718341A (en) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 Shared and search the method for data
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN108854077B (en) * 2018-07-17 2021-05-18 广州瞪羚信息科技有限公司 Cross-game item circulation method based on block chain technology
CN109241756A (en) * 2018-08-20 2019-01-18 深圳市腾讯网络信息技术有限公司 Data processing method, system, server and medium based on block chain
CN109117096B (en) * 2018-09-03 2020-04-21 安徽太阳石科技有限公司 Block chain based distributed data storage method and system
CN109117096A (en) * 2018-09-03 2019-01-01 安徽太阳石科技有限公司 Distributed data storage method and system based on block chain
CN109379184A (en) * 2018-09-28 2019-02-22 北京金山安全软件有限公司 Block chain private key storage method and device and electronic equipment
CN109271115B (en) * 2018-10-11 2021-07-30 重庆晨鲸科技有限公司 Storage sharing method and device and block chain distributed network topology
CN109271115A (en) * 2018-10-11 2019-01-25 重庆晨鲸科技有限公司 Store sharing method, device, block chain distributed network topology
CN109492419A (en) * 2018-11-27 2019-03-19 众安信息技术服务有限公司 For obtaining the method, apparatus and storage medium of the data in block chain
CN109492419B (en) * 2018-11-27 2022-07-01 众安信息技术服务有限公司 Method, device and storage medium for acquiring data in block chain
CN109618190A (en) * 2018-12-07 2019-04-12 深圳市云歌人工智能技术有限公司 Based on the method, apparatus and storage medium for promoting video setting and acquisition reward
CN111382458A (en) * 2018-12-28 2020-07-07 富泰华工业(深圳)有限公司 Data batch sealing method and device and computer storage medium
CN109862119A (en) * 2019-03-15 2019-06-07 深圳市网心科技有限公司 Memory capacity sharing method, device, service server, user terminal and system
CN112291356A (en) * 2020-11-02 2021-01-29 大连理工大学 Self-verification variable name distributed storage method based on CNFS protocol
CN112291356B (en) * 2020-11-02 2022-01-04 大连理工大学 Self-verification variable name distributed storage method based on CNFS protocol
CN113157207B (en) * 2021-04-07 2022-03-08 橙色云互联网设计有限公司 Data processing method, device and storage medium
CN113157207A (en) * 2021-04-07 2021-07-23 橙色云互联网设计有限公司 Data processing method, device and storage medium

Also Published As

Publication number Publication date
CN106612285B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN106612285A (en) Distributed cloud data management method and system based on peer-to-peer network
CN105453105B (en) System and method for cloud data safety
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
CN110210246B (en) Personal data service method and system based on safety calculation
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
US10140460B2 (en) File storage system and user terminal
WO2018218953A1 (en) Data backup method and device, storage medium and server
CN104270517A (en) Information encryption method and mobile terminal
CN105635131B (en) Transmit data method, device and server
CN111475832B (en) Data management method and related device
KR20210046357A (en) Method and apparatus for key storing and recovery for blockchain based system
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
CN112073444B (en) Data set processing method and device and server
CN108400868A (en) Storage method, device and the mobile terminal of seed key
CN110474764B (en) Ciphertext data set intersection calculation method, device, system, client, server and medium
CN114240347A (en) Business service secure docking method and device, computer equipment and storage medium
CN103379133A (en) Safe and reliable cloud storage system
KR20160040399A (en) Personal Information Management System and Personal Information Management Method
JP6272546B2 (en) Data storage device, data processing method, and data processing program
CN112069525A (en) Encryption method, device and equipment for generating key based on attribute of information
CN101527013B (en) Method, terminal and system of data cooperation
CN110598427A (en) Data processing method, system and storage medium
CN112947834A (en) Information input method and device and electronic equipment
US20110288976A1 (en) Total computer security
CN114978620B (en) Encryption method and decryption method for identity identification number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant