CN108400966B - File access method and equipment based on aging control and storage equipment - Google Patents

File access method and equipment based on aging control and storage equipment Download PDF

Info

Publication number
CN108400966B
CN108400966B CN201810008832.6A CN201810008832A CN108400966B CN 108400966 B CN108400966 B CN 108400966B CN 201810008832 A CN201810008832 A CN 201810008832A CN 108400966 B CN108400966 B CN 108400966B
Authority
CN
China
Prior art keywords
file
key
sub
aging control
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810008832.6A
Other languages
Chinese (zh)
Other versions
CN108400966A (en
Inventor
宋军
杨帆
高坤
徐衡
胡雨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Keo Information Technology Co ltd
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201810008832.6A priority Critical patent/CN108400966B/en
Publication of CN108400966A publication Critical patent/CN108400966A/en
Application granted granted Critical
Publication of CN108400966B publication Critical patent/CN108400966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a file access method, equipment and storage equipment based on aging control, aiming at the problem that private files cannot be effectively protected, the invention designs two file use modes based on aging control, one mode is based on file use time control, so that files can only be used in a specified time; the other is a mode based on file use frequency control, so that the file can only be used within a set upper limit of the file use frequency, and once the use time or the upper limit of the use frequency is exceeded, the file can be destroyed. A file access device and a storage device based on aging control are used for realizing a file access method based on aging control. The invention effectively solves the problem of file leakage on public PC equipment through aging control, effectively protects the copy of the confidential file, and has practicability, high efficiency, flexibility and expandability.

Description

File access method and equipment based on aging control and storage equipment
Technical Field
The invention relates to the field of information security in computer science, in particular to a file access method, file access equipment and file storage equipment based on time effect control.
Background
In recent years, the problem of internal document leakage in departments such as enterprises and governments is very serious, and great loss is brought to relevant enterprises, governments and the like. The root of the problem is that the precautionary measures of the confidential documents are not in place and are stolen and revealed by internal personnel. The use of confidential documents is often involved in the conference, but the flow of people in the conference is large, the number of documents is large, and the effective protection of the confidential documents is difficult.
In many academic conferences, slide presenter must use mobile device to copy slides or other files to public PC device for presentation, and malicious person often takes many ways to obtain original file, even if user encrypts file, malicious person can still crack it to obtain information. How to protect the security document on the public PC device from leakage is a problem worthy of study.
Disclosure of Invention
In order to solve the above problems, the present invention provides a file access method, device and storage device based on aging control, and the file access method based on aging control mainly includes the following steps:
step 1: the server side selects a file which needs to be accessed by aging control;
step 2: the client selects an aging control mode when accessing the file;
and step 3: according to different aging control modes, carrying out operations including encryption and decryption on the file;
and 4, step 4: the client accesses the file;
and 5: and the client side detects that the file is used up, and destroys the file.
Further, the aging control mode comprises two modes of controlling based on the file use time and controlling based on the file use times.
Further, the aging control mode based on the file use time control comprises the following steps:
step 3-1: the server sets a key for the file, and carries out encryption operation;
step 3-2: the server side takes the key as a shared key, and sets the total n of the sub-keys and a threshold t;
step 3-3: according to the total n of the sub-keys and a threshold t, the server splits the shared key to obtain n sub-keys;
step 3-4: according to a consistent Hash algorithm, the server side distributes the n sub-keys to the client side, and sets a sub-key updating period;
step 3-5: the client downloads the file;
step 3-6: the client sends information of requesting the subkey to other clients;
step 3-7: the client collects the received sub-keys and stores the sub-keys in a local system;
step 3-8: the client sends the stored sub-keys to the server, judges whether the sub-keys are contained in the sub-keys stored by the server, and if yes, goes to step 3-9; if not, go to step 3-10;
step 3-9: the sub-key stored by the server side is not updated, and the server side sends information agreeing to reconstruct the shared key to the step 3-11;
step 3-10: the sub-secret key stored by the server side is updated, the file is inaccessible, and the server side sends information for refusing to reconstruct the shared secret key;
step 3-11: judging whether the number of the obtained sub-keys is smaller than a set threshold t, if so, returning to the step 3-6, otherwise, returning to the step 3-12;
step 3-12: and the client side obtains the key of the file according to the reconstruction of the shared key and decrypts the file.
Further, the aging control mode based on the file use frequency control comprises the following steps:
step 4-1: the server sets a key and the upper limit of the using times of the file on the file;
step 4-2: the server side sets an access control strategy;
step 4-3: the server side encrypts the file through AES;
step 4-4: the server side encrypts the key and the file using time upper limit to obtain a key ciphertext;
and 4-5: the client sends a request to the server to obtain the key ciphertext;
and 4-6: the client decrypts according to the key ciphertext to obtain the key and the upper limit of the using times of the file;
and 4-7: the server side stores the key and a key ciphertext obtained by encrypting the file use times again into a local system;
and 4-8: the client sends a request to the server to obtain the used times of the key;
and 4-9: judging whether the used times of the secret key is smaller than the set upper limit of the file use times, if so, going to step 4-10; if not, go to step 4-11;
step 4-10: the client decrypts the file according to the key and sends a message to the server to enable a key counter in the server to add 1;
and 4-11: and the client destroys the key.
Further, the periodic updating of the file key is realized by adopting a key sharing algorithm and a consistent hash algorithm and combining a one-way hash chain, so that the file can be used only between the last key updating and the next key updating.
Further, the method for updating the subkey comprises the following steps: and when the user is newly added or reduced, the object to be changed is mapped to the new storage node again according to the newly added or reduced storage nodes.
Further, if the file use time exceeds the preset time, the system background sends a message to command to update all the stored subkeys.
Further, after the key and the file usage times are used up each time, the key and the file usage times need to be encrypted again and stored in the local file system.
A storage device stores instructions and data for implementing a file access method based on aging control.
A file access device based on aging control, comprising: a processor and the storage device; the processor loads and executes the instructions and data in the storage device to realize a file access method based on aging control.
The technical scheme provided by the invention has the beneficial effects that: through the aging control, the problem that the file is leaked on the public PC equipment is effectively solved, the copy of the confidential file is effectively protected, and the method has practicability, high efficiency, flexibility and expandability.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flowchart of a file access method based on aging control according to an embodiment of the present invention;
FIG. 2 is a flowchart of an aging control method based on file usage time control according to an embodiment of the present invention;
FIG. 3 is a flowchart of an aging control method based on file usage number control according to an embodiment of the present invention;
fig. 4 is a schematic diagram of the operation of the hardware device in the embodiment of the present invention.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
The embodiment of the invention provides a file access method, equipment and storage equipment based on aging control, wherein the file access method based on aging control effectively solves the problem that a file is leaked on public PC equipment through the aging control of file access, and effectively protects a copy of a confidential file; a device for ensuring the safety of electronic files and a storage device are used for realizing a file access method based on time efficiency control.
Referring to fig. 1, fig. 1 is a flowchart of a file access method based on aging control according to an embodiment of the present invention, including the following steps:
s101: the server side selects a file which needs to be accessed by aging control;
s102: the client selects an aging control mode when accessing the file; the aging control mode comprises two modes of controlling based on the file use time and controlling based on the file use times
S103: according to different aging control modes, carrying out operations including encryption and decryption on the file;
s104: the client accesses the file;
s105: and the client side detects that the file is used up, and destroys the file.
Referring to fig. 2, fig. 2 is a flowchart of an aging control method based on file usage time control in an embodiment of the present invention, which specifically includes the following steps:
s201: the server sets a key for the file, and carries out encryption operation;
s202: the server side takes the key as a shared key, and sets the total n of the sub-keys and a threshold t;
s203: splitting the shared key by the server side according to the set total n of the sub-keys and the threshold t to obtain n sub-keys;
s204: according to a consistent Hash algorithm, the server side distributes the n sub-keys to the client side, and sets a sub-key updating period;
s205: the client downloads the file;
s206: the client sends information of requesting the subkey to other clients;
s207: the client collects the received sub-keys and stores the sub-keys in a local system;
s208: the client sends the stored sub-key to the server, judges whether the sub-key is included in the sub-key stored in the server, if yes, goes to step S209; if not, go to step S210;
s209: the sub-key stored by the server side is not updated, and the server side sends information agreeing to reconstruct the shared key to step S211;
s210: the secret key stored by the server side is updated, the file is inaccessible, and the server side sends information for refusing to reconstruct the shared secret key; the periodic updating of the file key adopts a key sharing algorithm and a consistent hash algorithm and combines a one-way hash chain, so that the file can be used only between the last key updating and the next key updating; the method for updating the subkey comprises the following steps: taking users who have the authority to use the files on line as storage nodes, and when users are newly added or reduced, remapping objects needing to be changed to the new storage nodes according to the newly added or reduced storage nodes; if the file use time exceeds the preset time, the system background sends information to order to update all the stored sub-keys;
s211: judging whether the number of the obtained sub-keys is smaller than a set threshold t, if so, returning to the step S206, otherwise, returning to the step S212;
s212: and the client side obtains the key of the file according to the reconstruction of the shared key and decrypts the file.
Referring to fig. 3, fig. 3 is a flowchart of an aging control method based on file usage number control in an embodiment of the present invention, which specifically includes the following steps:
s301: the server sets a key and the upper limit of the using times of the file on the file;
s302: the server side sets an access control strategy;
s303: the server side encrypts the file through AES;
s304: the server side encrypts the key and the file using time upper limit to obtain a key ciphertext;
s305: the client sends a request to the server to obtain the key ciphertext;
s306: the client decrypts according to the key ciphertext to obtain the key and the upper limit of the using times of the file;
s307: the server side stores the key and a key ciphertext obtained by encrypting the file use times again into a local system;
s308: the client sends a request to the server to obtain the used times of the key;
s309: judging whether the used times of the key is smaller than a set upper limit of the file use times, if so, going to step S310; if not, go to step S311;
s310: the client decrypts the file according to the key and sends a message to the server to enable a key counter in the server to add 1; after the key and the file use times are used each time, the key and the file use times are required to be encrypted again and stored in a local file system;
s311: and the client destroys the key.
Referring to fig. 4, fig. 4 is a schematic diagram of a hardware device according to an embodiment of the present invention, where the hardware device specifically includes: a secure electronic document security device 401, a processor 402 and a storage device 403.
A secure electronic document security device 401: the file access method based on aging control is realized by the electronic file security device 401.
The processor 402: the processor 402 loads and executes the instructions and data in the storage device 403 to implement the aging control-based file access method.
The storage device 403: the storage device 403 stores instructions and data; the storage device 403 is used to implement the file access method based on aging control.
The invention has the beneficial effects that: through the aging control, the problem that the file is leaked on the public PC equipment is effectively solved, the copy of the confidential file is effectively protected, and the method has practicability, high efficiency, flexibility and expandability.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A file access method based on aging control is characterized in that: the method comprises the following steps:
step 1: the server side selects a file which needs to be accessed by aging control;
step 2: the client selects an aging control mode when accessing the file;
and step 3: according to different aging control modes, carrying out operations including encryption and decryption on the file;
the aging control mode comprises two modes of controlling based on the file use time and controlling based on the file use times;
the aging control mode based on the file use time control comprises the following steps:
step 3-1: the server sets a key for the file, and carries out encryption operation;
step 3-2: the server side takes the key as a shared key, and sets the total n of the sub-keys and a threshold t;
step 3-3: according to the total n of the sub-keys and a threshold t, the server splits the shared key to obtain n sub-keys;
step 3-4: according to a consistent Hash algorithm, the server side distributes the n sub-keys to the client side, and sets a sub-key updating period;
step 3-5: the client downloads the file;
step 3-6: the client sends information of requesting the subkey to other clients;
step 3-7: the client collects the received sub-keys and stores the sub-keys in a local system;
step 3-8: the client sends the stored sub-keys to the server, judges whether the sub-keys are contained in the sub-keys stored by the server, and if yes, goes to step 3-9; if not, go to step 3-10;
step 3-9: the sub-key stored by the server side is not updated, and the server side sends information agreeing to reconstruct the shared key to the step 3-11;
step 3-10: the sub-secret key stored by the server side is updated, the file is inaccessible, and the server side sends information for refusing to reconstruct the shared secret key;
step 3-11: judging whether the number of the obtained sub-keys is smaller than a set threshold t, if so, returning to the step 3-6, otherwise, returning to the step 3-12;
step 3-12: the client side obtains the key of the file according to the reconstruction of the shared key, and decrypts the file;
and 4, step 4: the client accesses the file;
and 5: and the client side detects that the file is used up, and destroys the file.
2. The file access method based on aging control as claimed in claim 1, wherein: the aging control mode based on file use frequency control comprises the following steps:
step 4-1: the server sets a key and the upper limit of the using times of the file on the file;
step 4-2: the server side sets an access control strategy;
step 4-3: the server side encrypts the file through AES;
step 4-4: the server side encrypts the key and the file using time upper limit to obtain a key ciphertext;
and 4-5: the client sends a request to the server to obtain the key ciphertext;
and 4-6: the client decrypts according to the key ciphertext to obtain the key and the upper limit of the using times of the file;
and 4-7: the server side stores the key and a key ciphertext obtained by encrypting the file use times again into a local system;
and 4-8: the client sends a request to the server to obtain the used times of the key;
and 4-9: judging whether the used times of the secret key is smaller than the set upper limit of the file use times, if so, going to step 4-10; if not, go to step 4-11;
step 4-10: the client decrypts the file according to the key and sends a message to the server to enable a key counter in the server to add 1;
and 4-11: and the client destroys the key.
3. The file access method based on aging control as claimed in claim 1, wherein: the periodic updating of the file key adopts a key sharing algorithm and a consistent hash algorithm and combines a one-way hash chain, so that the file can be used only between the last key updating and the next key updating.
4. The file access method based on aging control as claimed in claim 1, wherein: the method for updating the subkey comprises the following steps: and when the user is newly added or reduced, the object to be changed is mapped to the new storage node again according to the newly added or reduced storage nodes.
5. The file access method based on aging control as claimed in claim 1, wherein: and if the file use time exceeds the preset time, the system background sends information to command to update all the stored sub-keys.
6. The file access method based on aging control as claimed in claim 2, wherein: and after the key and the file use times are used each time, encrypting and storing the key and the file use times into a local file system again.
7. A storage device, characterized by: the storage device stores instructions and data executed by a processor for implementing the file access method based on aging control according to any one of claims 1 to 6.
8. A file access device based on aging control, characterized by: the method comprises the following steps: a processor and a storage device;
the processor loads and executes the instructions and data in the storage device to realize the file access method based on the aging control as claimed in any one of claims 1 to 6.
CN201810008832.6A 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment Active CN108400966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810008832.6A CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810008832.6A CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Publications (2)

Publication Number Publication Date
CN108400966A CN108400966A (en) 2018-08-14
CN108400966B true CN108400966B (en) 2020-08-07

Family

ID=63093806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810008832.6A Active CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Country Status (1)

Country Link
CN (1) CN108400966B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11132452B2 (en) * 2018-11-15 2021-09-28 International Business Machines Corporation Data-encryption-based purpose-specific access control
CN110289955A (en) * 2019-06-25 2019-09-27 杭州趣链科技有限公司 A kind of key management method for serving certificate agency based on threshold cryptography model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
CN105335666A (en) * 2015-09-30 2016-02-17 四川效率源信息安全技术股份有限公司 Method for preventing electronic document from being leaked

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI499931B (en) * 2013-12-17 2015-09-11 Inwellcom Technology Corp File management system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
CN105335666A (en) * 2015-09-30 2016-02-17 四川效率源信息安全技术股份有限公司 Method for preventing electronic document from being leaked

Also Published As

Publication number Publication date
CN108400966A (en) 2018-08-14

Similar Documents

Publication Publication Date Title
Qiu et al. All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Cheng et al. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
US10671748B2 (en) Secrets as a service
CN103268456A (en) Method and device for file safety control
Thilakanathan et al. Secure and controlled sharing of data in distributed computing
CN108400966B (en) File access method and equipment based on aging control and storage equipment
Bokhari et al. Evaluation of hybrid encryption technique to secure data during transmission in cloud computing
Pavani et al. Data Security and Privacy Issues in Cloud Environment
JP2008242665A (en) Encryption processing device, encryption processing method and file dividing and storing system
WO2015045512A1 (en) Data encryption device, data encryption program, and data encryption method
Regade et al. Survey on secure file storage on cloud using hybrid cryptography
Bhagawat et al. Survey on data security issues in cloud environment
Pandi A Simplified Policy Modification Framework By External provider For Human Medical Record Sharing
Al-Attab et al. Hybrid data encryption technique for data security in cloud computing
Anitha et al. Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments
Ke et al. Cross-group secret sharing for secure cloud storage service
Apostol et al. A survey on privacy enhancements for massively scalable storage systems in public cloud environments
Jaikar et al. Secure data distribution using secret splitting over cloud
Balaji et al. ESCET: Enhanced Symmetric Convergent Encryption Technique To Provide Secured Deduplicated Data In Public Cloud Storage
Kopacz et al. Cloud Computing Security and Future
Singla et al. Implementing Cloud Data Security by Encryption using Rijndael Algorithm
Yakushin et al. Socio-humanitarian and technical aspects of the protection of information
Narang et al. Different encryption algorithms in cloud
Bhadrappa et al. Implementation of De-Duplication Algorithm
Myint et al. Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Song Jun

Inventor after: Yang Fan

Inventor after: Gao Kun

Inventor after: Xu Heng

Inventor after: Hu Yutao

Inventor before: Wang Lizhe

Inventor before: Song Jun

Inventor before: Yang Fan

Inventor before: Gao Kun

Inventor before: Xu Heng

Inventor before: Hu Yutao

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220414

Address after: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong

Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan

Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY)

TR01 Transfer of patent right
CP02 Change in the address of a patent holder

Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong

Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder
CP03 Change of name, title or address

Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee after: Guangzhou Keo Information Technology Co.,Ltd.

Country or region after: China

Address before: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address