CN108400966B - File access method and equipment based on aging control and storage equipment - Google Patents
File access method and equipment based on aging control and storage equipment Download PDFInfo
- Publication number
- CN108400966B CN108400966B CN201810008832.6A CN201810008832A CN108400966B CN 108400966 B CN108400966 B CN 108400966B CN 201810008832 A CN201810008832 A CN 201810008832A CN 108400966 B CN108400966 B CN 108400966B
- Authority
- CN
- China
- Prior art keywords
- file
- key
- sub
- aging control
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000032683 aging Effects 0.000 title claims abstract description 51
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000011217 control strategy Methods 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001550 time effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810008832.6A CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810008832.6A CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108400966A CN108400966A (en) | 2018-08-14 |
CN108400966B true CN108400966B (en) | 2020-08-07 |
Family
ID=63093806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810008832.6A Active CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108400966B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11132452B2 (en) * | 2018-11-15 | 2021-09-28 | International Business Machines Corporation | Data-encryption-based purpose-specific access control |
CN110289955A (en) * | 2019-06-25 | 2019-09-27 | 杭州趣链科技有限公司 | A kind of key management method for serving certificate agency based on threshold cryptography model |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103607273A (en) * | 2013-07-18 | 2014-02-26 | 焦点科技股份有限公司 | Data file encryption and decryption method based on time limit control |
CN103839011A (en) * | 2014-03-11 | 2014-06-04 | 福建伊时代信息科技股份有限公司 | Protecting method and device of confidential files |
CN105335666A (en) * | 2015-09-30 | 2016-02-17 | 四川效率源信息安全技术股份有限公司 | Method for preventing electronic document from being leaked |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI499931B (en) * | 2013-12-17 | 2015-09-11 | Inwellcom Technology Corp | File management system and method |
-
2018
- 2018-01-04 CN CN201810008832.6A patent/CN108400966B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103607273A (en) * | 2013-07-18 | 2014-02-26 | 焦点科技股份有限公司 | Data file encryption and decryption method based on time limit control |
CN103839011A (en) * | 2014-03-11 | 2014-06-04 | 福建伊时代信息科技股份有限公司 | Protecting method and device of confidential files |
CN105335666A (en) * | 2015-09-30 | 2016-02-17 | 四川效率源信息安全技术股份有限公司 | Method for preventing electronic document from being leaked |
Also Published As
Publication number | Publication date |
---|---|
CN108400966A (en) | 2018-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qiu et al. | All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives | |
Cheng et al. | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage | |
US10671748B2 (en) | Secrets as a service | |
CN103268456A (en) | Method and device for file safety control | |
Thilakanathan et al. | Secure and controlled sharing of data in distributed computing | |
CN108400966B (en) | File access method and equipment based on aging control and storage equipment | |
Bokhari et al. | Evaluation of hybrid encryption technique to secure data during transmission in cloud computing | |
Pavani et al. | Data Security and Privacy Issues in Cloud Environment | |
JP2008242665A (en) | Encryption processing device, encryption processing method and file dividing and storing system | |
WO2015045512A1 (en) | Data encryption device, data encryption program, and data encryption method | |
Regade et al. | Survey on secure file storage on cloud using hybrid cryptography | |
Bhagawat et al. | Survey on data security issues in cloud environment | |
Pandi | A Simplified Policy Modification Framework By External provider For Human Medical Record Sharing | |
Al-Attab et al. | Hybrid data encryption technique for data security in cloud computing | |
Anitha et al. | Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments | |
Ke et al. | Cross-group secret sharing for secure cloud storage service | |
Apostol et al. | A survey on privacy enhancements for massively scalable storage systems in public cloud environments | |
Jaikar et al. | Secure data distribution using secret splitting over cloud | |
Balaji et al. | ESCET: Enhanced Symmetric Convergent Encryption Technique To Provide Secured Deduplicated Data In Public Cloud Storage | |
Kopacz et al. | Cloud Computing Security and Future | |
Singla et al. | Implementing Cloud Data Security by Encryption using Rijndael Algorithm | |
Yakushin et al. | Socio-humanitarian and technical aspects of the protection of information | |
Narang et al. | Different encryption algorithms in cloud | |
Bhadrappa et al. | Implementation of De-Duplication Algorithm | |
Myint et al. | Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Song Jun Inventor after: Yang Fan Inventor after: Gao Kun Inventor after: Xu Heng Inventor after: Hu Yutao Inventor before: Wang Lizhe Inventor before: Song Jun Inventor before: Yang Fan Inventor before: Gao Kun Inventor before: Xu Heng Inventor before: Hu Yutao |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220414 Address after: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY) |
|
TR01 | Transfer of patent right | ||
CP02 | Change in the address of a patent holder |
Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Address before: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. |
|
CP02 | Change in the address of a patent holder | ||
CP03 | Change of name, title or address |
Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee after: Guangzhou Keo Information Technology Co.,Ltd. Country or region after: China Address before: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Country or region before: China |
|
CP03 | Change of name, title or address |