CN117555484A - Multi-channel data destruction method and system based on strong encryption - Google Patents

Multi-channel data destruction method and system based on strong encryption Download PDF

Info

Publication number
CN117555484A
CN117555484A CN202311573099.XA CN202311573099A CN117555484A CN 117555484 A CN117555484 A CN 117555484A CN 202311573099 A CN202311573099 A CN 202311573099A CN 117555484 A CN117555484 A CN 117555484A
Authority
CN
China
Prior art keywords
data
encryption
disk
strong
magnetic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311573099.XA
Other languages
Chinese (zh)
Inventor
周建荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ronghe Technology Co ltd
Original Assignee
Shenzhen Ronghe Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ronghe Technology Co ltd filed Critical Shenzhen Ronghe Technology Co ltd
Priority to CN202311573099.XA priority Critical patent/CN117555484A/en
Publication of CN117555484A publication Critical patent/CN117555484A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0689Disk arrays, e.g. RAID, JBOD

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a multi-channel data destruction method based on strong encryption, which comprises the following steps: detecting data to be destroyed, which accords with a data destruction request, in a magnetic disk; selecting an encryption method and encryption times of data to be destroyed, and performing strong data encryption on the data to be destroyed by using the encryption method and the encryption times to obtain strong encryption data; carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk for destroying the data, carrying out magnetic disk degaussing treatment on the magnetic disk for destroying the data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk; changing the position of the encryption key and the strong encryption data in the first demagnetizing disk, and performing disk demagnetizing treatment on the disk at the changed position to obtain a second demagnetizing disk; and when the encryption key and the strong encryption data do not exist in the second degaussing magnetic disk, taking the second degaussing magnetic disk as a data destruction result of the data to be destroyed. The invention can completely ensure that the data is completely destroyed.

Description

Multi-channel data destruction method and system based on strong encryption
Technical Field
The invention relates to the field of data destruction, in particular to a multichannel data destruction method and system based on strong encryption.
Background
With the increasing popularity of computers and mobile digital devices, the security problem that whether data such as photos, videos, music and the like stored in the computers and the mobile digital devices are completely deleted and irrecoverable has become an important point of attention, the data destruction is a process of completely and irreversibly deleting the data from the digital storage devices (including computer hard disks, USB flash drives, CDs, mobile devices and the like), the primary goal of the data destruction is to ensure that the data stored before is irrecoverable, reduce the network security risk, improve the digital security, only delete the data which is usually still recoverable, and the data destruction further, irreversibly eliminates the data, and in the daily use process, the methods of deleting, formatting the hard disks, pulverizing the files and the like are often adopted for data destruction.
At present, the destroying method of the prior art is realized through electromagnetic destroying, however, parts, such as edges, which are not involved in electromagnetic destroying exist, so that the electromagnetism existing in the parts can keep data, the data can not be destroyed completely, and later, the prior art adopts a mode of covering first and then destroying, and the professional spy technology can recover the destroyed data covered for more than 6 times. Therefore, even if electromagnetic destruction is used after coverage, the complete destruction of data cannot be completely guaranteed.
Disclosure of Invention
In order to solve the problems, the invention provides a multi-channel data destruction method and a system based on strong encryption, which can completely ensure that data is thoroughly destroyed.
In a first aspect, the present invention provides a multi-channel data destruction method based on strong encryption, including the following steps:
after receiving a data destruction request sent by a user, detecting data to be destroyed, which accords with the data destruction request, in a magnetic disk;
selecting an encryption method and encryption times of the data to be destroyed, and performing data strong encryption on the data to be destroyed by utilizing the encryption method and the encryption times to obtain strong encrypted data;
carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk for destroying the data, carrying out magnetic disk degaussing treatment on the magnetic disk for destroying the data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk;
when the encryption key and the strong encryption data exist in the first demagnetizing disk, changing positions of the encryption key and the strong encryption data in the first demagnetizing disk to obtain a disk with a changed position, performing disk demagnetizing treatment on the disk with the changed position to obtain a second demagnetizing disk, and detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk;
Returning to the step S4 described above when the encryption key and the strong encrypted data are present in the second demagnetized disk;
and when the encryption key and the strong encryption data are not present in the second demagnetizing disk, taking the second demagnetizing disk as a data destruction result of the data to be destroyed.
In one embodiment, the detecting data to be destroyed in the disk, which meets the data destruction request, includes:
inquiring first target destroying data of the data destroying request, and inquiring non-target destroying data except the target destroying data in the disk;
after the first target destroying data is pre-deleted from the magnetic disk, identifying second target destroying data which changes in the non-target destroying data;
and taking the first target destroying data and the second target destroying data as the data to be destroyed.
In one embodiment, the selecting the encryption method and the encryption times of the data to be destroyed includes:
identifying the character composition of the data to be destroyed;
screening an initial encryption algorithm capable of encrypting the characters;
When the initial encryption algorithm meets a preset single insolubility, taking the initial encryption algorithm as the encryption method;
and determining the encryption times of the data to be destroyed based on the character composition of the encryption method.
In one embodiment, the performing data strong encryption on the data to be destroyed by using the encryption method and the encryption times to obtain strong encrypted data includes:
performing first data strong encryption on the data to be destroyed by using the encryption method to obtain first strong encryption data;
performing second data strong encryption on the first strong encryption data based on the encryption times to obtain second strong encryption data;
-taking said second strong encryption data as said strong encryption data;
the encryption method comprises the following steps:
the data to be destroyed is subjected to data sequence scrambling by using the following formula, so as to obtain scrambling sequence data:
(y 1 ,y 2 ,…,y n )=PRF(x 1 ,x 2 ,...,x n ,α)
wherein (y) 1 ,y 2 ,...,y n ) Representing the scrambled data, PRF representing a pseudo-random generating function, x 1 ,x 2 ,...,x n Representing the data to be destroyed, n represents the total number of the data to be destroyed, and alpha represents a randomly generated secret key;
and carrying out data fusion on the disordered data by using the following formula to obtain fusion data:
Wherein, (z) 1 ,z 2 ,…,z n ) Representing the fused data, (y) 1 ,y 2 ,...,y n ) Representing the scrambling sequence data, i representing the sequence number of the scrambling sequence data, and alpha representing a randomly generated key;
randomly generating an encryption key of the fusion data;
based on the encryption key, performing first data strong encryption on the fusion data by using the following formula to obtain the first strong encrypted data:
k=S[(z 1 ,z 2 ,…,z n ),(β)]
wherein k represents the first strongly encrypted data, S represents an asymmetric encryption algorithm, (z) 1 ,z 2 ,…,z n ) Representing the fused data, and β representing the encryption key.
In one embodiment, the method further includes destroying the data in the disk by using the strong encryption data and an encryption key of the strong encryption data to obtain a disk of destroyed data, and includes:
obtaining a disk sample;
constructing a data destruction magnetic field sample of the magnetic disk sample;
calculating the magnetic induction coercivity of the magnetic disk sample in the data destruction magnetic field sample by using the following formula:
wherein H represents magnetic induction coercive force, A represents magnetic induction intensity of a magnetic disk sample under the data destruction magnetic field sample, mu represents magnetic permeability in vacuum, and M represents magnetization intensity;
when the magnetic induction coercive force is smaller than the magnetic force of the data destruction magnetic field sample, the data destruction magnetic field sample degree is utilized to destroy the data of the strong encryption data and the encryption key of the strong encryption data, and a magnetic disk for destroying the data is obtained.
In one embodiment, the detecting whether the encryption key and the strong encryption data are present in the first demagnetized disk comprises:
collecting magnetic force of a magnetic disk at each position on the first demagnetizing magnetic disk;
calculating the magnetic force characteristics of each magnetic force of the magnetic disks by using the following formula:
wherein,the magnetic force characteristic is represented by u, v, c, and ∈n, u represents a unit vector in the front-back direction in the three-dimensional coordinate system, v represents a unit vector in the left-right direction in the three-dimensional coordinate system, c represents a unit vector in the vertical direction in the three-dimensional coordinate system, and ∈n>Representing the partial derivative of the magnetic force B of the disk in the front-rear direction U,/and>representing the partial derivative of the magnetic disk force B in the left-right direction V,/and>representing the partial derivative of the magnetic disk force B in the vertical direction C;
based on the magnetic force characteristics, calculating the magnetic force similarity between each of the magnetic force of the magnetic disks by using the following formula:
wherein d represents the magnetic similarity, t represents the serial number of the magnetic characteristic,representing magnetic force characteristics, T' representing a sequence number within a range of 1 to T excluding T, T representing the total number of the magnetic force characteristics;
when the magnetic force similarity is larger than a preset similarity, judging that the encryption key and the strong encryption data do not exist in the first demagnetizing disk;
And when the magnetic force similarity is not greater than the preset similarity, judging that the encryption key and the strong encryption data exist in the first demagnetizing disk.
In one embodiment, said replacing the location of said encryption key and said strong data in said first degaussing disk to obtain a replacement location disk comprises:
inquiring an original partition number of the encryption key and the strong encryption data in the disk;
obtaining a partition storage space corresponding to the original partition number from the first demagnetizing disk;
dividing an idle storage space and an occupied storage space from the partitioned storage space;
transferring the encryption key and the strong encryption data from the occupied storage space to the free storage space in the first demagnetizing disk to obtain a transferred encryption key and strong encryption data;
and taking the first demagnetizing disk containing the encryption key subjected to transfer and the strong data as the disk of the replacement position.
In a second aspect, the present invention provides a multi-channel data destruction system based on strong encryption, which is characterized in that the system includes:
the data detection module is used for detecting data to be destroyed, which accords with the data destruction request, in a magnetic disk after receiving the data destruction request sent by a user;
The data strong encryption module is used for selecting an encryption method and encryption times of the data to be destroyed, and carrying out data strong encryption on the data to be destroyed by utilizing the encryption method and the encryption times to obtain strong encryption data;
the first existence detection module is used for carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk of destroyed data, carrying out magnetic disk degaussing treatment on the magnetic disk of destroyed data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk;
the second presence detection module is used for replacing the positions of the encryption key and the strong encryption data in the first demagnetizing disk when the encryption key and the strong encryption data exist in the first demagnetizing disk to obtain a disk with a replaced position, performing disk demagnetizing treatment on the disk with the replaced position to obtain a second demagnetizing disk, and detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk;
a step return module, configured to return to the step S4 when the encryption key and the strong encrypted data exist in the second demagnetizing disk;
And the result determining module is used for taking the second demagnetizing disk as a data destruction result of the data to be destroyed when the encryption key and the strong encryption data do not exist in the second demagnetizing disk.
Compared with the prior art, the embodiment of the invention has at least the following advantages:
the embodiment of the invention eliminates magnetism of a magnetic disk by using a strong encryption key of the strong encryption data and the strong encryption data in the magnetic disk to thoroughly destroy the data stored by magnetism, further, the embodiment of the invention eliminates the data stored by magnetism by performing a demagnetization process on the magnetic disk of the destruction data to destroy the data by selecting an encryption method and the number of times of encryption of the data to be destroyed to irreversibly and non-decryptable encryption of the data to be destroyed before the data destruction of the data to be destroyed, prevents illegal molecules from restoring the destroyed data by using the magnetic trace reserved in the magnetic disk, and further, the embodiment of the invention eliminates magnetism of the magnetic disk by using a strong encryption key of the strong encryption data and the strong encryption data in the magnetic disk to thoroughly destroy the data stored by magnetism, further, eliminates the data stored by magnetism by performing a demagnetization process on the magnetic disk of the destruction data to destroy the data, and the data stored by permanent magnetism to be destroyed by the non-complete encryption, further, detects whether the first embodiment of the data is not completely transferred by the encryption key and the encryption key is not completely transferred by detecting whether the first encryption key is used for the data stored by the magnetic disk and the encryption key is not completely replaced by the encryption key and the encryption key is not carried by the encryption key is not carried out, the privacy of the contents of the encryption key and the strong encrypted data is ensured. Therefore, the multi-channel data destruction method and system based on strong encryption provided by the embodiment of the invention can completely ensure that the data is completely destroyed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic flow chart of a multi-channel data destruction method based on strong encryption according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating one step of a multi-channel data destruction method based on strong encryption according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating another step of the multi-channel data destruction method based on strong encryption according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a multi-channel data destruction system based on strong encryption according to an embodiment of the present invention.
Detailed Description
It should be understood that the detailed description is presented by way of example only and is not intended to limit the invention.
The embodiment of the invention provides a multi-channel data destruction method based on strong encryption, and an execution subject of the multi-channel data destruction method based on strong encryption comprises, but is not limited to, at least one of a server, a terminal and the like which can be configured to execute the method provided by the embodiment of the invention. In other words, the multi-channel data destruction method based on strong encryption can be executed by software or hardware installed in a terminal device or a server device, and the software can be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Example 1
Referring to fig. 1, a flow chart of a multi-channel data destruction method based on strong encryption according to an embodiment of the invention is shown. The multi-channel data destruction method based on strong encryption described in fig. 1 comprises the following steps:
S1, after receiving a data destruction request sent by a user, detecting data to be destroyed, which accords with the data destruction request, in a magnetic disk.
In the embodiment of the present invention, the data destruction request refers to a request including content that a user wants to destroy, for example, data that needs to destroy a certain partition, data that wants to destroy a certain software, a file that wants to destroy a certain name, data that wants to destroy a certain time, and so on.
Further, the embodiment of the invention is used for analyzing the data to be destroyed, which accords with the data destruction request, in the magnetic disk and the data associated with the data to be destroyed by detecting the data to be destroyed, which accords with the data destruction request, so as to avoid the erroneous deletion or the less deletion of the data.
In an embodiment of the present invention, the detecting data to be destroyed in the disk, which meets the data destruction request, includes: inquiring first target destroying data of the data destroying request, and inquiring non-target destroying data except the target destroying data in the disk; after the first target destroying data is pre-deleted from the magnetic disk, identifying second target destroying data which changes in the non-target destroying data; and taking the first target destroying data and the second target destroying data as the data to be destroyed.
Optionally, the process of pre-deleting the first target destruction data from the disk is a process of deleting the first target destruction data, and then still finding the first target destruction data in a recycle bin.
When the first target destruction data is in data association with the second target destruction data in the non-target destruction data, the deletion of the first target destruction data may cause a change of the second target destruction data, so that the second target destruction data is used as the data to be destroyed.
S2, selecting an encryption method and encryption times of the data to be destroyed, and performing data strong encryption on the data to be destroyed by utilizing the encryption method and the encryption times to obtain strong encrypted data.
According to the embodiment of the invention, the encryption method and the encryption times of the data to be destroyed are selected to be used for carrying out irreversible and decrypting encryption on the data to be destroyed before the data to be destroyed is destroyed, so that illegal molecules are prevented from recovering the destroyed data by utilizing magnetic traces reserved in a magnetic disk.
In an embodiment of the present invention, referring to fig. 2, the selecting the encryption method and the encryption times of the data to be destroyed includes:
S201, recognizing character composition of the data to be destroyed;
s202, screening an initial encryption algorithm capable of carrying out character encryption on the character components;
s203, when the initial encryption algorithm meets a preset single insolubility, taking the initial encryption algorithm as the encryption method;
s204, determining the encryption times of the data to be destroyed based on the character composition of the encryption method.
The single irresolvable property means that after encrypting the data to be destroyed, if it is not feasible to decrypt all the encrypted data through the decrypted partial plaintext, only the encrypted data can be decrypted at the same time.
Optionally, the process of determining the encryption times of the data to be destroyed based on the character composition of the encryption method is: and taking the total number of characters within the range of the character composition of the encryption method as the encryption times, for example, taking 10 as the encryption times when the encryption method encrypts the data to be destroyed into the range of the character composition within 0-9.
In an embodiment of the present invention, the performing data strong encryption on the data to be destroyed by using the encryption method and the encryption times to obtain strong encrypted data includes: performing first data strong encryption on the data to be destroyed by using the encryption method to obtain first strong encryption data; performing second data strong encryption on the first strong encryption data based on the encryption times to obtain second strong encryption data; -taking said second strong encryption data as said strong encryption data; the encryption method comprises the following steps: the data to be destroyed is subjected to data sequence scrambling by using the following formula, so as to obtain scrambling sequence data:
(y 1 ,y 2 ,…,y n )=PRF(x 1 ,x 2 ,...,x n ,α)
Wherein (y) 1 ,y 2 ,...,y n ) Representing the scrambled data, PRF representing a pseudo-random generating function, x 1 ,x 2 ,...,x n Representing the data to be destroyed, n represents the total number of the data to be destroyed, and alpha represents a randomly generated secret key;
and carrying out data fusion on the disordered data by using the following formula to obtain fusion data:
wherein, (z) 1 ,z 2 ,…,z n ) Representing the fused data, (y) 1 ,y 2 ,...,y n ) Representing the scrambling sequence data, i representing the sequence number of the scrambling sequence data, and alpha representing a randomly generated key;
randomly generating an encryption key of the fusion data; based on the encryption key, performing first data strong encryption on the fusion data by using the following formula to obtain the first strong encrypted data:
k=S[(z 1 ,z 2 ,…,z n ),(β)]
wherein k represents the first strongly encrypted data, S represents an asymmetric encryption algorithm, (z) 1 ,z 2 ,…,z n ) Representing the fused data, and β representing the encryption key.
Optionally, the process of performing the second strong encryption on the first strong encrypted data based on the encryption times to obtain second strong encrypted data is as follows: re-encrypting the first strong encrypted data, and obtaining the second strong encrypted data when the number of repeated encryptions reaches the number of encryptions.
S3, carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk of destroyed data, carrying out magnetic disk degaussing treatment on the magnetic disk of destroyed data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk.
The embodiment of the invention destroys the data by the strong encryption data and the encryption key of the strong encryption data in the magnetic disk, so as to eliminate the magnetism of the magnetic disk by utilizing a demagnetizing technology, thereby thoroughly destroying the data stored by magnetism.
In an embodiment of the present invention, the data destroying method for destroying the strong encrypted data and the encryption key of the strong encrypted data in the disk to obtain a disk destroying the data includes: obtaining a disk sample; constructing a data destruction magnetic field sample of the magnetic disk sample; calculating the magnetic induction coercivity of the magnetic disk sample in the data destruction magnetic field sample by using the following formula:
wherein H represents magnetic induction coercive force, A represents magnetic induction intensity of a magnetic disk sample under the data destruction magnetic field sample, mu represents magnetic permeability in vacuum, and M represents magnetization intensity;
When the magnetic induction coercive force is smaller than the magnetic force of the data destruction magnetic field sample, the data destruction magnetic field sample degree is utilized to destroy the data of the strong encryption data and the encryption key of the strong encryption data, and a magnetic disk for destroying the data is obtained.
When the magnetic force of the data destruction magnetic field sample is larger than the magnetic induction coercive force, the magnetic force of the data destruction magnetic field sample can enable the magnetic force direction of the data stored in the magnetic disk sample to be twisted into a direction consistent with the magnetic force direction of the data destruction magnetic field sample, so that the data stored in the magnetic disk sample is permanently deleted.
Further, the embodiment of the invention is used for destroying the data which are not destroyed and exist due to the permanence of magnetism at the edge part of the magnetic disk by carrying out the magnetic disk demagnetizing treatment on the magnetic disk for destroying the data.
In an embodiment of the present invention, referring to fig. 3, the performing a disc demagnetizing process on the disc for destroying data to obtain a first demagnetized disc includes:
s301, constructing an electric high-voltage magnetic field of the magnetic disk for destroying data;
S302, carrying out electric high-voltage magnetization on the magnetic disk of the destroyed data by utilizing the electric high-voltage magnetic field to obtain the first demagnetized magnetic disk.
Further, the embodiment of the invention is used for detecting whether the left data which is not destroyed exists in the disk or not by detecting whether the encryption key and the strong encryption data exist in the first demagnetized disk or not.
In an embodiment of the present invention, the detecting whether the encryption key and the strong encryption data exist in the first demagnetized disk includes: collecting magnetic force of a magnetic disk at each position on the first demagnetizing magnetic disk; calculating the magnetic force characteristics of each magnetic force of the magnetic disks by using the following formula:
wherein,the magnetic force characteristic is represented by u, v, c, and ∈n, u represents a unit vector in the front-back direction in the three-dimensional coordinate system, v represents a unit vector in the left-right direction in the three-dimensional coordinate system, c represents a unit vector in the vertical direction in the three-dimensional coordinate system, and ∈n>Representing the partial derivative of the magnetic force B of the disk in the front-rear direction U,/and>representing the partial derivative of the magnetic disk force B in the left-right direction V,/and>representing the partial derivative of the magnetic disk force B in the vertical direction C;
based on the magnetic force characteristics, calculating the magnetic force similarity between each of the magnetic force of the magnetic disks by using the following formula:
Wherein d represents the magnetic similarity, t represents the serial number of the magnetic characteristic,representing magnetic force characteristics, T' representing a sequence number within a range of 1 to T excluding T, T representing the total number of the magnetic force characteristics;
when the magnetic force similarity is larger than a preset similarity, judging that the encryption key and the strong encryption data do not exist in the first demagnetizing disk; and when the magnetic force similarity is not greater than the preset similarity, judging that the encryption key and the strong encryption data exist in the first demagnetizing disk.
When the magnetic force similarity is larger than the preset similarity, the magnetic force of each magnetic disk in the magnetic force of the magnetic disks is similar, the magnetic disk is magnetized, the effect of magnetizing the magnetic disk is good, and data stored in the magnetic disk are magnetized in the same direction.
S4, when the encryption key and the strong encryption data exist in the first demagnetizing disk, replacing positions of the encryption key and the strong encryption data in the first demagnetizing disk to obtain a disk with a replaced position, performing disk demagnetizing treatment on the disk with the replaced position to obtain a second demagnetizing disk, and detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk.
When the encryption key and the strong encryption data exist in the first degaussing disk, the problem that an illegal molecule can still decrypt the strong encryption data through the encryption key and the strong encryption data, so that data destruction is incomplete and unsafe is caused is solved, and the fact that the encryption key and the strong encryption data exist in the first degaussing disk are part of the encryption key and part of the strong encryption data in the encryption key and the strong encryption data is needed, because a disk degaussing treatment is carried out on the disk of destroying data, a large amount of encryption keys and strong encryption data are destroyed in the process of obtaining the first degaussing disk, but data traces of the encryption key and the strong encryption data still remain in the disk due to the fact that magnetism is remained at the edge of the disk, incomplete magnetization exists in the disk, and the like.
Further, the embodiment of the present invention secures privacy of the contents of the encryption key and the strong encryption data by changing the positions of the encryption key and the strong encryption data in the first demagnetizing disk for transferring the encryption key and the strong encryption data to positions free from problems of residual magnetism, incomplete magnetization, and the like based on the partition numbers, instead of based on the contents of the encryption key and the strong encryption data.
In an embodiment of the present invention, said replacing the location of the encryption key and the strong encrypted data in the first demagnetizing disk to obtain a disk with a replaced location includes: inquiring an original partition number of the encryption key and the strong encryption data in the disk; obtaining a partition storage space corresponding to the original partition number from the first demagnetizing disk; dividing an idle storage space and an occupied storage space from the partitioned storage space; transferring the encryption key and the strong encryption data from the occupied storage space to the free storage space in the first demagnetizing disk to obtain a transferred encryption key and strong encryption data; and taking the first demagnetizing disk containing the encryption key subjected to transfer and the strong data as the disk of the replacement position.
The method comprises the steps of destroying data in a disk, wherein the free storage space refers to a free partition of the destroyed data in the disk after the disk degaussing treatment is carried out on the disk for destroying the data to obtain a first degaussing disk, and the occupied storage space refers to a partition of the destroyed data in which the existence of the encryption key, part of the encryption key in the strongly encrypted data and part of the strongly encrypted data can still be detected in the disk after the disk degaussing treatment is carried out on the disk for destroying the data to obtain the first degaussing disk.
In an embodiment of the present invention, the principle of performing the disc demagnetizing treatment on the disc at the replacement position to obtain the second demagnetized disc is similar to the principle of performing the disc demagnetizing treatment on the disc with the destroyed data to obtain the first demagnetized disc, which is not further described herein.
In an embodiment of the present invention, the principle of detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk is similar to that of detecting whether the encryption key and the strong encryption data exist in the first demagnetizing disk, and will not be further described herein.
S5, returning to the step S4 when the encryption key and the strong encryption data exist in the second demagnetizing disk.
S6, when the encryption key and the strong encryption data do not exist in the second demagnetizing disk, the second demagnetizing disk is used as a data destruction result of the data to be destroyed.
Example two
In order to more clearly understand the present invention, the case of detecting the presence or absence of the encryption key and the strong encryption data in the first demagnetized disk according to the present embodiment will be further explained below by a second embodiment.
The invention provides a multi-channel data destruction method based on strong encryption, which comprises the following steps:
the embodiment of the invention is used for detecting whether the left data which is not destroyed exists in the disk or not by detecting whether the encryption key and the strong encryption data exist in the first demagnetized disk or not.
In an embodiment of the present invention, the detecting whether the encryption key and the strong encryption data exist in the first demagnetized disk includes: collecting magnetic force of a magnetic disk at each position on the first demagnetizing magnetic disk; calculating the magnetic force characteristics of each magnetic force of the magnetic disks by using the following formula:
wherein,the magnetic force characteristic is represented by u, v, c, and ∈n, u represents a unit vector in the front-back direction in the three-dimensional coordinate system, v represents a unit vector in the left-right direction in the three-dimensional coordinate system, c represents a unit vector in the vertical direction in the three-dimensional coordinate system, and ∈n>Representing the partial derivative of the magnetic force B of the disk in the front-rear direction U,/and>representing the partial derivative of the magnetic disk force B in the left-right direction V,/and>representing the partial derivative of the magnetic disk force B in the vertical direction C;
based on the magnetic force characteristics, calculating the magnetic force similarity between each of the magnetic force of the magnetic disks by using the following formula:
Wherein d represents the magnetic similarity, t represents the serial number of the magnetic characteristic,representing magnetic force characteristics, T' representing a sequence number within a range of 1 to T excluding T, T representing the total number of the magnetic force characteristics;
when the magnetic force similarity is larger than a preset similarity, judging that the encryption key and the strong encryption data do not exist in the first demagnetizing disk; and when the magnetic force similarity is not greater than the preset similarity, judging that the encryption key and the strong encryption data exist in the first demagnetizing disk.
When the magnetic force similarity is larger than the preset similarity, the magnetic force of each magnetic disk in the magnetic force of the magnetic disks is similar, the magnetic disk is magnetized, the effect of magnetizing the magnetic disk is good, and data stored in the magnetic disk are magnetized in the same direction.
Example III
Fig. 4 shows a functional block diagram of a multi-channel data destruction system based on strong encryption.
The multi-channel data destruction system 400 based on strong encryption can be installed in electronic equipment. Depending on the functions implemented, the strong encryption-based multi-channel data destruction system may include a data detection module 401, a data strong encryption module 402, a first presence detection module 403, a second presence detection module 404, a step return module 405, and a result determination module 406. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the embodiment of the present invention, the functions of each module/unit are as follows:
the data detection module 401 is configured to detect data to be destroyed, which accords with a data destruction request, in a disk after receiving the data destruction request sent by a user;
the data strong encryption module 402 is configured to select an encryption method and an encryption number of times of the data to be destroyed, and perform data strong encryption on the data to be destroyed by using the encryption method and the encryption number of times to obtain strong encrypted data;
the first presence detection module 403 is configured to perform data destruction on the strong encryption data and an encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk of destroyed data, perform magnetic disk degaussing on the magnetic disk of destroyed data to obtain a first degaussing magnetic disk, and detect whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk;
the second presence detection module 404 is configured to replace, when the encryption key and the strong encryption data exist in the first demagnetized disk, the positions of the encryption key and the strong encryption data in the first demagnetized disk to obtain a disk with a replaced position, perform disk demagnetizing processing on the disk with the replaced position to obtain a second demagnetized disk, and detect whether the encryption key and the strong encryption data exist in the second demagnetized disk;
The step return module 405 is configured to return to the step S4 above when the encryption key and the strong encrypted data exist in the second demagnetizing disk;
the result determining module 406 is configured to take the second demagnetizing disk as a data destruction result of the data to be destroyed when the encryption key and the strong encrypted data are not present in the second demagnetizing disk.
In detail, the modules in the multi-channel data destruction system 400 based on strong encryption in the embodiment of the present invention use the same technical means as the multi-channel data destruction method based on strong encryption described in fig. 1, and can generate the same technical effects, which are not described herein.
In the several embodiments provided in the present invention, it should be understood that the disclosed method and system may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. The multi-channel data destruction method based on strong encryption is characterized by comprising the following steps:
after receiving a data destruction request sent by a user, detecting data to be destroyed, which accords with the data destruction request, in a magnetic disk;
selecting an encryption method and encryption times of the data to be destroyed, and performing data strong encryption on the data to be destroyed by utilizing the encryption method and the encryption times to obtain strong encrypted data;
carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk for destroying the data, carrying out magnetic disk degaussing treatment on the magnetic disk for destroying the data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk;
When the encryption key and the strong encryption data exist in the first demagnetizing disk, changing positions of the encryption key and the strong encryption data in the first demagnetizing disk to obtain a disk with a changed position, performing disk demagnetizing treatment on the disk with the changed position to obtain a second demagnetizing disk, and detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk;
returning to the step S4 described above when the encryption key and the strong encrypted data are present in the second demagnetized disk;
and when the encryption key and the strong encryption data are not present in the second demagnetizing disk, taking the second demagnetizing disk as a data destruction result of the data to be destroyed.
2. The method for destroying multi-channel data based on strong encryption as claimed in claim 1, wherein said detecting data to be destroyed in a disk in accordance with said data destruction request comprises:
inquiring first target destroying data of the data destroying request, and inquiring non-target destroying data except the target destroying data in the disk;
after the first target destroying data is pre-deleted from the magnetic disk, identifying second target destroying data which changes in the non-target destroying data;
And taking the first target destroying data and the second target destroying data as the data to be destroyed.
3. The method for destroying multi-channel data based on strong encryption as claimed in claim 1, wherein said selecting the encryption method and the encryption times of the data to be destroyed comprises:
identifying the character composition of the data to be destroyed;
screening an initial encryption algorithm capable of encrypting the characters;
when the initial encryption algorithm meets a preset single insolubility, taking the initial encryption algorithm as the encryption method;
and determining the encryption times of the data to be destroyed based on the character composition of the encryption method.
4. The method for destroying multi-channel data based on strong encryption according to claim 1, wherein said performing data strong encryption on said data to be destroyed by using said encryption method and said encryption times to obtain strong encrypted data comprises:
performing first data strong encryption on the data to be destroyed by using the encryption method to obtain first strong encryption data;
performing second data strong encryption on the first strong encryption data based on the encryption times to obtain second strong encryption data;
-taking said second strong encryption data as said strong encryption data;
the encryption method comprises the following steps:
the data to be destroyed is subjected to data sequence scrambling by using the following formula, so as to obtain scrambling sequence data:
(y 1 ,y 2 ,…,y n )=PRF(x 1 ,x 2 ,...,x n ,α)
wherein (y) 1 ,y 2 ,...,y n ) Representing the scrambled data, PRF representing a pseudo-random generating function, x 1 ,x 2 ,...,x n Representing the data to be destroyed, n represents the total number of the data to be destroyed, and alpha represents a randomly generated secret key;
and carrying out data fusion on the disordered data by using the following formula to obtain fusion data:
wherein, (z) 1 ,z 2 ,…,z n ) Representing the fused data, (y) 1 ,y 2 ,...,y n ) Representing the scrambling sequence data, i representing the sequence number of the scrambling sequence data, and alpha representing a randomly generated key;
randomly generating an encryption key of the fusion data;
based on the encryption key, performing first data strong encryption on the fusion data by using the following formula to obtain the first strong encrypted data:
k=S[(z 1 ,z 2 ,…,z n ),(β)]
wherein k represents the first strongly encrypted data, S represents an asymmetric encryption algorithm, (z) 1 ,z 2 ,…,z n ) Representing the fused data, and β representing the encryption key.
5. The method for destroying multichannel data based on strong encryption as claimed in claim 1, wherein said destroying data in said disk by said strong encryption data and said encryption key of said strong encryption data comprises:
Obtaining a disk sample;
constructing a data destruction magnetic field sample of the magnetic disk sample;
calculating the magnetic induction coercivity of the magnetic disk sample in the data destruction magnetic field sample by using the following formula:
wherein H represents magnetic induction coercive force, A represents magnetic induction intensity of a magnetic disk sample under the data destruction magnetic field sample, mu represents magnetic permeability in vacuum, and M represents magnetization intensity;
when the magnetic induction coercive force is smaller than the magnetic force of the data destruction magnetic field sample, the data destruction magnetic field sample degree is utilized to destroy the data of the strong encryption data and the encryption key of the strong encryption data, and a magnetic disk for destroying the data is obtained.
6. The method for destroying multichannel data based on strong encryption as recited in claim 1, wherein said detecting whether said encryption key and said strong encryption data are present in said first demagnetized disk comprises:
collecting magnetic force of a magnetic disk at each position on the first demagnetizing magnetic disk;
calculating the magnetic force characteristics of each magnetic force of the magnetic disks by using the following formula:
wherein,the magnetic force characteristic is represented by u, v, c, and ∈n, u represents a unit vector in the front-back direction in the three-dimensional coordinate system, v represents a unit vector in the left-right direction in the three-dimensional coordinate system, c represents a unit vector in the vertical direction in the three-dimensional coordinate system, and ∈n >Representing the partial derivative of the magnetic force B of the disk in the front-rear direction U,/and>representing the partial derivative of the magnetic disk force B in the left-right direction V,/and>representing the partial derivative of the magnetic disk force B in the vertical direction C;
based on the magnetic force characteristics, calculating the magnetic force similarity between each of the magnetic force of the magnetic disks by using the following formula:
wherein d represents the magnetic similarity, t represents the serial number of the magnetic characteristic,representing magnetic force characteristics, T' representing a sequence number within a range of 1 to T excluding T, T representing the total number of the magnetic force characteristics;
when the magnetic force similarity is larger than a preset similarity, judging that the encryption key and the strong encryption data do not exist in the first demagnetizing disk;
and when the magnetic force similarity is not greater than the preset similarity, judging that the encryption key and the strong encryption data exist in the first demagnetizing disk.
7. The method for multi-channel data destruction based on strong encryption of claim 1, wherein said replacing the location of the encryption key and the strong encryption data in the first demagnetizing disk to obtain a replacement-located disk comprises:
inquiring an original partition number of the encryption key and the strong encryption data in the disk;
Obtaining a partition storage space corresponding to the original partition number from the first demagnetizing disk;
dividing an idle storage space and an occupied storage space from the partitioned storage space;
transferring the encryption key and the strong encryption data from the occupied storage space to the free storage space in the first demagnetizing disk to obtain a transferred encryption key and strong encryption data;
and taking the first demagnetizing disk containing the encryption key subjected to transfer and the strong data as the disk of the replacement position.
8. A multi-channel data destruction system based on strong encryption, the system comprising:
the data detection module is used for detecting data to be destroyed, which accords with the data destruction request, in a magnetic disk after receiving the data destruction request sent by a user;
the data strong encryption module is used for selecting an encryption method and encryption times of the data to be destroyed, and carrying out data strong encryption on the data to be destroyed by utilizing the encryption method and the encryption times to obtain strong encryption data;
the first existence detection module is used for carrying out data destruction on the strong encryption data and the encryption key of the strong encryption data in the magnetic disk to obtain a magnetic disk of destroyed data, carrying out magnetic disk degaussing treatment on the magnetic disk of destroyed data to obtain a first degaussing magnetic disk, and detecting whether the encryption key and the strong encryption data exist in the first degaussing magnetic disk;
The second presence detection module is used for replacing the positions of the encryption key and the strong encryption data in the first demagnetizing disk when the encryption key and the strong encryption data exist in the first demagnetizing disk to obtain a disk with a replaced position, performing disk demagnetizing treatment on the disk with the replaced position to obtain a second demagnetizing disk, and detecting whether the encryption key and the strong encryption data exist in the second demagnetizing disk;
a step return module, configured to return to the step S4 when the encryption key and the strong encrypted data exist in the second demagnetizing disk;
and the result determining module is used for taking the second demagnetizing disk as a data destruction result of the data to be destroyed when the encryption key and the strong encryption data do not exist in the second demagnetizing disk.
CN202311573099.XA 2023-11-22 2023-11-22 Multi-channel data destruction method and system based on strong encryption Pending CN117555484A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311573099.XA CN117555484A (en) 2023-11-22 2023-11-22 Multi-channel data destruction method and system based on strong encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311573099.XA CN117555484A (en) 2023-11-22 2023-11-22 Multi-channel data destruction method and system based on strong encryption

Publications (1)

Publication Number Publication Date
CN117555484A true CN117555484A (en) 2024-02-13

Family

ID=89816418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311573099.XA Pending CN117555484A (en) 2023-11-22 2023-11-22 Multi-channel data destruction method and system based on strong encryption

Country Status (1)

Country Link
CN (1) CN117555484A (en)

Similar Documents

Publication Publication Date Title
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
Kumar et al. Steganography-A data hiding technique
CN100508448C (en) Content processing apparatus and content protection program
US20110185179A1 (en) System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
US20130125196A1 (en) Method and apparatus for combining encryption and steganography in a file control system
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN111861844A (en) Reversible watermarking method based on image block authentication
CN109145617B (en) Block chain-based digital copyright protection method and system
US20130262864A1 (en) Method and system for supporting secure documents
JP2014507841A (en) Apparatus and method for online storage, transmitting apparatus and method, and receiving apparatus and method
US9208333B2 (en) Secure data recorder
Munir A secure fragile video watermarking algorithm for content authentication based on arnold CAT map
CN111444479B (en) Digital fingerprint ownership verification method and system
CN1774688A (en) Method and system for managing digital rights
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
US7603720B2 (en) Non-repudiation watermarking protection based on public and private keys
Alia et al. An improved video steganography: using random key-dependent
CN117555484A (en) Multi-channel data destruction method and system based on strong encryption
CN101404573B (en) Authorization method, system and apparatus
Ghaleb et al. Implementation of AES algorithm in QGIS software
CN110378133B (en) File protection method and device, electronic equipment and storage medium
Kaushik et al. Securing the transfer and controlling the piracy of digital files using Blockchain
Devi et al. Preventing Data Leakage in Cloud Servers through Watermarking and Encryption Techniques
KR20130017193A (en) System for managing copyright using individual identifier code and method therefor
Alfagi et al. Survey on relational database watermarking techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination