CN103248632A - Synchronous disc data security protection writing and reading method - Google Patents

Synchronous disc data security protection writing and reading method Download PDF

Info

Publication number
CN103248632A
CN103248632A CN2013102048212A CN201310204821A CN103248632A CN 103248632 A CN103248632 A CN 103248632A CN 2013102048212 A CN2013102048212 A CN 2013102048212A CN 201310204821 A CN201310204821 A CN 201310204821A CN 103248632 A CN103248632 A CN 103248632A
Authority
CN
China
Prior art keywords
data
piecemeal
security
file
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102048212A
Other languages
Chinese (zh)
Inventor
文艾
刘鹏
胥光辉
鲍爱华
姚奕
李�杰
刘敏
赵敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA University of Science and Technology
Original Assignee
PLA University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA University of Science and Technology filed Critical PLA University of Science and Technology
Priority to CN2013102048212A priority Critical patent/CN103248632A/en
Publication of CN103248632A publication Critical patent/CN103248632A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a synchronous disc data security protection writing method, which comprises the following steps that the security demands and the characteristics of data to be uploaded are quantized according to file information selected by users and the input and the setting of the users; data writing security strategies are determined according to the quantization information; data preprocessing is carried out, corresponding security mechanisms are called according to the security strategies, and the positioning, the coding, the completeness processing, the encryption and the compression operation are carried out; and data distribution is carried out, the distribution strategies of the to-be-preprocessed data are determined according to the conditions of each synchronous disc, and the to-be-preprocessed data is written into each synchronous disc content, and in addition, corresponding metadata files are generated. The invention also discloses a synchronous disc data security protection reading method. The writing method and the reading method can solve the problems of privacy protection and availability assurance of the data of users, and meanwhile, the limitation of the single synchronous disc in aspects of the file type, the single file size, the file quantity, the space volume and the like can also be broken through.

Description

A kind of synchronous disk data security protecting writes and read method
Technical field
The invention belongs to cloud storage data security field, particularly a kind of synchronous disk data writes and read method.
Background technology
Synchronous disk is a kind of cloud stores service, and it has realized that file is stored from the local directory to the cloud synchronous automatically, is the ideal selection that the user carries out the data network backup.Well-known IT vendors such as at present domestic Baidu, 360 safe satellite TVs, Tengxun, Kingsoft, Huawei have all released corresponding synchronous disk service.Along with popularizing of synchronous disk, its fail safe is subjected to the user and pays close attention to more and more, mainly embodies secret protection and two aspects of availability of user data.Correlation study shows, about 70% user is because this is former thereby be reluctant to use the cloud stores service to store critical data at present.And summed up ten big problem and chances of cloud computing in the berkeley paper, wherein service availability ranks first.
At present, solve above safety problem and mainly contain two kinds of thinkings, make a concrete analysis of as follows:
First kind of thinking: from transforming synchronous disk ISP's angle, strengthen its secret protection ability.But, backward, even if serve provider's safe enough, but because concerning the user, there are the misgivings of safety in its identity as data working control person all the time; Cloud storage at present is in the high speed development stage in addition, do not form unified industry standard as yet, system architecture and technology path that each producer adopts are widely different, are difficult to the solution unification of first kind of thinking is applied in the different realization mechanisms, have certain problem in universality; At last, under the situation that does not change existing system, the solution of first kind of thinking can't solve secret protection and the availability issue of existing ripe cloud storage system.
Second kind of thinking: from the user side angle, data are carried out preliminary treatment, for example solve the secret protection problem of data by encryption, solve the availability issue of data by backup or redundancy encoding.Because different data have different demands for security, the emphasis secret protection that for example has, and the emphasis availability that has; And the characteristic of data, as read write attribute, access characteristics, storage characteristics also has nothing in common with each other, single method can't satisfy all demands, at present, also there is not a kind of unified method demand for security and the data own characteristic of data can be taken all factors into consideration as yet, finally makes user data have higher-security.
Summary of the invention
Purpose of the present invention; be to provide a kind of synchronous disk data security protecting to write and read method; it can solve secret protection and the availability security problem of user data, also can break single synchronous disk simultaneously in the restriction of aspects such as file type, single file size, quantity of documents, spatial content.
In order to reach above-mentioned purpose, solution of the present invention is:
A kind of synchronous disk data security protecting wiring method comprises the steps:
(11) fileinfo of selecting according to the user and user's input and setting are treated demand for security and the characteristic of uploading data and are quantized;
(12) according to above quantitative information, the security strategy that specified data writes;
(13) data preliminary treatment according to the security strategy that abovementioned steps (12) is determined, is called corresponding security mechanism, carries out piecemeal, coding, integrality processing, encryption and squeeze operation;
(14) data distribute, and according to the situation of each synchronous disk, determine the Distribution Strategy of preprocessed data, accordingly preprocessed data are write each synchronous disk catalogue, and generate corresponding meta data file.
In the above-mentioned steps (11), quantify content comprises: the grade of secret protection is divided into high, medium and low; The availability protection class is divided into high, medium and low; Judge whether the needs compression according to file type; The file reading frequency is divided into high, medium and low; The file write frequency is divided into high, medium and low; And file size.
In the above-mentioned steps (12), described security strategy comprises: whether encode, if, then determine the type of coding, and the input parameter of encoding; Whether compress, if then determine compression algorithm type and compression input parameter; Whether encrypt, if then determine encryption algorithm type and key; Reach partition strategy, comprise size and the method for partition of piecemeal.
A kind of synchronous disk data security protecting read method comprises the steps:
(21) meta data file is resolved, and obtains branch block message, distributed intelligence, coded system, encryption algorithm type, encryption key and the compression algorithm type of True Data;
(22) read the True Data piece, check whether current piecemeal sequence number goes beyond the scope, if, then withdraw from, if not, then according to the order of the piecemeal in the metadata information and distributed intelligence, read current piecemeal from synchronous directory, if piecemeal exists, directly read, skip to step (23) then, otherwise, check whether this piecemeal has copy, if any, then read copy, skip to step (23), as not having, check then whether this piecemeal encodes, if any, then current piecemeal sequence number adds 1, and repeating step (22) is not as having, then can't recover data, withdraw from;
(23) the True Data piecemeal that reads is carried out integrity detection, calculate the MD5 value, compare with the summary that prestores, if correct, jump to step (24), if incorrect, return step (22);
(24) judge whether current True Data piecemeal is encrypted, if not, directly go to step (25), if, then use the cryptographic algorithm and the key that obtain in the metadata information to be decrypted, change step (25);
(25) judge whether current data is compressed, if, then obtaining the compression algorithm type according to metadata information, decompress(ion) changes step (26), otherwise, step (26) directly changeed;
(26) judge that whether current data needs decoding, if not, goes to step (27), if, then judge whether to satisfy the decoding condition, if, then decoding goes to step (27), if not, then judge whether to continue to read, if then current piecemeal sequence number adds 1, return step (22), if not, then can't recover data, withdraw from;
(27) original data block that recovers is numbered deposit;
(28) judge whether all data blocks are recovered, if, then merge, recover original document, otherwise current piecemeal sequence number adds 1, returns step (22).
In the above-mentioned steps (23), if the True Data piecemeal that reads is more incorrect with the summary that prestores, then judge whether to read coded data, if, then current piecemeal sequence number adds 1, returns step (22), if do not have, judge whether to read copy, if return step (22), if do not have, then can't recover data, withdraw from.
After adopting such scheme, the present invention has following characteristics:
(1) user's data of being stored in synchronous disk have higher fail safe
Synchronous disk provider is the maximum hidden danger of data security to the control fully of user data, the present invention is inverted to user self with the control of user data from before ISP, weaken the user most possibly to the dependence of single synchronous disk, each synchronous disk ISP only controls user's partial data, and because these data have been passed through piecemeal, coding or encryption, therefore, only rely on this part information, user's full detail can't be recovered, the user can be fundamentally eliminated to the misgivings of synchronous disk data-privacy problem.In addition, because same minute block message or by coding, or pass through copy, be stored among the different synchronous disks, even availability issue appears in individual other synchronous disk, can recover initial data by the The data copy of other synchronous disk or the mode of decoding, compare with using single synchronous disk, can significantly improve the availability of user data.
(2) user can obtain than the more characteristic of single synchronous disk
The invention provides the self-organizing of a kind of synchronous disk data security and management method, therefore, can realize the spatial clustering of synchronous disk, break through the spatial limitation of single synchronous disk, synchronous disk only is responsible for storage deblocking or part metadata in addition, and directly do not store complete data, therefore, file size and the type of user's storage will no longer be subjected to the restriction of single synchronous disk.
(3) better universality and feasibility
The present invention is totally independent of the synchronous disk system, and when specifically implementing, it is any adaptive not need existing synchronous disk to do, and therefore has better universality and feasibility.
 
Description of drawings
 
Fig. 1 is whole thinking schematic diagram of the present invention;
Fig. 2 is the flow chart of wiring method of the present invention;
Fig. 3 is the flow chart of read method of the present invention.
 
Embodiment
 
Below with reference to accompanying drawing, technical scheme of the present invention and beneficial effect are elaborated.
As shown in Figure 1, the invention provides a kind of synchronous disk data security protecting and write and read method, realize that mainly the safety of synchronous disk user data writes and reads, broken through single synchronous disk simultaneously to restrictions such as usage space, file size, file types.
The applied object of the present invention is synchronous disk data security module, specifically comprises: user interactions, security policy manager, the security mechanism module, correcting and eleting codes algorithms library, cryptographic algorithm storehouse, key management, compression algorithm storehouse, metadata management, modules such as integrity detection and data distribution management.
" user interactions " module comprises: (1) user profile shows, comprises directory tree structure, single file or directory information, user file operation (upload or download) progress, spatial information etc.; (2) user file operation is uploaded or is downloaded file or catalogue, termination or cancels synchronous etc.; (3) customer parameter configuration, as the secret protection grade, level of availability, data characteristic, local account information, synchronous disk accounts information etc.
" security policy manager " module is determined corresponding security strategy according to user configured demand for security, and for example: the privacy protection policy of specified data is to encrypt or coding; The availability strategy of specified data be coding or copy, and whether specified data needs compression etc.
" security mechanism " module mainly is to realize the support of security strategy function.As the reading of data, piecemeal function, coding framework, encrypt framework and compression frame etc.
" correcting and eleting codes algorithms library " mainly comprises current correcting and eleting codes algorithm commonly used realization, as the realization of Raid class algorithm at each platform, and RS algorithm realization etc., these algorithms upwards provide unified interface, are integrated among the coding framework of " security mechanism ".
" cryptographic algorithm storehouse " comprises that mainly current cryptographic algorithm commonly used realizes, as symmetric encipherment algorithm commonly used: AES, DES, 3DES etc., and rivest, shamir, adelman, as RSA etc., these algorithms upwards provide unified interface, are integrated among the encryption framework of " security mechanism ".
" key management " mainly is responsible for the generation, storage, cancellation of concrete cryptographic algorithm institute counterpart keys etc., and it upwards provides unified interface, is used with " cryptographic algorithm storehouse ", realizes the encryption and decryption of user data.
" compression algorithm storehouse " main integrated current compression algorithm commonly used realizes that as Rar, 7zip commonly used, bz2 etc., these algorithms are realized being integrated among the encryption framework of " security mechanism ".
" metadata management " realizes management and the storage of the metadata of user data.Metadata record the catalog organization structure of user data, directory information, the attribute information of single file and data organizational information, as whether piecemeal, divide block size, divide block type, whether encode, type of coding, whether compress, the compression algorithm type, whether encrypt, encryption algorithm type, encryption key etc.In addition, also comprise the security mechanism of metadata self, as cryptographic algorithm and the encryption key of metadata, the distributed intelligence of metadata and copy etc.
" integrity detection " realizes the integrity detection of user data, guarantees the correctness of data storage.It comprises the realization of digital digest algorithm MD5, and the storage of digital digest and encryption etc.
" data distribution management " mainly is responsible for the distribution of block data.User's True Data can carry out piecemeal after determining security strategy, " data distribution management " can detect the information of each synchronous disk, comprise current capacity, quantity of documents etc., on this basis, determine the corresponding synchronous disk of each block data, write successively then.
As shown in Figure 2, the step of a kind of synchronous disk data security protecting of the present invention wiring method is as follows:
(1) fileinfo of selecting according to the user and user's input and setting, treat demand for security and the characteristic of uploading data and quantize, specifically comprise: the grade of secret protection is divided into high, medium and low, the availability protection class, be divided into high, medium and lowly, judge whether needs compressions, file reading frequency according to file type, be divided into high, medium and low, the file write frequency, be divided into high, medium and low, and file size etc.; And the source of each index is: default value, and the user specifies, and obtains automatically;
(2) according to above quantitative information, the security strategy that specified data writes, described security strategy comprises: whether encodes, if, then determine the type (as correcting and eleting codes such as Raid, RS) of coding, and the input parameter of encoding; Whether compress, if then determine compression algorithm type and compression input parameter; Whether encrypt, if then determine encryption algorithm type and key (as typical symmetric encipherment algorithm, as AES, DES etc., typical rivest, shamir, adelman is as RSA); Partition strategy comprises the size of piecemeal, and method of partition is as order piecemeal or the piecemeal etc. that intersects;
(3) data preliminary treatment according to the security strategy that abovementioned steps (2) is determined, is called corresponding security mechanism, carries out operations such as piecemeal, coding, integrality processing, encryption, compression;
(4) data distribute, according to the situation of each synchronous disk, determine the Distribution Strategy of preprocessed data, accordingly preprocessed data is write each synchronous disk catalogue, and generating corresponding meta data file, decision is united according to security strategy and synchronous disk information in the organizational form of metadata and memory location.Described " synchronous disk catalogue " can be one or more, and the corresponding different synchronous disk provider of difference.
As shown in Figure 3, the step of a kind of synchronous disk data security protecting of the present invention read method is as follows:
(1) meta data file is resolved.Obtain branch block message, distributed intelligence, coded system, encryption algorithm type, encryption key and the compression algorithm type of True Data;
(2) read the True Data piece.Check whether current piecemeal sequence number goes beyond the scope, if then withdraw from, if not, then according to the order of the piecemeal in the metadata information and distributed intelligence, read current piecemeal from synchronous directory, if piecemeal exists, directly read, skip to step (3) then, otherwise, check whether this piecemeal has copy, if any, then read copy, skip to step (3), as not having, check then whether this piecemeal encodes, if any, then current piecemeal sequence number adds 1, repeating step (2), as not having, then can't recover data, withdraw from;
(3) the True Data piecemeal that reads is carried out integrity detection, calculate the MD5 value, compare with the summary that prestores, if correct, jump to step (4), if incorrect, judge whether to read coded data, if then current piecemeal sequence number adds 1, return step (2), if do not have, judge whether to read copy, if return step (2), if do not have, then can't recover data, withdraw from;
(4) judge whether current True Data piecemeal is encrypted, if not, directly go to step (5), if, then use the cryptographic algorithm and the key that obtain in the metadata information to be decrypted, change step (5);
(5) judge whether current data is compressed, if, then obtaining the compression algorithm type according to metadata information, decompress(ion) changes step (6), otherwise, step (6) directly changeed;
(6) judge that whether current data needs decoding, if not, goes to step (7), if, then judge whether to satisfy the decoding condition, if, then decoding goes to step (7), if not, then judge whether to continue to read, if then current piecemeal sequence number adds 1, return step (2), if not, then can't recover data, withdraw from;
(7) original data block that recovers is numbered deposit;
(8) judge whether all data blocks are recovered, if, then merge, recover original document, otherwise current piecemeal sequence number adds 1, returns step (2).
The present invention also provides the self-organizing of synchronous disk data security and management method, specifically describes as follows:
(1) True Data is separated with metadata; True Data adopts the piecemeal storage; be stored in respectively among the different synchronous disks, guarantee the fail safe of True Data by mechanism such as coding, encryption, copies, simultaneously; metadata is stored separately; according to security strategy, the memory location of metadata can be in this locality, also can be long-range; by encrypting and copy mechanism is guaranteed the secret protection of metadata, guarantee the availability of metadata by copy mechanism.
(2) preserve distributed intelligence and the corresponding attribute information of the form of catalogue information of whole synchronous disk data and True Data piece in the metadata, as whether encoding, coded system, whether encrypting, encryption algorithm type, encryption key, whether have copy, copy distributed intelligence etc.In concrete realization, adopt self-defining binary structure, or universal architecture such as XML, and database mode realizes.In addition, metadata is set up Hash index or database index, be convenient to data retrieval operation.
The operating procedure of the inventive method is as follows:
(1) the pre-some synchronous disk numbers of the account of first to file before the user uses are advised the corresponding different synchronous disk provider of each number of the account, and total number is recommended as 3~4.
(2) user sets the synchronous disk relevant parameter, as synchronous catalogue etc., starts synchronous disk, and is set to automatic login.
(3) user's login " synchronous disk data security software ";
(4) user selects the source object operated, as the telefile on local file or " the synchronous disk data security software ";
(5) user is according to operation types, the select target path, or directly operate, the internal process of concrete operations is referring to Fig. 2 and Fig. 3;
(6) " synchronous disk data security software " return result.
In sum; a kind of synchronous disk data security protecting of the present invention writes and read method; can be widely used in synchronous disk and other cloud storage security field; can effectively solve secret protection and the availability security problem of synchronous disk data; also broken through the restriction of certain synchronization dish simultaneously: as capacity, file type, single file size etc., can solve following problem:
(1) user data secret protection;
(2) the user data availability ensures;
(3) single synchronous disk is to the restriction of file size;
(4) single synchronous disk is to the restriction of file type;
(5) restriction in single synchronous disk space.
The invention provides a kind of synchronous disk data security protecting writes and read method; method and the approach of this technical scheme of specific implementation are a lot; the above only is preferred implementation of the present invention; should be understood that; for those skilled in the art; under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications; for example this method can be used for the data protection of other application except synchronous disk; perhaps adopt multiple mode to realize this method etc., these improvements and modifications also should be considered as protection scope of the present invention.In the present embodiment not clear and definite each part all available prior art realized.

Claims (5)

1. a synchronous disk data security protecting wiring method is characterized in that comprising the steps:
(11) fileinfo of selecting according to the user and user's input and setting are treated demand for security and the characteristic of uploading data and are quantized;
(12) according to above quantitative information, the security strategy that specified data writes;
(13) data preliminary treatment according to the security strategy that abovementioned steps (12) is determined, is called corresponding security mechanism, carries out piecemeal, coding, integrality processing, encryption and squeeze operation;
(14) data distribute, and according to the situation of each synchronous disk, determine the Distribution Strategy of preprocessed data, accordingly preprocessed data are write each synchronous disk catalogue, and generate corresponding meta data file.
2. a kind of synchronous disk data security protecting wiring method as claimed in claim 1, it is characterized in that: in the described step (11), quantify content comprises: the grade of secret protection is divided into high, medium and low; The availability protection class is divided into high, medium and low; Judge whether the needs compression according to file type; The file reading frequency is divided into high, medium and low; The file write frequency is divided into high, medium and low; And file size.
3. a kind of synchronous disk data security protecting wiring method as claimed in claim 1 or 2, whether it is characterized in that: in the described step (12), described security strategy comprises: encode, if then determine the type of coding and coding input parameter; Whether compress, if then determine compression algorithm type and compression input parameter; Whether encrypt, if then determine encryption algorithm type and key; Reach partition strategy, comprise size and the method for partition of piecemeal.
4. a synchronous disk data security protecting read method is characterized in that comprising the steps:
(21) meta data file is resolved, and obtains branch block message, distributed intelligence, coded system, encryption algorithm type, encryption key and the compression algorithm type of True Data;
(22) read the True Data piece, check whether current piecemeal sequence number goes beyond the scope, if, then withdraw from, if not, then according to the order of the piecemeal in the metadata information and distributed intelligence, read current piecemeal from synchronous directory, if piecemeal exists, directly read, skip to step (23) then, otherwise, check whether this piecemeal has copy, if any, then read copy, skip to step (23), as not having, check then whether this piecemeal encodes, if any, then current piecemeal sequence number adds 1, and repeating step (22) is not as having, then can't recover data, withdraw from;
(23) the True Data piecemeal that reads is carried out integrity detection, calculate the MD5 value, compare with the summary that prestores, if correct, jump to step (24), if incorrect, return step (22);
(24) judge whether current True Data piecemeal is encrypted, if not, directly go to step (25), if, then use the cryptographic algorithm and the key that obtain in the metadata information to be decrypted, change step (25);
(25) judge whether current data is compressed, if, then obtaining the compression algorithm type according to metadata information, decompress(ion) changes step (26), otherwise, step (26) directly changeed;
(26) judge that whether current data needs decoding, if not, goes to step (27), if, then judge whether to satisfy the decoding condition, if, then decoding goes to step (27), if not, then judge whether to continue to read, if then current piecemeal sequence number adds 1, return step (22), if not, then can't recover data, withdraw from;
(27) original data block that recovers is numbered deposit;
(28) judge whether all data blocks are recovered, if, then merge, recover original document, otherwise current piecemeal sequence number adds 1, returns step (22).
5. a kind of synchronous disk data security protecting read method as claimed in claim 4 is characterized in that: in the described step (23), if the True Data piecemeal that reads is more incorrect with the summary that prestores; then judge whether to read coded data, if then current piecemeal sequence number adds 1; return step (22); if do not have, judge whether to read copy, if; return step (22); if do not have, then can't recover data, withdraw from.
CN2013102048212A 2013-05-29 2013-05-29 Synchronous disc data security protection writing and reading method Pending CN103248632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102048212A CN103248632A (en) 2013-05-29 2013-05-29 Synchronous disc data security protection writing and reading method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102048212A CN103248632A (en) 2013-05-29 2013-05-29 Synchronous disc data security protection writing and reading method

Publications (1)

Publication Number Publication Date
CN103248632A true CN103248632A (en) 2013-08-14

Family

ID=48927854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102048212A Pending CN103248632A (en) 2013-05-29 2013-05-29 Synchronous disc data security protection writing and reading method

Country Status (1)

Country Link
CN (1) CN103248632A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
WO2017036336A1 (en) * 2015-09-01 2017-03-09 阿里巴巴集团控股有限公司 Cloud platform-based service data processing method and device
CN106970854A (en) * 2017-03-30 2017-07-21 无锡华云数据技术服务有限公司 A kind of logical process server in object storage system
CN107360240A (en) * 2017-07-20 2017-11-17 广东小天才科技有限公司 A kind of data-updating method and system
CN108197500A (en) * 2018-01-31 2018-06-22 长安大学 A kind of storage system and method based on TrustZone Security and Integrality of Data
CN112532596A (en) * 2020-11-18 2021-03-19 北京泰豪智能工程有限公司 Network security scheme and strategy generation method and device
CN115543941A (en) * 2022-12-01 2022-12-30 成都实时技术股份有限公司 Data storage optimization processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110184997A1 (en) * 2010-01-28 2011-07-28 Cleversafe, Inc. Selecting storage facilities in a plurality of dispersed storage networks
CN102270161A (en) * 2011-06-09 2011-12-07 华中科技大学 Methods for storing, reading and recovering erasure code-based multistage fault-tolerant data
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110184997A1 (en) * 2010-01-28 2011-07-28 Cleversafe, Inc. Selecting storage facilities in a plurality of dispersed storage networks
CN102270161A (en) * 2011-06-09 2011-12-07 华中科技大学 Methods for storing, reading and recovering erasure code-based multistage fault-tolerant data
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
WO2017036336A1 (en) * 2015-09-01 2017-03-09 阿里巴巴集团控股有限公司 Cloud platform-based service data processing method and device
CN106970854A (en) * 2017-03-30 2017-07-21 无锡华云数据技术服务有限公司 A kind of logical process server in object storage system
CN107360240A (en) * 2017-07-20 2017-11-17 广东小天才科技有限公司 A kind of data-updating method and system
CN108197500A (en) * 2018-01-31 2018-06-22 长安大学 A kind of storage system and method based on TrustZone Security and Integrality of Data
CN112532596A (en) * 2020-11-18 2021-03-19 北京泰豪智能工程有限公司 Network security scheme and strategy generation method and device
CN115543941A (en) * 2022-12-01 2022-12-30 成都实时技术股份有限公司 Data storage optimization processing method
CN115543941B (en) * 2022-12-01 2023-02-17 成都实时技术股份有限公司 Data storage optimization processing method

Similar Documents

Publication Publication Date Title
US11157366B1 (en) Securing data in a dispersed storage network
CN103248632A (en) Synchronous disc data security protection writing and reading method
CN110062034B (en) Block chain large file secure storage method and system
US9483657B2 (en) Secure online distributed data storage services
US10552640B2 (en) In-situ data verification for the cloud
US9665427B2 (en) Hierarchical data storage architecture
US10180912B1 (en) Techniques and systems for data segregation in redundancy coded data storage systems
CN104331346A (en) Data protection method
CN104410683A (en) Data backup method
CN104331345B (en) A kind of data reconstruction method
CN105120003A (en) Method for realizing data backup in cloud environment
CN103609059A (en) Systems and methods for secure data sharing
CN108964911A (en) A kind of stream media service system based on block chain and quantum flow data block technology
CN103248713A (en) Synchronous disc data security protection method
CN102693399A (en) System and method for on-line separation and recovery of electronic documents
WO2021174141A1 (en) Virtual storage container for data storage and archiving
CN112118087A (en) Cross-chain contract compression encryption system and method
US11782789B2 (en) Encoding data and associated metadata in a storage network
Dhore et al. Data Distribution in Reliable and Secure Distributed Cloud Environment Using Hash-Solomon Code
Abd Manan et al. Concept of minimizing the response time for reducing dynamic data redundancy in cloud computing
Vijayakumar et al. Pioneer approach of data deduplication to remove redundant data from cloud storage
Frühwirth Secure, Cost-Efficient and Redundant Data Placement in the Cloud
Bhavya et al. DDEAS: Distributed Deduplication System with Efficient Access in Cloud Data Storage
Saurabh et al. Securing Data Deduplication Using Convergent Encryption Algorithm
CN115221568A (en) Safety log system based on transaction terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130814