CN103607393A - Data safety protection method based on data partitioning - Google Patents

Data safety protection method based on data partitioning Download PDF

Info

Publication number
CN103607393A
CN103607393A CN201310587754.7A CN201310587754A CN103607393A CN 103607393 A CN103607393 A CN 103607393A CN 201310587754 A CN201310587754 A CN 201310587754A CN 103607393 A CN103607393 A CN 103607393A
Authority
CN
China
Prior art keywords
data
block
small
file
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310587754.7A
Other languages
Chinese (zh)
Inventor
张砚波
吴丙涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201310587754.7A priority Critical patent/CN103607393A/en
Publication of CN103607393A publication Critical patent/CN103607393A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a data safety protection method based on data partitioning. According to an employed strategy, different data needing storage at a client end are reasonably partitioned into great and small data blocks, and the great and small data blocks are respectively deployed in local and non-local cloud storage systems. Compared with the prior art, the data safety protection method based on data partitioning can effectively prevent a malicious user or a cloud storage administrator from carrying out illegal stealing and tampering of privacy data of users, provides more choices for safety of different data for users and has advantages of improved system flexibility, strong practicality and easy popularization.

Description

A kind of data security protection method based on Data Segmentation
Technical field
The present invention relates to Computer Applied Technology field, specifically a kind of data security protection method based on Data Segmentation.
Background technology
In recent years, as the cloud service system data security of the companies such as Google leak data event and Microsoft, the Amazon event that is under suspicion, further aggravated industry to the Information Security of cloud application, reliability and credible worry; The core root of the problem of data safety of the existence in cloud storage system is that data management power is with proprietorial separated.Data under user are contracted out to cloud storage provider, and cloud storage provider has just obtained the priority access power of these data.Fact proved, owing to existing internal staff's dereliction of duty, assault and the system failure to cause the kinds of risks such as security mechanism inefficacy, cloud storage provider does not have sufficient evidence to allow user be sure of that its data are correctly stored and use.For example, whether user data is stolen and sold to its rival, whether user's data-privacy is extracted or analyzes, and user's data have country or the region that is not correctly stored in its appointment, and data do not have is strictly destroyed deletion etc. up hill and dale by customer requirements.
In present stage, in cloud storage system mainly there is the problem of following 3 aspects in the assurance policy mechanism of Information Security aspect:
1, the larger overhead that traditional cloud storage data-privacy security mechanism based on simple encryption technology is brought in actual process operation data and loaded down with trivial details, once and by hacker, cracked, data will be divulged a secret or lose;
The prestige of 2 ,Yun storage service providers and qualification cannot guarantee to allow user courageously relieved being put in the space that cloud storage provider provides that data are revealed the whole truth carry out data storage;
3, in cloud stores service, the storage of data need to be based on widely used Internet network, because data are stored transmission Network Based, the probability of being intercepted and captured in the process of transmission has also increased the risk of data.
Summary of the invention
Technical assignment of the present invention is to solve the deficiencies in the prior art, and a kind of data security protection method based on Data Segmentation is provided.
Technical scheme of the present invention realizes in the following manner, this kind of data security protection method based on Data Segmentation, and it specifically protects step to be:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, user's uploading data: according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
The Data Segmentation that first in client, user need to be stored in cloud storage system is small data piece and long data block; Secondly in client, carry out Hash operation, then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted; After finally long data block being encrypted according to the level of security demand of user's appointment, by Internet Internet Transmission, to the memory file system in high in the clouds, carry out piecemeal storage;
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
Described high in the clouds is divided into two parts: be first cloud storage control server, Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously; Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
The small block data that the small data piece of cutting apart in described step 2 is fixed size, it is cut apart realization flow and is: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.
The small data piece of cutting apart in described step 2 is the small block data of on-fixed size, and it is cut apart realization flow and is: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.
The detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded;
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously;
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality;
4) data of needs being uploaded are encrypted and upload according to significance level;
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
The detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
The beneficial effect that the present invention compared with prior art produced is:
A kind of data security protection method based on Data Segmentation of the present invention adopts the data that the difference of client need to be preserved to be rationally divided into size data piece, respectively small block data and chunk data are deployed in again to the strategy in the cloud storage system of local and remote side, solved larger overhead that traditional cloud storage data-privacy security mechanism based on simple encryption technology brings in actual process operation data and loaded down with trivial details, can effectively prevent that malicious user or cloud storage administrator from illegally stealing, distorting user's private data; Design consideration of the present invention will be stored the different level of security demands of data, the fixed-size fritter technology of selection that can be in good time or big or small unfixed fritter technology, for client provides more choices for the fail safe of different pieces of information, improved the flexibility of system; The present invention proposes to give the invention of data-splitting strategy; can provide a kind of low expense of client, data security secret protection technology in the cloud storage system of high safety for user; realize user and really oneself grasped the storage scheme of data security in cloud storage system; practical; applied widely, be easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is data upload flow chart in cloud storage system of the present invention.
Accompanying drawing 2 is that in cloud storage system of the present invention, data are extracted flow chart.
Accompanying drawing 3 is the small block data schematic flow sheets that extract fixed size in the present invention.
Accompanying drawing 4 is the small block data schematic flow sheets that extract on-fixed size in the present invention.
Embodiment
Below in conjunction with accompanying drawing, a kind of data security protection method based on Data Segmentation of the present invention is described in detail below.
As shown in accompanying drawing 2, Fig. 3, the invention provides a kind of data security protection method based on Data Segmentation, it specifically protects step to be:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, the user who has bought cloud stores service can use cloud storage system to carry out the storage of data.When the user of client need to carry out data upload, carry out Request System and carry out data when storage, according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
At user side, it is FTP client FTP, FTP client FTP is responsible for monitoring and is caught local system operation, data to the needs storage obtaining are carried out large and small cutting apart, carry out Hash operation (Hash), then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted.Being divided into beyond the clouds two parts, is first cloud storage control server, and Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously.Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
Security mechanism based on Data Segmentation in the present invention can resolve into n piecemeal by a file, possess wherein arbitrarily at least k(k≤n completely) during individual piecemeal, could recover original, when this method for designing makes any n-k minute lost block or damages, still can recover original, thereby improve the reliabilty and availability of data; And when any not enough k piecemeal is stolen, can not be reduced into original, thereby have improved fail safe.Data Segmentation mechanism is in the present invention that after data file is divided into large and small data block, store in strange land, stores long data block in cloud storage system, at this locality storage small data piece, according to the size of data block, can be divided into two kinds of strategies.
(1) as shown in Figure 3, the small block data that the small data piece of cutting apart in described step 2 is fixed size, it is cut apart realization flow and is: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.This tactful advantage is that small block data size is fixing, and the pressure that can not bring user side storage or read-write to process, is convenient to local storage administration.
(2) as shown in Figure 4, the small data piece of cutting apart in described step 2 is the small block data of on-fixed size, and it is cut apart realization flow and is: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.The byte location that such Data Segmentation scheme extracts is more even; According to predefined according to file size Lookup protocol random number range, be an emphasis of this strategy.
As shown in Figure 1, the detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded.
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously.
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality.
4) data of needs being uploaded are encrypted and upload according to significance level.
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
As shown in Figure 2, the detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
By the method, the present invention can effectively prevent that malicious user or cloud storage administrator from illegally stealing, distorting user's private data, for user provides a kind of low expense of client, data security privacy protection policy in the cloud storage system of high safety.
The foregoing is only embodiments of the invention, within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (6)

1. the data security protection method based on Data Segmentation, is characterized in that its concrete protection step is:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, user's uploading data: according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
The Data Segmentation that first in client, user need to be stored in cloud storage system is small data piece and long data block; Secondly in client, carry out Hash operation, then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted; After finally long data block being encrypted according to the level of security demand of user's appointment, by Internet Internet Transmission, to the memory file system in high in the clouds, carry out piecemeal storage;
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
2. a kind of data security protection method based on Data Segmentation according to claim 1, it is characterized in that: described high in the clouds is divided into two parts: be first cloud storage control server, Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously; Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
3. a kind of data security protection method based on Data Segmentation according to claim 2, it is characterized in that: the small block data that the small data piece of cutting apart in described step 2 is fixed size, it cuts apart realization flow: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.
4. a kind of data security protection method based on Data Segmentation according to claim 2, it is characterized in that: the small data piece of cutting apart in described step 2 is the small block data of on-fixed size, it cuts apart realization flow: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.
5. according to a kind of data security protection method based on Data Segmentation described in claim 3 or 4, it is characterized in that: the detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded;
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously;
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality;
4) data of needs being uploaded are encrypted and upload according to significance level;
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
6. according to a kind of data security protection method based on Data Segmentation described in claim 3 or 4, it is characterized in that: the detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
CN201310587754.7A 2013-11-21 2013-11-21 Data safety protection method based on data partitioning Pending CN103607393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310587754.7A CN103607393A (en) 2013-11-21 2013-11-21 Data safety protection method based on data partitioning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310587754.7A CN103607393A (en) 2013-11-21 2013-11-21 Data safety protection method based on data partitioning

Publications (1)

Publication Number Publication Date
CN103607393A true CN103607393A (en) 2014-02-26

Family

ID=50125593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310587754.7A Pending CN103607393A (en) 2013-11-21 2013-11-21 Data safety protection method based on data partitioning

Country Status (1)

Country Link
CN (1) CN103607393A (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955528A (en) * 2014-05-09 2014-07-30 北京华信博研科技有限公司 File data writing method, and file data reading method and device
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage
CN104468621A (en) * 2014-12-22 2015-03-25 上海斐讯数据通信技术有限公司 Method for improving password safety degree and encryption device thereof
CN104636673A (en) * 2015-03-10 2015-05-20 四川中科腾信科技有限公司 Safe data storage method under big data background
CN105320711A (en) * 2014-08-01 2016-02-10 纬创资通股份有限公司 Mass data access method and system using the same
WO2016037488A1 (en) * 2014-09-11 2016-03-17 中兴通讯股份有限公司 Method and device for protecting sensitive information
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment
CN105975877A (en) * 2016-07-01 2016-09-28 中国联合网络通信有限公司重庆市分公司 Safe storage method for sensitive file
CN106230856A (en) * 2016-08-30 2016-12-14 孟玲 A kind of System of Industrial Device Controls based on Internet of Things
CN106453248A (en) * 2016-08-30 2017-02-22 孟玲 Home object information data management system
CN106570425A (en) * 2015-10-10 2017-04-19 北京奇虎科技有限公司 Hard disk data encryption method and system
CN106612272A (en) * 2016-07-12 2017-05-03 四川用联信息技术有限公司 Verification and recovery algorithm for data tampering in cloud storage
CN106790356A (en) * 2016-11-15 2017-05-31 广东欧珀移动通信有限公司 A kind of data backup, method for down loading and relevant device
CN106919348A (en) * 2017-03-24 2017-07-04 枣庄学院 Distributed memory system and storage method that anti-violence is cracked
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN107256359A (en) * 2017-05-22 2017-10-17 丁爱民 A kind of anti-data-leakage coding, coding/decoding method, apparatus and system
CN107425962A (en) * 2017-04-21 2017-12-01 济南浪潮高新科技投资发展有限公司 A kind of high in the clouds data guard method of data staging encryption and segmentation
CN107480543A (en) * 2017-08-07 2017-12-15 安徽优易思信息技术有限责任公司 The read method and device of a kind of data
CN107563208A (en) * 2017-08-10 2018-01-09 北京中科同向信息技术有限公司 A kind of method of security of private data protection
CN107612897A (en) * 2017-09-07 2018-01-19 唐冬香 A kind of data transmission method
CN107645558A (en) * 2017-09-30 2018-01-30 华侨大学 A kind of three-level secure cloud storage method calculated based on mist
CN107729766A (en) * 2017-09-30 2018-02-23 中国联合网络通信集团有限公司 Date storage method, method for reading data and its system
CN108881230A (en) * 2018-06-21 2018-11-23 佛山科学技术学院 A kind of safe transmission method and device of government affairs big data
WO2019000132A1 (en) * 2017-06-25 2019-01-03 深圳市秀趣品牌文化传播有限公司 E-commerce data encryption transmission method
CN109558754A (en) * 2018-11-30 2019-04-02 安徽继远软件有限公司 A kind of anti-method and apparatus stolen of Backup Data
CN110020546A (en) * 2019-01-07 2019-07-16 南京邮电大学 A kind of private data cascade protection method
CN110633559A (en) * 2019-09-05 2019-12-31 南京中诚区块链研究院有限公司 Financial security evidence storage platform system and method based on block chain
CN110768936A (en) * 2018-07-27 2020-02-07 华为技术有限公司 Method and device for reporting private data and storage medium
CN110909385A (en) * 2019-11-19 2020-03-24 江苏恒宝智能系统技术有限公司 Safety management method for storage data in esim card
CN110968885A (en) * 2019-12-18 2020-04-07 支付宝(杭州)信息技术有限公司 Model training data storage method and device, electronic equipment and storage medium
CN111064774A (en) * 2019-11-29 2020-04-24 苏州浪潮智能科技有限公司 Distributed data storage method and device
CN111797422A (en) * 2019-04-09 2020-10-20 Oppo广东移动通信有限公司 Data privacy protection query method and device, storage medium and electronic equipment
CN113626838A (en) * 2021-07-19 2021-11-09 杭州加速科技有限公司 PCIE (peripheral component interface express) -based block encryption storage method and device
CN114500073A (en) * 2022-02-11 2022-05-13 浪潮云信息技术股份公司 User data cut-over method and system supporting privacy protection in cloud storage system
US11520930B2 (en) 2014-09-26 2022-12-06 Alcatel Lucent Privacy protection for third party data sharing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN102891876A (en) * 2011-07-22 2013-01-23 中兴通讯股份有限公司 Method and system for distributed data encryption under cloud computing environment
CN103248632A (en) * 2013-05-29 2013-08-14 中国人民解放军理工大学 Synchronous disc data security protection writing and reading method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891876A (en) * 2011-07-22 2013-01-23 中兴通讯股份有限公司 Method and system for distributed data encryption under cloud computing environment
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103248632A (en) * 2013-05-29 2013-08-14 中国人民解放军理工大学 Synchronous disc data security protection writing and reading method

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955528A (en) * 2014-05-09 2014-07-30 北京华信博研科技有限公司 File data writing method, and file data reading method and device
CN105320711A (en) * 2014-08-01 2016-02-10 纬创资通股份有限公司 Mass data access method and system using the same
CN105320711B (en) * 2014-08-01 2019-08-30 纬创资通股份有限公司 Mass data access method and system using the same
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104184740B (en) * 2014-09-04 2019-02-05 中电长城网际系统应用有限公司 Trusted transmission method, trusted third party and credible delivery system
WO2016037488A1 (en) * 2014-09-11 2016-03-17 中兴通讯股份有限公司 Method and device for protecting sensitive information
US11520930B2 (en) 2014-09-26 2022-12-06 Alcatel Lucent Privacy protection for third party data sharing
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage
CN104408381B (en) * 2014-11-27 2017-04-12 大连理工大学 Protection method of data integrity in cloud storage
CN104468621A (en) * 2014-12-22 2015-03-25 上海斐讯数据通信技术有限公司 Method for improving password safety degree and encryption device thereof
CN104468621B (en) * 2014-12-22 2018-04-06 上海斐讯数据通信技术有限公司 A kind of method and its encryption device for improving cryptosecurity degree
CN104636673B (en) * 2015-03-10 2017-08-29 四川中科腾信科技有限公司 A kind of secure storage method of data under big data background
CN104636673A (en) * 2015-03-10 2015-05-20 四川中科腾信科技有限公司 Safe data storage method under big data background
CN106570425A (en) * 2015-10-10 2017-04-19 北京奇虎科技有限公司 Hard disk data encryption method and system
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment
CN105975877B (en) * 2016-07-01 2019-06-21 中国联合网络通信有限公司重庆市分公司 A kind of sensitive document secure storage method
CN105975877A (en) * 2016-07-01 2016-09-28 中国联合网络通信有限公司重庆市分公司 Safe storage method for sensitive file
CN106612272A (en) * 2016-07-12 2017-05-03 四川用联信息技术有限公司 Verification and recovery algorithm for data tampering in cloud storage
CN106453248A (en) * 2016-08-30 2017-02-22 孟玲 Home object information data management system
CN106230856A (en) * 2016-08-30 2016-12-14 孟玲 A kind of System of Industrial Device Controls based on Internet of Things
CN106790356A (en) * 2016-11-15 2017-05-31 广东欧珀移动通信有限公司 A kind of data backup, method for down loading and relevant device
CN106919348A (en) * 2017-03-24 2017-07-04 枣庄学院 Distributed memory system and storage method that anti-violence is cracked
CN107425962A (en) * 2017-04-21 2017-12-01 济南浪潮高新科技投资发展有限公司 A kind of high in the clouds data guard method of data staging encryption and segmentation
CN107256359A (en) * 2017-05-22 2017-10-17 丁爱民 A kind of anti-data-leakage coding, coding/decoding method, apparatus and system
WO2019000132A1 (en) * 2017-06-25 2019-01-03 深圳市秀趣品牌文化传播有限公司 E-commerce data encryption transmission method
CN107480543A (en) * 2017-08-07 2017-12-15 安徽优易思信息技术有限责任公司 The read method and device of a kind of data
CN107563208A (en) * 2017-08-10 2018-01-09 北京中科同向信息技术有限公司 A kind of method of security of private data protection
CN107612897A (en) * 2017-09-07 2018-01-19 唐冬香 A kind of data transmission method
CN107729766B (en) * 2017-09-30 2020-02-07 中国联合网络通信集团有限公司 Data storage method, data reading method and system thereof
CN107645558A (en) * 2017-09-30 2018-01-30 华侨大学 A kind of three-level secure cloud storage method calculated based on mist
CN107729766A (en) * 2017-09-30 2018-02-23 中国联合网络通信集团有限公司 Date storage method, method for reading data and its system
CN108881230A (en) * 2018-06-21 2018-11-23 佛山科学技术学院 A kind of safe transmission method and device of government affairs big data
CN108881230B (en) * 2018-06-21 2020-09-22 佛山科学技术学院 Secure transmission method and device for government affair big data
CN110768936A (en) * 2018-07-27 2020-02-07 华为技术有限公司 Method and device for reporting private data and storage medium
CN110768936B (en) * 2018-07-27 2021-05-18 华为技术有限公司 Method and device for reporting private data and storage medium
EP3823237A4 (en) * 2018-07-27 2021-08-25 Huawei Technologies Co., Ltd. Privacy data reporting method, device, and storage medium
US11531778B2 (en) 2018-07-27 2022-12-20 Huawei Technologies Co., Ltd. Privacy data reporting method and apparatus, and storage medium
CN109558754A (en) * 2018-11-30 2019-04-02 安徽继远软件有限公司 A kind of anti-method and apparatus stolen of Backup Data
CN109558754B (en) * 2018-11-30 2022-04-01 安徽继远软件有限公司 Backup data anti-theft method and device
CN110020546B (en) * 2019-01-07 2020-12-04 南京邮电大学 Privacy data grading protection method
CN110020546A (en) * 2019-01-07 2019-07-16 南京邮电大学 A kind of private data cascade protection method
CN111797422A (en) * 2019-04-09 2020-10-20 Oppo广东移动通信有限公司 Data privacy protection query method and device, storage medium and electronic equipment
CN110633559A (en) * 2019-09-05 2019-12-31 南京中诚区块链研究院有限公司 Financial security evidence storage platform system and method based on block chain
CN110909385B (en) * 2019-11-19 2022-04-01 恒宝股份有限公司 Safety management method for storage data in esim card
CN110909385A (en) * 2019-11-19 2020-03-24 江苏恒宝智能系统技术有限公司 Safety management method for storage data in esim card
CN111064774A (en) * 2019-11-29 2020-04-24 苏州浪潮智能科技有限公司 Distributed data storage method and device
CN111064774B (en) * 2019-11-29 2022-12-27 苏州浪潮智能科技有限公司 Distributed data storage method and device
CN110968885A (en) * 2019-12-18 2020-04-07 支付宝(杭州)信息技术有限公司 Model training data storage method and device, electronic equipment and storage medium
CN113626838A (en) * 2021-07-19 2021-11-09 杭州加速科技有限公司 PCIE (peripheral component interface express) -based block encryption storage method and device
CN114500073A (en) * 2022-02-11 2022-05-13 浪潮云信息技术股份公司 User data cut-over method and system supporting privacy protection in cloud storage system
CN114500073B (en) * 2022-02-11 2024-04-12 浪潮云信息技术股份公司 User data cutting method and system supporting privacy protection in cloud storage system

Similar Documents

Publication Publication Date Title
CN103607393A (en) Data safety protection method based on data partitioning
CN114726643B (en) Data storage and access methods and devices on cloud platform
CN113326317B (en) Block chain certification method and system based on isomorphic multi-chain architecture
US10114969B1 (en) Ultra-secure blockchain-based electronic information transfer system
CN102664928A (en) Data secure access method used for cloud storage and user terminal system
CN102075542B (en) Cloud computing data security supporting platform
CN105656859B (en) Tax control equipment software safety online upgrading method and system
Trenwith et al. Digital forensic readiness in the cloud
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
US11329817B2 (en) Protecting data using controlled corruption in computer networks
US20120159175A1 (en) Deduplicated and Encrypted Backups
US20130290731A1 (en) Systems and methods for storing and verifying security information
CN103530201A (en) Safety data repetition removing method and system applicable to backup system
CN103457733A (en) Data sharing method and system under cloud computing environment
KR101285281B1 (en) Security system and its security method for self-organization storage
CN111104691A (en) Sensitive information processing method and device, storage medium and equipment
CN102325026A (en) Account password secure encryption system
CN105407119A (en) Cloud computing system and method thereof
KR20150045790A (en) Method and Apparatus for authenticating and managing an application using trusted platform module
AU2018391625A1 (en) Re-encrypting data on a hash chain
CN105072134A (en) Cloud disk system file secure transmission method based on three-level key
Virvilis et al. A cloud provider-agnostic secure storage protocol
CN111709040A (en) Sensitive data oriented secure discrete storage method
Pawar et al. Providing security and integrity for data stored in cloud storage
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140226