CN103607393A - Data safety protection method based on data partitioning - Google Patents
Data safety protection method based on data partitioning Download PDFInfo
- Publication number
- CN103607393A CN103607393A CN201310587754.7A CN201310587754A CN103607393A CN 103607393 A CN103607393 A CN 103607393A CN 201310587754 A CN201310587754 A CN 201310587754A CN 103607393 A CN103607393 A CN 103607393A
- Authority
- CN
- China
- Prior art keywords
- data
- block
- small
- file
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a data safety protection method based on data partitioning. According to an employed strategy, different data needing storage at a client end are reasonably partitioned into great and small data blocks, and the great and small data blocks are respectively deployed in local and non-local cloud storage systems. Compared with the prior art, the data safety protection method based on data partitioning can effectively prevent a malicious user or a cloud storage administrator from carrying out illegal stealing and tampering of privacy data of users, provides more choices for safety of different data for users and has advantages of improved system flexibility, strong practicality and easy popularization.
Description
Technical field
The present invention relates to Computer Applied Technology field, specifically a kind of data security protection method based on Data Segmentation.
Background technology
In recent years, as the cloud service system data security of the companies such as Google leak data event and Microsoft, the Amazon event that is under suspicion, further aggravated industry to the Information Security of cloud application, reliability and credible worry; The core root of the problem of data safety of the existence in cloud storage system is that data management power is with proprietorial separated.Data under user are contracted out to cloud storage provider, and cloud storage provider has just obtained the priority access power of these data.Fact proved, owing to existing internal staff's dereliction of duty, assault and the system failure to cause the kinds of risks such as security mechanism inefficacy, cloud storage provider does not have sufficient evidence to allow user be sure of that its data are correctly stored and use.For example, whether user data is stolen and sold to its rival, whether user's data-privacy is extracted or analyzes, and user's data have country or the region that is not correctly stored in its appointment, and data do not have is strictly destroyed deletion etc. up hill and dale by customer requirements.
In present stage, in cloud storage system mainly there is the problem of following 3 aspects in the assurance policy mechanism of Information Security aspect:
1, the larger overhead that traditional cloud storage data-privacy security mechanism based on simple encryption technology is brought in actual process operation data and loaded down with trivial details, once and by hacker, cracked, data will be divulged a secret or lose;
The prestige of 2 ,Yun storage service providers and qualification cannot guarantee to allow user courageously relieved being put in the space that cloud storage provider provides that data are revealed the whole truth carry out data storage;
3, in cloud stores service, the storage of data need to be based on widely used Internet network, because data are stored transmission Network Based, the probability of being intercepted and captured in the process of transmission has also increased the risk of data.
Summary of the invention
Technical assignment of the present invention is to solve the deficiencies in the prior art, and a kind of data security protection method based on Data Segmentation is provided.
Technical scheme of the present invention realizes in the following manner, this kind of data security protection method based on Data Segmentation, and it specifically protects step to be:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, user's uploading data: according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
The Data Segmentation that first in client, user need to be stored in cloud storage system is small data piece and long data block; Secondly in client, carry out Hash operation, then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted; After finally long data block being encrypted according to the level of security demand of user's appointment, by Internet Internet Transmission, to the memory file system in high in the clouds, carry out piecemeal storage;
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
Described high in the clouds is divided into two parts: be first cloud storage control server, Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously; Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
The small block data that the small data piece of cutting apart in described step 2 is fixed size, it is cut apart realization flow and is: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.
The small data piece of cutting apart in described step 2 is the small block data of on-fixed size, and it is cut apart realization flow and is: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.
The detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded;
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously;
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality;
4) data of needs being uploaded are encrypted and upload according to significance level;
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
The detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
The beneficial effect that the present invention compared with prior art produced is:
A kind of data security protection method based on Data Segmentation of the present invention adopts the data that the difference of client need to be preserved to be rationally divided into size data piece, respectively small block data and chunk data are deployed in again to the strategy in the cloud storage system of local and remote side, solved larger overhead that traditional cloud storage data-privacy security mechanism based on simple encryption technology brings in actual process operation data and loaded down with trivial details, can effectively prevent that malicious user or cloud storage administrator from illegally stealing, distorting user's private data; Design consideration of the present invention will be stored the different level of security demands of data, the fixed-size fritter technology of selection that can be in good time or big or small unfixed fritter technology, for client provides more choices for the fail safe of different pieces of information, improved the flexibility of system; The present invention proposes to give the invention of data-splitting strategy; can provide a kind of low expense of client, data security secret protection technology in the cloud storage system of high safety for user; realize user and really oneself grasped the storage scheme of data security in cloud storage system; practical; applied widely, be easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is data upload flow chart in cloud storage system of the present invention.
Accompanying drawing 2 is that in cloud storage system of the present invention, data are extracted flow chart.
Accompanying drawing 3 is the small block data schematic flow sheets that extract fixed size in the present invention.
Accompanying drawing 4 is the small block data schematic flow sheets that extract on-fixed size in the present invention.
Embodiment
Below in conjunction with accompanying drawing, a kind of data security protection method based on Data Segmentation of the present invention is described in detail below.
As shown in accompanying drawing 2, Fig. 3, the invention provides a kind of data security protection method based on Data Segmentation, it specifically protects step to be:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, the user who has bought cloud stores service can use cloud storage system to carry out the storage of data.When the user of client need to carry out data upload, carry out Request System and carry out data when storage, according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
At user side, it is FTP client FTP, FTP client FTP is responsible for monitoring and is caught local system operation, data to the needs storage obtaining are carried out large and small cutting apart, carry out Hash operation (Hash), then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted.Being divided into beyond the clouds two parts, is first cloud storage control server, and Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously.Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
Security mechanism based on Data Segmentation in the present invention can resolve into n piecemeal by a file, possess wherein arbitrarily at least k(k≤n completely) during individual piecemeal, could recover original, when this method for designing makes any n-k minute lost block or damages, still can recover original, thereby improve the reliabilty and availability of data; And when any not enough k piecemeal is stolen, can not be reduced into original, thereby have improved fail safe.Data Segmentation mechanism is in the present invention that after data file is divided into large and small data block, store in strange land, stores long data block in cloud storage system, at this locality storage small data piece, according to the size of data block, can be divided into two kinds of strategies.
(1) as shown in Figure 3, the small block data that the small data piece of cutting apart in described step 2 is fixed size, it is cut apart realization flow and is: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.This tactful advantage is that small block data size is fixing, and the pressure that can not bring user side storage or read-write to process, is convenient to local storage administration.
(2) as shown in Figure 4, the small data piece of cutting apart in described step 2 is the small block data of on-fixed size, and it is cut apart realization flow and is: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.The byte location that such Data Segmentation scheme extracts is more even; According to predefined according to file size Lookup protocol random number range, be an emphasis of this strategy.
As shown in Figure 1, the detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded.
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously.
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality.
4) data of needs being uploaded are encrypted and upload according to significance level.
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
As shown in Figure 2, the detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
By the method, the present invention can effectively prevent that malicious user or cloud storage administrator from illegally stealing, distorting user's private data, for user provides a kind of low expense of client, data security privacy protection policy in the cloud storage system of high safety.
The foregoing is only embodiments of the invention, within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (6)
1. the data security protection method based on Data Segmentation, is characterized in that its concrete protection step is:
One, cloud storage system is set, this cloud storage system comprises client and high in the clouds, and client is responsible for monitoring and is caught local system operation;
Two, user's uploading data: according to the distribution of main control server, physical equipment corresponding to data block deposit in, it specifically deposits step in and is:
The Data Segmentation that first in client, user need to be stored in cloud storage system is small data piece and long data block; Secondly in client, carry out Hash operation, then in this locality, preserve small data piece and cryptographic Hash, adopt the data encryption technology of varying strength to be encrypted; After finally long data block being encrypted according to the level of security demand of user's appointment, by Internet Internet Transmission, to the memory file system in high in the clouds, carry out piecemeal storage;
Three, user extracts data: the metadata information by inquiry main control server, extracts corresponding data block.
2. a kind of data security protection method based on Data Segmentation according to claim 1, it is characterized in that: described high in the clouds is divided into two parts: be first cloud storage control server, Control Server mainly carries out that data that registered user uploads are carried out piecemeal and metadata is processed operation, the request of data of client is authenticated and access control simultaneously; Next is cloud store storage server, and storage server system is mainly responsible for actual hosted data storage.
3. a kind of data security protection method based on Data Segmentation according to claim 2, it is characterized in that: the small block data that the small data piece of cutting apart in described step 2 is fixed size, it cuts apart realization flow: first, produce the random number sequence between 0~N, N is file size, and sequence length equals the big or small N/10 of data; Secondly random number sequence is arranged from small to large, just obtained from file, extracting the position of byte; Finally the byte of correspondence position is split from original, preserve as small block data together with tactic random number sequence; File after divided is as chunk data.
4. a kind of data security protection method based on Data Segmentation according to claim 2, it is characterized in that: the small data piece of cutting apart in described step 2 is the small block data of on-fixed size, it cuts apart realization flow: first, and according to file size Lookup protocol random number range; Secondly, system produces one group and random number sequence in scope is set as extracting positional increment; Again, start to extract byte from fixed position, this position adds that random number obtains the next byte location that extracts, and extracting byte-sized is exactly the size of increment random number, until next byte location is greater than size of data to be uploaded; Finally, the byte of correspondence position is extracted from original, preserve as small block data together with tactic random number sequence; Residue file is as chunk data.
5. according to a kind of data security protection method based on Data Segmentation described in claim 3 or 4, it is characterized in that: the detailed process of described step 2 is:
1) user logins by the cloud storage system of oneself, the data file that selection need to be uploaded;
2) file that will upload is carried out to Hash operation, calculate a value, the data of uploading are carried out to Data Segmentation according to size simultaneously;
3) cryptographic Hash generating and the small block data splitting are carried out to data storage in this locality;
4) data of needs being uploaded are encrypted and upload according to significance level;
5) in cloud storage system, there is main control server to carry out the piecemeal of data and the processing of metadata, have main control server to control, in the storage of the enterprising row data of distributed memory system.
6. according to a kind of data security protection method based on Data Segmentation described in claim 3 or 4, it is characterized in that: the detailed process of described step 3 is:
1) user, by username and password logon server, selects to need the file of download;
2) cloud storage system divides block message, metadata and data block memory location according to sign to main control server data query;
3) according to data block, divide block message and memory location, from distributed storage server, take out all data blocks, according to partition strategy, data block is merged into chunk data;
4) desired data is downloaded to this locality, the encryption policy while uploading at that time according to data is decrypted;
5) from this locality, take out the small block data of preserving, splice with chunk data, obtain original, and verification of data integrity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310587754.7A CN103607393A (en) | 2013-11-21 | 2013-11-21 | Data safety protection method based on data partitioning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310587754.7A CN103607393A (en) | 2013-11-21 | 2013-11-21 | Data safety protection method based on data partitioning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103607393A true CN103607393A (en) | 2014-02-26 |
Family
ID=50125593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310587754.7A Pending CN103607393A (en) | 2013-11-21 | 2013-11-21 | Data safety protection method based on data partitioning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103607393A (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103955528A (en) * | 2014-05-09 | 2014-07-30 | 北京华信博研科技有限公司 | File data writing method, and file data reading method and device |
CN104184740A (en) * | 2014-09-04 | 2014-12-03 | 中电长城网际系统应用有限公司 | Credible transmission method, credible third party and credible transmission system |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
CN104468621A (en) * | 2014-12-22 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Method for improving password safety degree and encryption device thereof |
CN104636673A (en) * | 2015-03-10 | 2015-05-20 | 四川中科腾信科技有限公司 | Safe data storage method under big data background |
CN105320711A (en) * | 2014-08-01 | 2016-02-10 | 纬创资通股份有限公司 | Mass data access method and system using the same |
WO2016037488A1 (en) * | 2014-09-11 | 2016-03-17 | 中兴通讯股份有限公司 | Method and device for protecting sensitive information |
CN105893857A (en) * | 2016-03-31 | 2016-08-24 | 北京金山安全软件有限公司 | File encryption method, device and equipment |
CN105975877A (en) * | 2016-07-01 | 2016-09-28 | 中国联合网络通信有限公司重庆市分公司 | Safe storage method for sensitive file |
CN106230856A (en) * | 2016-08-30 | 2016-12-14 | 孟玲 | A kind of System of Industrial Device Controls based on Internet of Things |
CN106453248A (en) * | 2016-08-30 | 2017-02-22 | 孟玲 | Home object information data management system |
CN106570425A (en) * | 2015-10-10 | 2017-04-19 | 北京奇虎科技有限公司 | Hard disk data encryption method and system |
CN106612272A (en) * | 2016-07-12 | 2017-05-03 | 四川用联信息技术有限公司 | Verification and recovery algorithm for data tampering in cloud storage |
CN106790356A (en) * | 2016-11-15 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of data backup, method for down loading and relevant device |
CN106919348A (en) * | 2017-03-24 | 2017-07-04 | 枣庄学院 | Distributed memory system and storage method that anti-violence is cracked |
CN106936771A (en) * | 2015-12-29 | 2017-07-07 | 航天信息股份有限公司 | A kind of secure cloud storage method and system based on graded encryption |
CN107256359A (en) * | 2017-05-22 | 2017-10-17 | 丁爱民 | A kind of anti-data-leakage coding, coding/decoding method, apparatus and system |
CN107425962A (en) * | 2017-04-21 | 2017-12-01 | 济南浪潮高新科技投资发展有限公司 | A kind of high in the clouds data guard method of data staging encryption and segmentation |
CN107480543A (en) * | 2017-08-07 | 2017-12-15 | 安徽优易思信息技术有限责任公司 | The read method and device of a kind of data |
CN107563208A (en) * | 2017-08-10 | 2018-01-09 | 北京中科同向信息技术有限公司 | A kind of method of security of private data protection |
CN107612897A (en) * | 2017-09-07 | 2018-01-19 | 唐冬香 | A kind of data transmission method |
CN107645558A (en) * | 2017-09-30 | 2018-01-30 | 华侨大学 | A kind of three-level secure cloud storage method calculated based on mist |
CN107729766A (en) * | 2017-09-30 | 2018-02-23 | 中国联合网络通信集团有限公司 | Date storage method, method for reading data and its system |
CN108881230A (en) * | 2018-06-21 | 2018-11-23 | 佛山科学技术学院 | A kind of safe transmission method and device of government affairs big data |
WO2019000132A1 (en) * | 2017-06-25 | 2019-01-03 | 深圳市秀趣品牌文化传播有限公司 | E-commerce data encryption transmission method |
CN109558754A (en) * | 2018-11-30 | 2019-04-02 | 安徽继远软件有限公司 | A kind of anti-method and apparatus stolen of Backup Data |
CN110020546A (en) * | 2019-01-07 | 2019-07-16 | 南京邮电大学 | A kind of private data cascade protection method |
CN110633559A (en) * | 2019-09-05 | 2019-12-31 | 南京中诚区块链研究院有限公司 | Financial security evidence storage platform system and method based on block chain |
CN110768936A (en) * | 2018-07-27 | 2020-02-07 | 华为技术有限公司 | Method and device for reporting private data and storage medium |
CN110909385A (en) * | 2019-11-19 | 2020-03-24 | 江苏恒宝智能系统技术有限公司 | Safety management method for storage data in esim card |
CN110968885A (en) * | 2019-12-18 | 2020-04-07 | 支付宝(杭州)信息技术有限公司 | Model training data storage method and device, electronic equipment and storage medium |
CN111064774A (en) * | 2019-11-29 | 2020-04-24 | 苏州浪潮智能科技有限公司 | Distributed data storage method and device |
CN111797422A (en) * | 2019-04-09 | 2020-10-20 | Oppo广东移动通信有限公司 | Data privacy protection query method and device, storage medium and electronic equipment |
CN113626838A (en) * | 2021-07-19 | 2021-11-09 | 杭州加速科技有限公司 | PCIE (peripheral component interface express) -based block encryption storage method and device |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
US11520930B2 (en) | 2014-09-26 | 2022-12-06 | Alcatel Lucent | Privacy protection for third party data sharing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102664928A (en) * | 2012-04-01 | 2012-09-12 | 南京邮电大学 | Data secure access method used for cloud storage and user terminal system |
CN102891876A (en) * | 2011-07-22 | 2013-01-23 | 中兴通讯股份有限公司 | Method and system for distributed data encryption under cloud computing environment |
CN103248632A (en) * | 2013-05-29 | 2013-08-14 | 中国人民解放军理工大学 | Synchronous disc data security protection writing and reading method |
-
2013
- 2013-11-21 CN CN201310587754.7A patent/CN103607393A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102891876A (en) * | 2011-07-22 | 2013-01-23 | 中兴通讯股份有限公司 | Method and system for distributed data encryption under cloud computing environment |
CN102664928A (en) * | 2012-04-01 | 2012-09-12 | 南京邮电大学 | Data secure access method used for cloud storage and user terminal system |
CN103248632A (en) * | 2013-05-29 | 2013-08-14 | 中国人民解放军理工大学 | Synchronous disc data security protection writing and reading method |
Cited By (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103955528A (en) * | 2014-05-09 | 2014-07-30 | 北京华信博研科技有限公司 | File data writing method, and file data reading method and device |
CN105320711A (en) * | 2014-08-01 | 2016-02-10 | 纬创资通股份有限公司 | Mass data access method and system using the same |
CN105320711B (en) * | 2014-08-01 | 2019-08-30 | 纬创资通股份有限公司 | Mass data access method and system using the same |
CN104184740A (en) * | 2014-09-04 | 2014-12-03 | 中电长城网际系统应用有限公司 | Credible transmission method, credible third party and credible transmission system |
CN104184740B (en) * | 2014-09-04 | 2019-02-05 | 中电长城网际系统应用有限公司 | Trusted transmission method, trusted third party and credible delivery system |
WO2016037488A1 (en) * | 2014-09-11 | 2016-03-17 | 中兴通讯股份有限公司 | Method and device for protecting sensitive information |
US11520930B2 (en) | 2014-09-26 | 2022-12-06 | Alcatel Lucent | Privacy protection for third party data sharing |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
CN104408381B (en) * | 2014-11-27 | 2017-04-12 | 大连理工大学 | Protection method of data integrity in cloud storage |
CN104468621A (en) * | 2014-12-22 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Method for improving password safety degree and encryption device thereof |
CN104468621B (en) * | 2014-12-22 | 2018-04-06 | 上海斐讯数据通信技术有限公司 | A kind of method and its encryption device for improving cryptosecurity degree |
CN104636673B (en) * | 2015-03-10 | 2017-08-29 | 四川中科腾信科技有限公司 | A kind of secure storage method of data under big data background |
CN104636673A (en) * | 2015-03-10 | 2015-05-20 | 四川中科腾信科技有限公司 | Safe data storage method under big data background |
CN106570425A (en) * | 2015-10-10 | 2017-04-19 | 北京奇虎科技有限公司 | Hard disk data encryption method and system |
CN106936771A (en) * | 2015-12-29 | 2017-07-07 | 航天信息股份有限公司 | A kind of secure cloud storage method and system based on graded encryption |
CN105893857A (en) * | 2016-03-31 | 2016-08-24 | 北京金山安全软件有限公司 | File encryption method, device and equipment |
CN105975877B (en) * | 2016-07-01 | 2019-06-21 | 中国联合网络通信有限公司重庆市分公司 | A kind of sensitive document secure storage method |
CN105975877A (en) * | 2016-07-01 | 2016-09-28 | 中国联合网络通信有限公司重庆市分公司 | Safe storage method for sensitive file |
CN106612272A (en) * | 2016-07-12 | 2017-05-03 | 四川用联信息技术有限公司 | Verification and recovery algorithm for data tampering in cloud storage |
CN106453248A (en) * | 2016-08-30 | 2017-02-22 | 孟玲 | Home object information data management system |
CN106230856A (en) * | 2016-08-30 | 2016-12-14 | 孟玲 | A kind of System of Industrial Device Controls based on Internet of Things |
CN106790356A (en) * | 2016-11-15 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of data backup, method for down loading and relevant device |
CN106919348A (en) * | 2017-03-24 | 2017-07-04 | 枣庄学院 | Distributed memory system and storage method that anti-violence is cracked |
CN107425962A (en) * | 2017-04-21 | 2017-12-01 | 济南浪潮高新科技投资发展有限公司 | A kind of high in the clouds data guard method of data staging encryption and segmentation |
CN107256359A (en) * | 2017-05-22 | 2017-10-17 | 丁爱民 | A kind of anti-data-leakage coding, coding/decoding method, apparatus and system |
WO2019000132A1 (en) * | 2017-06-25 | 2019-01-03 | 深圳市秀趣品牌文化传播有限公司 | E-commerce data encryption transmission method |
CN107480543A (en) * | 2017-08-07 | 2017-12-15 | 安徽优易思信息技术有限责任公司 | The read method and device of a kind of data |
CN107563208A (en) * | 2017-08-10 | 2018-01-09 | 北京中科同向信息技术有限公司 | A kind of method of security of private data protection |
CN107612897A (en) * | 2017-09-07 | 2018-01-19 | 唐冬香 | A kind of data transmission method |
CN107729766B (en) * | 2017-09-30 | 2020-02-07 | 中国联合网络通信集团有限公司 | Data storage method, data reading method and system thereof |
CN107645558A (en) * | 2017-09-30 | 2018-01-30 | 华侨大学 | A kind of three-level secure cloud storage method calculated based on mist |
CN107729766A (en) * | 2017-09-30 | 2018-02-23 | 中国联合网络通信集团有限公司 | Date storage method, method for reading data and its system |
CN108881230A (en) * | 2018-06-21 | 2018-11-23 | 佛山科学技术学院 | A kind of safe transmission method and device of government affairs big data |
CN108881230B (en) * | 2018-06-21 | 2020-09-22 | 佛山科学技术学院 | Secure transmission method and device for government affair big data |
CN110768936A (en) * | 2018-07-27 | 2020-02-07 | 华为技术有限公司 | Method and device for reporting private data and storage medium |
CN110768936B (en) * | 2018-07-27 | 2021-05-18 | 华为技术有限公司 | Method and device for reporting private data and storage medium |
EP3823237A4 (en) * | 2018-07-27 | 2021-08-25 | Huawei Technologies Co., Ltd. | Privacy data reporting method, device, and storage medium |
US11531778B2 (en) | 2018-07-27 | 2022-12-20 | Huawei Technologies Co., Ltd. | Privacy data reporting method and apparatus, and storage medium |
CN109558754A (en) * | 2018-11-30 | 2019-04-02 | 安徽继远软件有限公司 | A kind of anti-method and apparatus stolen of Backup Data |
CN109558754B (en) * | 2018-11-30 | 2022-04-01 | 安徽继远软件有限公司 | Backup data anti-theft method and device |
CN110020546B (en) * | 2019-01-07 | 2020-12-04 | 南京邮电大学 | Privacy data grading protection method |
CN110020546A (en) * | 2019-01-07 | 2019-07-16 | 南京邮电大学 | A kind of private data cascade protection method |
CN111797422A (en) * | 2019-04-09 | 2020-10-20 | Oppo广东移动通信有限公司 | Data privacy protection query method and device, storage medium and electronic equipment |
CN110633559A (en) * | 2019-09-05 | 2019-12-31 | 南京中诚区块链研究院有限公司 | Financial security evidence storage platform system and method based on block chain |
CN110909385B (en) * | 2019-11-19 | 2022-04-01 | 恒宝股份有限公司 | Safety management method for storage data in esim card |
CN110909385A (en) * | 2019-11-19 | 2020-03-24 | 江苏恒宝智能系统技术有限公司 | Safety management method for storage data in esim card |
CN111064774A (en) * | 2019-11-29 | 2020-04-24 | 苏州浪潮智能科技有限公司 | Distributed data storage method and device |
CN111064774B (en) * | 2019-11-29 | 2022-12-27 | 苏州浪潮智能科技有限公司 | Distributed data storage method and device |
CN110968885A (en) * | 2019-12-18 | 2020-04-07 | 支付宝(杭州)信息技术有限公司 | Model training data storage method and device, electronic equipment and storage medium |
CN113626838A (en) * | 2021-07-19 | 2021-11-09 | 杭州加速科技有限公司 | PCIE (peripheral component interface express) -based block encryption storage method and device |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
CN114500073B (en) * | 2022-02-11 | 2024-04-12 | 浪潮云信息技术股份公司 | User data cutting method and system supporting privacy protection in cloud storage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607393A (en) | Data safety protection method based on data partitioning | |
CN114726643B (en) | Data storage and access methods and devices on cloud platform | |
CN113326317B (en) | Block chain certification method and system based on isomorphic multi-chain architecture | |
US10114969B1 (en) | Ultra-secure blockchain-based electronic information transfer system | |
CN102664928A (en) | Data secure access method used for cloud storage and user terminal system | |
CN102075542B (en) | Cloud computing data security supporting platform | |
CN105656859B (en) | Tax control equipment software safety online upgrading method and system | |
Trenwith et al. | Digital forensic readiness in the cloud | |
CN103138939B (en) | Based on the key access times management method of credible platform module under cloud memory module | |
US11329817B2 (en) | Protecting data using controlled corruption in computer networks | |
US20120159175A1 (en) | Deduplicated and Encrypted Backups | |
US20130290731A1 (en) | Systems and methods for storing and verifying security information | |
CN103530201A (en) | Safety data repetition removing method and system applicable to backup system | |
CN103457733A (en) | Data sharing method and system under cloud computing environment | |
KR101285281B1 (en) | Security system and its security method for self-organization storage | |
CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
CN102325026A (en) | Account password secure encryption system | |
CN105407119A (en) | Cloud computing system and method thereof | |
KR20150045790A (en) | Method and Apparatus for authenticating and managing an application using trusted platform module | |
AU2018391625A1 (en) | Re-encrypting data on a hash chain | |
CN105072134A (en) | Cloud disk system file secure transmission method based on three-level key | |
Virvilis et al. | A cloud provider-agnostic secure storage protocol | |
CN111709040A (en) | Sensitive data oriented secure discrete storage method | |
Pawar et al. | Providing security and integrity for data stored in cloud storage | |
CN113726515B (en) | UKEY-based key processing method, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140226 |