CN105100115A - Data storage method for privacy protection based on encryption password and data fractionation - Google Patents

Data storage method for privacy protection based on encryption password and data fractionation Download PDF

Info

Publication number
CN105100115A
CN105100115A CN201510533061.9A CN201510533061A CN105100115A CN 105100115 A CN105100115 A CN 105100115A CN 201510533061 A CN201510533061 A CN 201510533061A CN 105100115 A CN105100115 A CN 105100115A
Authority
CN
China
Prior art keywords
data
algorithm
client
key
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510533061.9A
Other languages
Chinese (zh)
Inventor
朱文涛
王展
杨玲
潘适然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Data Assurance and Communication Security Research Center of CAS
Original Assignee
Institute of Information Engineering of CAS
Data Assurance and Communication Security Research Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS, Data Assurance and Communication Security Research Center of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201510533061.9A priority Critical patent/CN105100115A/en
Publication of CN105100115A publication Critical patent/CN105100115A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention relates to a data storage method for privacy protection based on an encryption password and data fractionation. A user specifies data to be operated on a client and inputs the encryption password, the client converts the encryption password into a key for encrypting a plaintext and converts the plaintext into a ciphertext by use of an encryption algorithm, then the client divides the ciphertext into n parts by use of a (n, t) data fractionation algorithm and respectively stores the n parts of the ciphertext on a plurality of servers; when the user needs to recover the data, the clients takes back t parts of the n parts of ciphertext sub-blocks and recovers the ciphertext by use of a recovering algorithm corresponding to the data fractionation algorithm; and the client converts the encryption password input by the user into a key and coverts the ciphertext into a plaintext by use of a corresponding decryption algorithm. The data storage method provided by the invention can be used for effectively protecting the data privacy of the user without adding additional equipment, thereby facilitating system deployment and user application.

Description

A kind of date storage method of the secret protection based on encrypted ones and Data Division
Technical field
The present invention relates to data security arts, particularly relate to a kind of date storage method of the secret protection based on encrypted ones and Data Division.
Background technology
In the cloud computing epoch, the data grows that people have is many.For the ease of obtaining data, mobile office etc., people often store data on server.If data unencryption stores, then can cause the privacy leakage of user.And if data encryption store, then key generation and store neither a simple thing.Key can be needed to be extracted the biological characteristics such as user fingerprints by special equipment and generate, or stores with equipment such as tokens after stochastic generation again.Although this solves generation and the storage problem of key, also additionally introduce special equipment, therefore the system that is not easy to is disposed and user uses.And then people expect, the password that user can remember can be converted to the key of enciphered data.Although do the trouble avoiding generation and storage key like this, this key is easy to exhaustive; The keeper of data storage server or the hacker having invaded this server can carry out off-line dictionary attack to guess key and to recover expressly to ciphertext, thus cause the privacy leakage of user.Therefore, design and a kind ofly can protect privacy of user and the date storage method not increasing extras has great importance.
Summary of the invention
The technology of the present invention overcomes the deficiencies in the prior art, proposes a kind of date storage method of the secret protection based on encrypted ones and Data Division, can effectively protect user data privacy and not increase extra equipment.
Based on above-mentioned purpose, the present invention adopts following technical scheme:
In the present invention, user specifies the data m that will operate on the client and inputs encrypted ones pw.Client utilizes key derivation functions pw be converted to the key k for encrypting m and by cryptographic algorithm, m be converted to ciphertext c.Wherein, being used as key derivation functions by the one-way Hash function of safety is a kind of representative way, and one-way Hash function refers to the function of the output string input string of random length being converted to regular length, and meeting following 3 characteristics: (1) given input string, is easy to calculate export and goes here and there; (2) given output string, is difficult to calculate input string; (3) be difficult to find two the different output strings of input string after one-way Hash function conversion identical.Then, c (n, t) Data Division algorithm is dispersed into n part by client, is stored into respectively on multiple server.The algorithm that (n, t) Data Division algorithm herein refers to Data Division to be become n part piecemeal, any t part chosen wherein just can recover split data, wherein t is less than or equal to n.When user needs restoring data, client fetches the t part in n part ciphertext block, then recovers c by the corresponding retrieving algorithm of Data Division algorithm institute.Then user inputs pw on the client, and client utilizes key derivation functions pw is converted to k and with corresponding decipherment algorithm, c is converted to m.Concrete operations can be divided into storage data and restoring data.
Memorying data flow journey is:
(1) user specifies the data m that will operate on the client and inputs encrypted ones pw;
(2) pw is converted to the key k of encryption m by client by key derivation functions;
(3) m is converted to ciphertext c=E by client cryptographic algorithm k(m);
(4) c is dispersed into n part by (n, t) Data Division algorithm by client;
(5) n part ciphertext block is stored on multiple server by client respectively.
Restoring data flow process is:
(1) user specifies the data m that need reduce by data descriptor on the client and inputs encrypted ones pw;
(2) client fetches the t part in n part ciphertext block;
(3) the client corresponding retrieving algorithm of above-mentioned Data Division algorithm institute recovers c;
(4) pw is converted to key k by key derivation functions by client;
(5) c is converted to expressly m=E by client decipherment algorithm k -1(c).
Further, the date storage method of a kind of secret protection based on encrypted ones and Data Division in the present invention, is characterized in that:
The first, password pw is converted to key k by key derivation functions by client, and then plaintext m is transformed to ciphertext c;
The second, client (n, t) Data Division algorithm dispersion encrypt data;
3rd, n part ciphertext block is stored on multiple server by client respectively; The way of recommending is stored on a different server by different piecemeals, and different servers is managed by different cloud stores service business; The present invention is intended to prevent storage server collusion from getting up to obtain ciphertext c and utilizes off-line dictionary attack to guess key recovery plaintext accordingly, specifically, owing to have employed (n, t) Data Division algorithm, the present invention can resist at the most the collusion of (t-1) individual storage server;
4th, client need fetch at least t part in n part ciphertext block, then recovers c with the corresponding retrieving algorithm of Data Division algorithm institute;
5th, the pw that user inputs is converted to k by client, then by corresponding decipherment algorithm, c is converted to m;
6th, the present invention can directly protect user data itself, is also applicable to the key of encrypt user data separately; In the case of the latter, the key of enciphered data that what the present invention directly protected is and non-data itself, then deposit separately as the data itself after encryption and only can deposit a copy.
Compared with prior art, the date storage method of a kind of secret protection based on encrypted ones and Data Division that the present invention proposes, its beneficial effect is:
The present invention passes through the method for encryption and Data Division, the ciphertext of user data is split into many parts and is stored on multiple server respectively, to resist at the most (t-1) individual storage server collusion, thus the data-privacy of protection user.Further, use the key for encrypting data corresponding to encrypted ones that user inputs, therefore additionally need not increase the special equipments such as token in the present invention, system of being convenient to is disposed and user uses.
Accompanying drawing explanation
Fig. 1 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, stores the flow chart of data when realizing whole client functionalitys by the application program (APP) on mobile intelligent terminal.
Fig. 2 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, and the flow chart of restoring data when realizing whole client functionalitys by the application program (APP) on mobile intelligent terminal.
Fig. 3 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, stores the flow chart of data when jointly realizing client functionality by the browser in PC and the front-end server in network.
Fig. 4 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, and the flow chart of restoring data when jointly realizing client functionality by the browser in PC and the front-end server in network.
Embodiment
In order to make, the object, technical solutions and advantages of the present invention are more clear to be understood, below in conjunction with specific embodiment, and is described in detail the present invention with reference to accompanying drawing.
The ciphertext c of data m to be dispersed into n part for user and to be stored into respectively on n server and to be described by the present invention, the key derivation functions f wherein adopted is SHA-256, enciphering and deciphering algorithm is AES-256, (n, t) Data Division algorithm is Shamir privacy share algorithm, and the corresponding data descriptor of m is dd (such as filename etc.).
Application scenarios when the present invention specifically implements is that the application program (APP) on mobile intelligent terminal realizes whole client functionalitys, and it stores the flow process of data and restoring data respectively as depicted in figs. 1 and 2.
Fig. 1 is in the present invention, stores the flow chart of data when realizing whole client functionalitys by APP, specific as follows:
(1) user starts APP, is specified the data m that will operate by dd, input encrypted ones pw;
(2) pw is converted to key k=f (dd, pw) by APP;
(3) m is converted to ciphertext c by cryptographic algorithm by APP;
(4) c is dispersed into n part by (n, t) Data Division algorithm by APP: c 1, c 2c n;
(5) APP is by the c in n part ciphertext block ibe stored into corresponding server S ion.
Fig. 2 is in the present invention, the flow chart of restoring data when realizing whole client functionalitys by APP, specific as follows:
(1) user starts APP, is specified the data m that need reduce by data descriptor dd, input encrypted ones pw;
(2) APP fetches the t part in n part ciphertext block, and then the network speed such as can testing each storage server fetches t part ciphertext block from t the fastest server of response;
(3) APP utilizes the corresponding retrieving algorithm of Data Division algorithm institute to recover ciphertext c;
(4) pw is converted to key k=f (dd, pw) by APP;
(5) c is converted to expressly m by decipherment algorithm by APP.
Another application scene when the present invention specifically implements is combined by the front-end server disposed in the browser in PC and network to realize client functionality, and it stores the flow process of data and restoring data respectively as shown in Figure 3 and Figure 4.In this embodiment, front-end server is any data of actual storage not, only for jointly completing the repertoire of client with browser.
Fig. 3 is in the present invention, stores the flow chart of data when being combined realized client functionality by browser and front-end server, specific as follows:
(1) user logs in front-end server in some way by browser, is specified and upload the data m that will operate by dd, input encrypted ones pw;
(2) pw is converted to key k=f (dd, pw) by front-end server;
(3) m is converted to ciphertext c by cryptographic algorithm by front-end server;
(4) c is dispersed into n part by (n, t) Data Division algorithm by front-end server: c 1, c 2c n;
(5) front-end server is by the c in n part ciphertext block ibe stored into corresponding server S ion.
Fig. 4 is in the present invention, by browser and front-end server combine realize client functionality time restoring data flow chart, specific as follows:
(1) user logs in front-end server in some way by browser, is specified the data m that need reduce by data descriptor dd, input encrypted ones pw;
(2) front-end server fetches the t part in n part ciphertext block;
(3) front-end server utilizes the corresponding retrieving algorithm of Data Division algorithm institute to recover ciphertext c;
(4) pw is converted to key k=f (dd, pw) by front-end server;
(5) c is converted to expressly m by decipherment algorithm by front-end server, and returns to user by the safe lane that browser is set up.
In sum, the present invention proposes a kind of date storage method of the secret protection based on encrypted ones and Data Division, the function of its client can be realized by APP, also can combine realization etc. by browser with front-end server.The present invention passes through the method for encryption and Data Division, the ciphertext of user data is split into many parts and is stored on multiple server respectively, to resist at the most (t-1) individual storage server collusion, thus the data-privacy of protection user.In addition, the key corresponding to encrypted ones using user to input in the present invention carrys out encryption and decryption data, does not therefore relate to extra special equipment, and system of being convenient to is disposed and user uses.
The above embodiment is only and better object of the present invention, technical scheme and beneficial effect is described.Institute it should be understood that and the foregoing is only specific embodiments of the invention, is not limited to the present invention, and all any amendments done within the spirit and principles in the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1., based on a date storage method for the secret protection of encrypted ones and Data Division, it is characterized in that being divided into and store data and restoring data step, wherein:
Memorying data flow journey is:
(11) user specifies the data m that will operate on the client and inputs encrypted ones pw;
(12) encrypted ones pw to be converted to key k for encrypting plaintext m by key derivation functions by client;
(13) client adopts cryptographic algorithm that plaintext m is converted to ciphertext c;
(14) ciphertext c is dispersed into n part by (n, t) Data Division algorithm by client;
(15) n part ciphertext block is stored on multiple server by client respectively;
Restoring data flow process is:
(21) user specifies the data m that need reduce by data descriptor on the client and inputs encrypted ones pw;
(22) client fetches the t part in n part ciphertext block;
(23) the client corresponding retrieving algorithm of above-mentioned Data Division algorithm institute recovers c;
(24) pw is converted to key k by key derivation functions by client;
(25) c is converted to expressly m by client decipherment algorithm.
2. the method for claim 1, is characterized in that: described key derivation functions includes but not limited to one-way Hash function.
3. the method for claim 1, is characterized in that: described cryptographic algorithm and corresponding decipherment algorithm are symmetric cryptographic algorithm.
4. the method as described in claim 1 or 3, is characterized in that: the key of described cryptographic algorithm and decipherment algorithm is the binary bits string of encrypted ones gained after key derivation functions process.
5. the method for claim 1, it is characterized in that: described (n, t) Data Division algorithm be data scatter is become n part, algorithm that any t part piecemeal chosen wherein just can recover split data, described algorithm includes but not limited to Shamir privacy share algorithm, Rabin information dispersal algorithm.
6. the method as described in claim 1 or 5, is characterized in that: described t is less than or equal to n.
7. the method for claim 1, is characterized in that: described client functionality can by including but not limited to the application program on mobile intelligent terminal, or the browser in PC and the front-end server in network realize.
8. the method for claim 1, is characterized in that: described data m is the key of user data itself or encrypt user data.
CN201510533061.9A 2015-08-27 2015-08-27 Data storage method for privacy protection based on encryption password and data fractionation Pending CN105100115A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510533061.9A CN105100115A (en) 2015-08-27 2015-08-27 Data storage method for privacy protection based on encryption password and data fractionation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510533061.9A CN105100115A (en) 2015-08-27 2015-08-27 Data storage method for privacy protection based on encryption password and data fractionation

Publications (1)

Publication Number Publication Date
CN105100115A true CN105100115A (en) 2015-11-25

Family

ID=54579660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510533061.9A Pending CN105100115A (en) 2015-08-27 2015-08-27 Data storage method for privacy protection based on encryption password and data fractionation

Country Status (1)

Country Link
CN (1) CN105100115A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418677A (en) * 2017-02-09 2018-08-17 杭州海康威视数字技术股份有限公司 Cipher key backup, restoration methods and device
CN109063498A (en) * 2018-07-27 2018-12-21 深圳市新名泽科技有限公司 Digital asset storage method, device, restoration methods and device
CN109684858A (en) * 2018-12-26 2019-04-26 北京天诚安信科技股份有限公司 A kind of data guard method of multi-user access, equipment and medium
CN109936546A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data encryption storage method and device and calculating equipment
CN110557361A (en) * 2019-03-14 2019-12-10 深圳市丰浩达工程项目管理有限公司 Method and system for dynamically managing overall process cost
CN111200602A (en) * 2019-12-30 2020-05-26 北京深思数盾科技股份有限公司 Rights-sharing management method, encryption card, administrator lock and cipher machine
CN111310211A (en) * 2020-02-19 2020-06-19 成都三零凯天通信实业有限公司 Method for encrypting database by using SM4 algorithm
CN112149076A (en) * 2020-10-10 2020-12-29 上海威固信息技术股份有限公司 Safe computer storage system
CN112187757A (en) * 2020-09-21 2021-01-05 上海同态信息科技有限责任公司 Multilink privacy data circulation system and method
CN112217804A (en) * 2020-09-21 2021-01-12 上海同态信息科技有限责任公司 Privacy data cross-platform data security circulation system and method
WO2021013245A1 (en) * 2019-07-25 2021-01-28 江苏芯盛智能科技有限公司 Data key protection method and system, electronic device and storage medium
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN114553499A (en) * 2022-01-28 2022-05-27 中国银联股份有限公司 Image encryption method, image processing method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060133617A1 (en) * 2004-12-21 2006-06-22 Nec Corporation Data transmission system and data transmission method
CN1805337A (en) * 2005-01-14 2006-07-19 中兴通讯股份有限公司 Secret shared key mechanism based user management method
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system
CN104252606A (en) * 2014-09-25 2014-12-31 李梅 Document encryption method, decryption method and device based on dual-encryption factors

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060133617A1 (en) * 2004-12-21 2006-06-22 Nec Corporation Data transmission system and data transmission method
CN1805337A (en) * 2005-01-14 2006-07-19 中兴通讯股份有限公司 Secret shared key mechanism based user management method
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system
CN104252606A (en) * 2014-09-25 2014-12-31 李梅 Document encryption method, decryption method and device based on dual-encryption factors

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
《计算机工程》 *
刘婷婷等: "《一种隐私保护的多副本完整性验证方案》", 《计算机工程》 *
施荣华等: "《云环境下一种基于数据分割的CP-ABE隐私保护方案》", 《计算机应用研究》 *
翟朔: "《一种口令加密工具的设计与实现》", 《电脑知识与技术》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418677B (en) * 2017-02-09 2021-01-15 杭州海康威视数字技术股份有限公司 Key backup and recovery method and device
CN108418677A (en) * 2017-02-09 2018-08-17 杭州海康威视数字技术股份有限公司 Cipher key backup, restoration methods and device
CN109936546A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data encryption storage method and device and calculating equipment
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN109936546B (en) * 2017-12-18 2021-01-26 北京三快在线科技有限公司 Data encryption storage method and device and computing equipment
CN109063498A (en) * 2018-07-27 2018-12-21 深圳市新名泽科技有限公司 Digital asset storage method, device, restoration methods and device
CN109684858A (en) * 2018-12-26 2019-04-26 北京天诚安信科技股份有限公司 A kind of data guard method of multi-user access, equipment and medium
CN110557361A (en) * 2019-03-14 2019-12-10 深圳市丰浩达工程项目管理有限公司 Method and system for dynamically managing overall process cost
CN110557361B (en) * 2019-03-14 2022-04-26 深圳市丰浩达工程项目管理有限公司 Method and system for dynamically managing overall process cost
WO2021013245A1 (en) * 2019-07-25 2021-01-28 江苏芯盛智能科技有限公司 Data key protection method and system, electronic device and storage medium
CN111200602B (en) * 2019-12-30 2021-07-13 北京深思数盾科技股份有限公司 Rights-sharing management method, encryption card, administrator lock and cipher machine
CN111200602A (en) * 2019-12-30 2020-05-26 北京深思数盾科技股份有限公司 Rights-sharing management method, encryption card, administrator lock and cipher machine
CN111310211A (en) * 2020-02-19 2020-06-19 成都三零凯天通信实业有限公司 Method for encrypting database by using SM4 algorithm
CN112217804A (en) * 2020-09-21 2021-01-12 上海同态信息科技有限责任公司 Privacy data cross-platform data security circulation system and method
CN112187757A (en) * 2020-09-21 2021-01-05 上海同态信息科技有限责任公司 Multilink privacy data circulation system and method
CN112149076A (en) * 2020-10-10 2020-12-29 上海威固信息技术股份有限公司 Safe computer storage system
CN114553499A (en) * 2022-01-28 2022-05-27 中国银联股份有限公司 Image encryption method, image processing method, device, equipment and medium
CN114553499B (en) * 2022-01-28 2024-02-13 中国银联股份有限公司 Image encryption and image processing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN105100115A (en) Data storage method for privacy protection based on encryption password and data fractionation
WO2020259635A1 (en) Method and apparatus for sharing blockchain data
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN105320896A (en) Cloud storage encryption and ciphertext retrieval methods and systems
CN106375346A (en) Condition-based broadcast agent re-encryption data protection method for cloud environment
CN105227566A (en) Cipher key processing method, key handling device and key handling system
CN103236934B (en) A kind of method of cloud storage security control
CN102170350A (en) Multiple uncertainty encryption system with misleading function
Wang et al. New chaotic encryption algorithm based on chaotic sequence and plain text
CN103607278A (en) Safe data cloud storage method
CN110635909A (en) Attribute-based collusion attack resistant proxy re-encryption method
CN104660590A (en) Cloud storage scheme for file encryption security
CN109688143A (en) A kind of cluster data mining method towards secret protection in cloud environment
Xiong et al. A secure document self-destruction scheme: an ABE approach
Sharma et al. Analysis of AES Encryption with ECC
CN112805704A (en) Method and system for protecting data
Oli et al. Confidentiality technique to encrypt and obfuscate non-numerical and numerical data to enhance security in public cloud storage
Shabbir et al. Ensuring the confidentiality of nuclear information at cloud using modular encryption standard
Shirole et al. Review paper on data security in cloud computing environment
KR20100003093A (en) Method of producing searchable keyword encryption based on public key for minimizing data size of searchable keyword encryption and method of searching data based on public key through that
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
Khari et al. Secure data transference architecture for cloud computing using cryptography algorithms
Oli et al. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
Kumar Advanced RSA cryptographic algorithm for improving data security
Alrehaili et al. Cloud computing security challenges

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151125

WD01 Invention patent application deemed withdrawn after publication