CN105100115A - Data storage method for privacy protection based on encryption password and data fractionation - Google Patents
Data storage method for privacy protection based on encryption password and data fractionation Download PDFInfo
- Publication number
- CN105100115A CN105100115A CN201510533061.9A CN201510533061A CN105100115A CN 105100115 A CN105100115 A CN 105100115A CN 201510533061 A CN201510533061 A CN 201510533061A CN 105100115 A CN105100115 A CN 105100115A
- Authority
- CN
- China
- Prior art keywords
- data
- algorithm
- client
- key
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention relates to a data storage method for privacy protection based on an encryption password and data fractionation. A user specifies data to be operated on a client and inputs the encryption password, the client converts the encryption password into a key for encrypting a plaintext and converts the plaintext into a ciphertext by use of an encryption algorithm, then the client divides the ciphertext into n parts by use of a (n, t) data fractionation algorithm and respectively stores the n parts of the ciphertext on a plurality of servers; when the user needs to recover the data, the clients takes back t parts of the n parts of ciphertext sub-blocks and recovers the ciphertext by use of a recovering algorithm corresponding to the data fractionation algorithm; and the client converts the encryption password input by the user into a key and coverts the ciphertext into a plaintext by use of a corresponding decryption algorithm. The data storage method provided by the invention can be used for effectively protecting the data privacy of the user without adding additional equipment, thereby facilitating system deployment and user application.
Description
Technical field
The present invention relates to data security arts, particularly relate to a kind of date storage method of the secret protection based on encrypted ones and Data Division.
Background technology
In the cloud computing epoch, the data grows that people have is many.For the ease of obtaining data, mobile office etc., people often store data on server.If data unencryption stores, then can cause the privacy leakage of user.And if data encryption store, then key generation and store neither a simple thing.Key can be needed to be extracted the biological characteristics such as user fingerprints by special equipment and generate, or stores with equipment such as tokens after stochastic generation again.Although this solves generation and the storage problem of key, also additionally introduce special equipment, therefore the system that is not easy to is disposed and user uses.And then people expect, the password that user can remember can be converted to the key of enciphered data.Although do the trouble avoiding generation and storage key like this, this key is easy to exhaustive; The keeper of data storage server or the hacker having invaded this server can carry out off-line dictionary attack to guess key and to recover expressly to ciphertext, thus cause the privacy leakage of user.Therefore, design and a kind ofly can protect privacy of user and the date storage method not increasing extras has great importance.
Summary of the invention
The technology of the present invention overcomes the deficiencies in the prior art, proposes a kind of date storage method of the secret protection based on encrypted ones and Data Division, can effectively protect user data privacy and not increase extra equipment.
Based on above-mentioned purpose, the present invention adopts following technical scheme:
In the present invention, user specifies the data m that will operate on the client and inputs encrypted ones pw.Client utilizes key derivation functions pw be converted to the key k for encrypting m and by cryptographic algorithm, m be converted to ciphertext c.Wherein, being used as key derivation functions by the one-way Hash function of safety is a kind of representative way, and one-way Hash function refers to the function of the output string input string of random length being converted to regular length, and meeting following 3 characteristics: (1) given input string, is easy to calculate export and goes here and there; (2) given output string, is difficult to calculate input string; (3) be difficult to find two the different output strings of input string after one-way Hash function conversion identical.Then, c (n, t) Data Division algorithm is dispersed into n part by client, is stored into respectively on multiple server.The algorithm that (n, t) Data Division algorithm herein refers to Data Division to be become n part piecemeal, any t part chosen wherein just can recover split data, wherein t is less than or equal to n.When user needs restoring data, client fetches the t part in n part ciphertext block, then recovers c by the corresponding retrieving algorithm of Data Division algorithm institute.Then user inputs pw on the client, and client utilizes key derivation functions pw is converted to k and with corresponding decipherment algorithm, c is converted to m.Concrete operations can be divided into storage data and restoring data.
Memorying data flow journey is:
(1) user specifies the data m that will operate on the client and inputs encrypted ones pw;
(2) pw is converted to the key k of encryption m by client by key derivation functions;
(3) m is converted to ciphertext c=E by client cryptographic algorithm
k(m);
(4) c is dispersed into n part by (n, t) Data Division algorithm by client;
(5) n part ciphertext block is stored on multiple server by client respectively.
Restoring data flow process is:
(1) user specifies the data m that need reduce by data descriptor on the client and inputs encrypted ones pw;
(2) client fetches the t part in n part ciphertext block;
(3) the client corresponding retrieving algorithm of above-mentioned Data Division algorithm institute recovers c;
(4) pw is converted to key k by key derivation functions by client;
(5) c is converted to expressly m=E by client decipherment algorithm
k -1(c).
Further, the date storage method of a kind of secret protection based on encrypted ones and Data Division in the present invention, is characterized in that:
The first, password pw is converted to key k by key derivation functions by client, and then plaintext m is transformed to ciphertext c;
The second, client (n, t) Data Division algorithm dispersion encrypt data;
3rd, n part ciphertext block is stored on multiple server by client respectively; The way of recommending is stored on a different server by different piecemeals, and different servers is managed by different cloud stores service business; The present invention is intended to prevent storage server collusion from getting up to obtain ciphertext c and utilizes off-line dictionary attack to guess key recovery plaintext accordingly, specifically, owing to have employed (n, t) Data Division algorithm, the present invention can resist at the most the collusion of (t-1) individual storage server;
4th, client need fetch at least t part in n part ciphertext block, then recovers c with the corresponding retrieving algorithm of Data Division algorithm institute;
5th, the pw that user inputs is converted to k by client, then by corresponding decipherment algorithm, c is converted to m;
6th, the present invention can directly protect user data itself, is also applicable to the key of encrypt user data separately; In the case of the latter, the key of enciphered data that what the present invention directly protected is and non-data itself, then deposit separately as the data itself after encryption and only can deposit a copy.
Compared with prior art, the date storage method of a kind of secret protection based on encrypted ones and Data Division that the present invention proposes, its beneficial effect is:
The present invention passes through the method for encryption and Data Division, the ciphertext of user data is split into many parts and is stored on multiple server respectively, to resist at the most (t-1) individual storage server collusion, thus the data-privacy of protection user.Further, use the key for encrypting data corresponding to encrypted ones that user inputs, therefore additionally need not increase the special equipments such as token in the present invention, system of being convenient to is disposed and user uses.
Accompanying drawing explanation
Fig. 1 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, stores the flow chart of data when realizing whole client functionalitys by the application program (APP) on mobile intelligent terminal.
Fig. 2 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, and the flow chart of restoring data when realizing whole client functionalitys by the application program (APP) on mobile intelligent terminal.
Fig. 3 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, stores the flow chart of data when jointly realizing client functionality by the browser in PC and the front-end server in network.
Fig. 4 is the embodiment of the present invention, in a kind of date storage method of the secret protection based on encrypted ones and Data Division, and the flow chart of restoring data when jointly realizing client functionality by the browser in PC and the front-end server in network.
Embodiment
In order to make, the object, technical solutions and advantages of the present invention are more clear to be understood, below in conjunction with specific embodiment, and is described in detail the present invention with reference to accompanying drawing.
The ciphertext c of data m to be dispersed into n part for user and to be stored into respectively on n server and to be described by the present invention, the key derivation functions f wherein adopted is SHA-256, enciphering and deciphering algorithm is AES-256, (n, t) Data Division algorithm is Shamir privacy share algorithm, and the corresponding data descriptor of m is dd (such as filename etc.).
Application scenarios when the present invention specifically implements is that the application program (APP) on mobile intelligent terminal realizes whole client functionalitys, and it stores the flow process of data and restoring data respectively as depicted in figs. 1 and 2.
Fig. 1 is in the present invention, stores the flow chart of data when realizing whole client functionalitys by APP, specific as follows:
(1) user starts APP, is specified the data m that will operate by dd, input encrypted ones pw;
(2) pw is converted to key k=f (dd, pw) by APP;
(3) m is converted to ciphertext c by cryptographic algorithm by APP;
(4) c is dispersed into n part by (n, t) Data Division algorithm by APP: c
1, c
2c
n;
(5) APP is by the c in n part ciphertext block
ibe stored into corresponding server S
ion.
Fig. 2 is in the present invention, the flow chart of restoring data when realizing whole client functionalitys by APP, specific as follows:
(1) user starts APP, is specified the data m that need reduce by data descriptor dd, input encrypted ones pw;
(2) APP fetches the t part in n part ciphertext block, and then the network speed such as can testing each storage server fetches t part ciphertext block from t the fastest server of response;
(3) APP utilizes the corresponding retrieving algorithm of Data Division algorithm institute to recover ciphertext c;
(4) pw is converted to key k=f (dd, pw) by APP;
(5) c is converted to expressly m by decipherment algorithm by APP.
Another application scene when the present invention specifically implements is combined by the front-end server disposed in the browser in PC and network to realize client functionality, and it stores the flow process of data and restoring data respectively as shown in Figure 3 and Figure 4.In this embodiment, front-end server is any data of actual storage not, only for jointly completing the repertoire of client with browser.
Fig. 3 is in the present invention, stores the flow chart of data when being combined realized client functionality by browser and front-end server, specific as follows:
(1) user logs in front-end server in some way by browser, is specified and upload the data m that will operate by dd, input encrypted ones pw;
(2) pw is converted to key k=f (dd, pw) by front-end server;
(3) m is converted to ciphertext c by cryptographic algorithm by front-end server;
(4) c is dispersed into n part by (n, t) Data Division algorithm by front-end server: c
1, c
2c
n;
(5) front-end server is by the c in n part ciphertext block
ibe stored into corresponding server S
ion.
Fig. 4 is in the present invention, by browser and front-end server combine realize client functionality time restoring data flow chart, specific as follows:
(1) user logs in front-end server in some way by browser, is specified the data m that need reduce by data descriptor dd, input encrypted ones pw;
(2) front-end server fetches the t part in n part ciphertext block;
(3) front-end server utilizes the corresponding retrieving algorithm of Data Division algorithm institute to recover ciphertext c;
(4) pw is converted to key k=f (dd, pw) by front-end server;
(5) c is converted to expressly m by decipherment algorithm by front-end server, and returns to user by the safe lane that browser is set up.
In sum, the present invention proposes a kind of date storage method of the secret protection based on encrypted ones and Data Division, the function of its client can be realized by APP, also can combine realization etc. by browser with front-end server.The present invention passes through the method for encryption and Data Division, the ciphertext of user data is split into many parts and is stored on multiple server respectively, to resist at the most (t-1) individual storage server collusion, thus the data-privacy of protection user.In addition, the key corresponding to encrypted ones using user to input in the present invention carrys out encryption and decryption data, does not therefore relate to extra special equipment, and system of being convenient to is disposed and user uses.
The above embodiment is only and better object of the present invention, technical scheme and beneficial effect is described.Institute it should be understood that and the foregoing is only specific embodiments of the invention, is not limited to the present invention, and all any amendments done within the spirit and principles in the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1., based on a date storage method for the secret protection of encrypted ones and Data Division, it is characterized in that being divided into and store data and restoring data step, wherein:
Memorying data flow journey is:
(11) user specifies the data m that will operate on the client and inputs encrypted ones pw;
(12) encrypted ones pw to be converted to key k for encrypting plaintext m by key derivation functions by client;
(13) client adopts cryptographic algorithm that plaintext m is converted to ciphertext c;
(14) ciphertext c is dispersed into n part by (n, t) Data Division algorithm by client;
(15) n part ciphertext block is stored on multiple server by client respectively;
Restoring data flow process is:
(21) user specifies the data m that need reduce by data descriptor on the client and inputs encrypted ones pw;
(22) client fetches the t part in n part ciphertext block;
(23) the client corresponding retrieving algorithm of above-mentioned Data Division algorithm institute recovers c;
(24) pw is converted to key k by key derivation functions by client;
(25) c is converted to expressly m by client decipherment algorithm.
2. the method for claim 1, is characterized in that: described key derivation functions includes but not limited to one-way Hash function.
3. the method for claim 1, is characterized in that: described cryptographic algorithm and corresponding decipherment algorithm are symmetric cryptographic algorithm.
4. the method as described in claim 1 or 3, is characterized in that: the key of described cryptographic algorithm and decipherment algorithm is the binary bits string of encrypted ones gained after key derivation functions process.
5. the method for claim 1, it is characterized in that: described (n, t) Data Division algorithm be data scatter is become n part, algorithm that any t part piecemeal chosen wherein just can recover split data, described algorithm includes but not limited to Shamir privacy share algorithm, Rabin information dispersal algorithm.
6. the method as described in claim 1 or 5, is characterized in that: described t is less than or equal to n.
7. the method for claim 1, is characterized in that: described client functionality can by including but not limited to the application program on mobile intelligent terminal, or the browser in PC and the front-end server in network realize.
8. the method for claim 1, is characterized in that: described data m is the key of user data itself or encrypt user data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510533061.9A CN105100115A (en) | 2015-08-27 | 2015-08-27 | Data storage method for privacy protection based on encryption password and data fractionation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510533061.9A CN105100115A (en) | 2015-08-27 | 2015-08-27 | Data storage method for privacy protection based on encryption password and data fractionation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105100115A true CN105100115A (en) | 2015-11-25 |
Family
ID=54579660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510533061.9A Pending CN105100115A (en) | 2015-08-27 | 2015-08-27 | Data storage method for privacy protection based on encryption password and data fractionation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105100115A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108418677A (en) * | 2017-02-09 | 2018-08-17 | 杭州海康威视数字技术股份有限公司 | Cipher key backup, restoration methods and device |
CN109063498A (en) * | 2018-07-27 | 2018-12-21 | 深圳市新名泽科技有限公司 | Digital asset storage method, device, restoration methods and device |
CN109684858A (en) * | 2018-12-26 | 2019-04-26 | 北京天诚安信科技股份有限公司 | A kind of data guard method of multi-user access, equipment and medium |
CN109936546A (en) * | 2017-12-18 | 2019-06-25 | 北京三快在线科技有限公司 | Data encryption storage method and device and calculating equipment |
CN110557361A (en) * | 2019-03-14 | 2019-12-10 | 深圳市丰浩达工程项目管理有限公司 | Method and system for dynamically managing overall process cost |
CN111200602A (en) * | 2019-12-30 | 2020-05-26 | 北京深思数盾科技股份有限公司 | Rights-sharing management method, encryption card, administrator lock and cipher machine |
CN111310211A (en) * | 2020-02-19 | 2020-06-19 | 成都三零凯天通信实业有限公司 | Method for encrypting database by using SM4 algorithm |
CN112149076A (en) * | 2020-10-10 | 2020-12-29 | 上海威固信息技术股份有限公司 | Safe computer storage system |
CN112187757A (en) * | 2020-09-21 | 2021-01-05 | 上海同态信息科技有限责任公司 | Multilink privacy data circulation system and method |
CN112217804A (en) * | 2020-09-21 | 2021-01-12 | 上海同态信息科技有限责任公司 | Privacy data cross-platform data security circulation system and method |
WO2021013245A1 (en) * | 2019-07-25 | 2021-01-28 | 江苏芯盛智能科技有限公司 | Data key protection method and system, electronic device and storage medium |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
CN114553499A (en) * | 2022-01-28 | 2022-05-27 | 中国银联股份有限公司 | Image encryption method, image processing method, device, equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060133617A1 (en) * | 2004-12-21 | 2006-06-22 | Nec Corporation | Data transmission system and data transmission method |
CN1805337A (en) * | 2005-01-14 | 2006-07-19 | 中兴通讯股份有限公司 | Secret shared key mechanism based user management method |
CN103414682A (en) * | 2013-04-07 | 2013-11-27 | 深圳大学 | Method for cloud storage of data and system |
CN104252606A (en) * | 2014-09-25 | 2014-12-31 | 李梅 | Document encryption method, decryption method and device based on dual-encryption factors |
-
2015
- 2015-08-27 CN CN201510533061.9A patent/CN105100115A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060133617A1 (en) * | 2004-12-21 | 2006-06-22 | Nec Corporation | Data transmission system and data transmission method |
CN1805337A (en) * | 2005-01-14 | 2006-07-19 | 中兴通讯股份有限公司 | Secret shared key mechanism based user management method |
CN103414682A (en) * | 2013-04-07 | 2013-11-27 | 深圳大学 | Method for cloud storage of data and system |
CN104252606A (en) * | 2014-09-25 | 2014-12-31 | 李梅 | Document encryption method, decryption method and device based on dual-encryption factors |
Non-Patent Citations (4)
Title |
---|
《计算机工程》 * |
刘婷婷等: "《一种隐私保护的多副本完整性验证方案》", 《计算机工程》 * |
施荣华等: "《云环境下一种基于数据分割的CP-ABE隐私保护方案》", 《计算机应用研究》 * |
翟朔: "《一种口令加密工具的设计与实现》", 《电脑知识与技术》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108418677B (en) * | 2017-02-09 | 2021-01-15 | 杭州海康威视数字技术股份有限公司 | Key backup and recovery method and device |
CN108418677A (en) * | 2017-02-09 | 2018-08-17 | 杭州海康威视数字技术股份有限公司 | Cipher key backup, restoration methods and device |
CN109936546A (en) * | 2017-12-18 | 2019-06-25 | 北京三快在线科技有限公司 | Data encryption storage method and device and calculating equipment |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
CN109936546B (en) * | 2017-12-18 | 2021-01-26 | 北京三快在线科技有限公司 | Data encryption storage method and device and computing equipment |
CN109063498A (en) * | 2018-07-27 | 2018-12-21 | 深圳市新名泽科技有限公司 | Digital asset storage method, device, restoration methods and device |
CN109684858A (en) * | 2018-12-26 | 2019-04-26 | 北京天诚安信科技股份有限公司 | A kind of data guard method of multi-user access, equipment and medium |
CN110557361A (en) * | 2019-03-14 | 2019-12-10 | 深圳市丰浩达工程项目管理有限公司 | Method and system for dynamically managing overall process cost |
CN110557361B (en) * | 2019-03-14 | 2022-04-26 | 深圳市丰浩达工程项目管理有限公司 | Method and system for dynamically managing overall process cost |
WO2021013245A1 (en) * | 2019-07-25 | 2021-01-28 | 江苏芯盛智能科技有限公司 | Data key protection method and system, electronic device and storage medium |
CN111200602B (en) * | 2019-12-30 | 2021-07-13 | 北京深思数盾科技股份有限公司 | Rights-sharing management method, encryption card, administrator lock and cipher machine |
CN111200602A (en) * | 2019-12-30 | 2020-05-26 | 北京深思数盾科技股份有限公司 | Rights-sharing management method, encryption card, administrator lock and cipher machine |
CN111310211A (en) * | 2020-02-19 | 2020-06-19 | 成都三零凯天通信实业有限公司 | Method for encrypting database by using SM4 algorithm |
CN112217804A (en) * | 2020-09-21 | 2021-01-12 | 上海同态信息科技有限责任公司 | Privacy data cross-platform data security circulation system and method |
CN112187757A (en) * | 2020-09-21 | 2021-01-05 | 上海同态信息科技有限责任公司 | Multilink privacy data circulation system and method |
CN112149076A (en) * | 2020-10-10 | 2020-12-29 | 上海威固信息技术股份有限公司 | Safe computer storage system |
CN114553499A (en) * | 2022-01-28 | 2022-05-27 | 中国银联股份有限公司 | Image encryption method, image processing method, device, equipment and medium |
CN114553499B (en) * | 2022-01-28 | 2024-02-13 | 中国银联股份有限公司 | Image encryption and image processing method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
WO2020259635A1 (en) | Method and apparatus for sharing blockchain data | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN105320896A (en) | Cloud storage encryption and ciphertext retrieval methods and systems | |
CN106375346A (en) | Condition-based broadcast agent re-encryption data protection method for cloud environment | |
CN105227566A (en) | Cipher key processing method, key handling device and key handling system | |
CN103236934B (en) | A kind of method of cloud storage security control | |
CN102170350A (en) | Multiple uncertainty encryption system with misleading function | |
Wang et al. | New chaotic encryption algorithm based on chaotic sequence and plain text | |
CN103607278A (en) | Safe data cloud storage method | |
CN110635909A (en) | Attribute-based collusion attack resistant proxy re-encryption method | |
CN104660590A (en) | Cloud storage scheme for file encryption security | |
CN109688143A (en) | A kind of cluster data mining method towards secret protection in cloud environment | |
Xiong et al. | A secure document self-destruction scheme: an ABE approach | |
Sharma et al. | Analysis of AES Encryption with ECC | |
CN112805704A (en) | Method and system for protecting data | |
Oli et al. | Confidentiality technique to encrypt and obfuscate non-numerical and numerical data to enhance security in public cloud storage | |
Shabbir et al. | Ensuring the confidentiality of nuclear information at cloud using modular encryption standard | |
Shirole et al. | Review paper on data security in cloud computing environment | |
KR20100003093A (en) | Method of producing searchable keyword encryption based on public key for minimizing data size of searchable keyword encryption and method of searching data based on public key through that | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
Khari et al. | Secure data transference architecture for cloud computing using cryptography algorithms | |
Oli et al. | Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage | |
Kumar | Advanced RSA cryptographic algorithm for improving data security | |
Alrehaili et al. | Cloud computing security challenges |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151125 |
|
WD01 | Invention patent application deemed withdrawn after publication |