CN105282103A - Improvement method for secure storage - Google Patents

Improvement method for secure storage Download PDF

Info

Publication number
CN105282103A
CN105282103A CN201410305092.4A CN201410305092A CN105282103A CN 105282103 A CN105282103 A CN 105282103A CN 201410305092 A CN201410305092 A CN 201410305092A CN 105282103 A CN105282103 A CN 105282103A
Authority
CN
China
Prior art keywords
client
file
storage server
storage
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410305092.4A
Other languages
Chinese (zh)
Inventor
蒋斐
刘海刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI HUASAI INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUXI HUASAI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI HUASAI INFORMATION TECHNOLOGY Co Ltd filed Critical WUXI HUASAI INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410305092.4A priority Critical patent/CN105282103A/en
Publication of CN105282103A publication Critical patent/CN105282103A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an improvement method for secure storage, which is characterized by comprising the steps that: S1, user submit registration information at a control center, the control center generates SM2 public and private key pairs, the control center stores the client public keys and makes the client public keys in one-to-one correspondence with client information; S2, a client uploads a file to a storage server, and the storage server packages encrypted random numbers, the encrypted file and file SM3hash into a structure for storage; S3, the client reads the file in a ciphertext form from the server, a client side calls an SM2 algorithm to decrypt the received random numbers, and the client side calls the SM2 algorithm to encrypt the random numbers and then sends the encrypted random numbers to the storage server; S4, and the storage server receives the encrypted random numbers, decrypts the ciphertext that the client needs to extract by using the random numbers, and sends the ciphertext to the client. The encrypted storage method for secure storage improved by adopting the state cryptographic algorithms SM1, SM2 and SM3 solves the problem of repeated data and low storage efficiency of the server.

Description

Improving one's methods of a kind of safe storage
Technical field
The present invention relates to improving one's methods of a kind of safe storage.
Background technology
The network store system of current trend is that the data centralization storage of enterprise provides good solution, and user and manufacturer also notice the data security sex chromosome mosaicism concentrated and store.In order to ensure to concentrate the data stored not divulged a secret, manufacturer stores end in data and adds encrypting module, ensures to encrypt when writing data in memory device, deciphers when reading data from memory device.Owing to using different secret key encryptions when different user stores same file, so the file of ciphertext state is certainly different, cause there is repeating data in storage server, storage efficiency is not high.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention, in order to solve the deficiencies in the prior art, provides improving one's methods of a kind of safe storage, and the cryptographic storage mode using state close algorithm SM1, SM2, SM3 to improve solves this kind of potential safety hazard.
For solving the problems of the technologies described above, improving one's methods of a kind of safe storage that the embodiment of the present invention provides, adopts following technical scheme:
Improving one's methods of a kind of safe storage, is characterized in that, comprises the steps:
S1: the user in the controlling heart submits log-on message to, and control centre produces SM2 public private key pair, and private key is stored in client USBKEY, and the SM2 PKI of storage server is stored in USBKEY, and control centre stores customer public keys, and with customer information one_to_one corresponding;
S2: client's upload file is to storage server, storage server gets customer public keys according to customer information to control centre, storage server calculates the SM3HASH value of client's upload file, storage server produces random number as key, use the file that symmetry algorithm SM1 encryption client uploads, storage server uses the PKI of client, uses SM2 algorithm for encryption random number, and storage server is packaged into the file after the random number after encryption, encryption, file SM3hash structure and stores simultaneously;
S3: client reads the file of ciphertext state from server, server extracts the random number of ciphertext state according to the file that will read, send to client, client call user USBKEY, use client private key, call SM2 algorithm and decipher the random number received, client uses the PKI of storage server, calls SM2 algorithm for encryption random number and sends to storage server;
S4: storage server receives the random number after encryption, uses the private key of oneself to decrypt random number, using random nnrber decryption to go out the ciphertext that client will extract, sends to client.
, in the cryptographic storage mode settlement server using state close algorithm SM1, SM2, SM3 to improve, there is repeating data, the problem that storage efficiency is not high in improving one's methods of a kind of safe storage provided by the invention.
Accompanying drawing explanation
The step schematic diagram of improving one's methods that Fig. 1 is a kind of safe storage described in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, improving one's methods of the safe storage that the embodiment of the present invention is supplied to is described in detail.
As shown in Figure 1, improving one's methods of a kind of safe storage that the embodiment of the present invention provides, is characterized in that, comprise the steps:
S1: the user in the controlling heart submits log-on message to, and control centre produces SM2 public private key pair, and private key is stored in client USBKEY, and the SM2 PKI of storage server is stored in USBKEY, and control centre stores customer public keys, and with customer information one_to_one corresponding;
S2: client's upload file is to storage server, storage server gets customer public keys according to customer information to control centre, storage server calculates the SM3HASH value of client's upload file, storage server produces random number as key, use the file that symmetry algorithm SM1 encryption client uploads, storage server uses the PKI of client, uses SM2 algorithm for encryption random number, and storage server is packaged into the file after the random number after encryption, encryption, file SM3hash structure and stores simultaneously;
S3: client reads the file of ciphertext state from server, server extracts the random number of ciphertext state according to the file that will read, send to client, client call user USBKEY, use client private key, call SM2 algorithm and decipher the random number received, client uses the PKI of storage server, calls SM2 algorithm for encryption random number and sends to storage server;
S4: storage server receives the random number after encryption, uses the private key of oneself to decrypt random number, using random nnrber decryption to go out the ciphertext that client will extract, sends to client.
Duplicate file handling process:
Storage server starts monitoring process, receives the new file that user stores, according to the SM3HASH value of file, searches the file whether having repetition, if not, then repeats the new file searching user's storage; If, then according to the user that SM3hash value finds this file to belong to, and find the PKI (n) of these users, delete the file existed, and produce new random number, use the file that SM1 algorithm for encryption has just been uploaded, use the random number (cryptographic algorithm is SM2) that the public key encryption of client public key and the firm upload file user found just has produced respectively, the random number of (n+1 part) the ciphertext state of generation, these data are stored together with the file after encryption and SM3HASH value, then recirculation.
, in the cryptographic storage mode settlement server using state close algorithm SM1, SM2, SM3 to improve, there is repeating data, the problem that storage efficiency is not high in improving one's methods of a kind of safe storage provided by the invention.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.

Claims (1)

1. the improving one's methods an of safe storage, is characterized in that, comprise the steps:
S1: the user in the controlling heart submits log-on message to, and control centre produces SM2 public private key pair, and private key is stored in client USBKEY, and the SM2 PKI of storage server is stored in USBKEY, and control centre stores customer public keys, and with customer information one_to_one corresponding;
S2: client's upload file is to storage server, storage server gets customer public keys according to customer information to control centre, storage server calculates the SM3HASH value of client's upload file, storage server produces random number as key, use the file that symmetry algorithm SM1 encryption client uploads, storage server uses the PKI of client, uses SM2 algorithm for encryption random number, and storage server is packaged into the file after the random number after encryption, encryption, file SM3hash structure and stores simultaneously;
S3: client reads the file of ciphertext state from server, server extracts the random number of ciphertext state according to the file that will read, send to client, client call user USBKEY, use client private key, call SM2 algorithm and decipher the random number received, client uses the PKI of storage server, calls SM2 algorithm for encryption random number and sends to storage server;
S4: storage server receives the random number after encryption, uses the private key of oneself to decrypt random number, using random nnrber decryption to go out the ciphertext that client will extract, sends to client.
CN201410305092.4A 2014-07-01 2014-07-01 Improvement method for secure storage Pending CN105282103A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410305092.4A CN105282103A (en) 2014-07-01 2014-07-01 Improvement method for secure storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410305092.4A CN105282103A (en) 2014-07-01 2014-07-01 Improvement method for secure storage

Publications (1)

Publication Number Publication Date
CN105282103A true CN105282103A (en) 2016-01-27

Family

ID=55150442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410305092.4A Pending CN105282103A (en) 2014-07-01 2014-07-01 Improvement method for secure storage

Country Status (1)

Country Link
CN (1) CN105282103A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409109A (en) * 2018-10-17 2019-03-01 网易(杭州)网络有限公司 Data processing method, device, processor and server in network service
CN110730184A (en) * 2019-10-22 2020-01-24 江苏先安科技有限公司 Novel bidding encryption and decryption method based on SM2 cryptographic algorithm

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409109A (en) * 2018-10-17 2019-03-01 网易(杭州)网络有限公司 Data processing method, device, processor and server in network service
CN110730184A (en) * 2019-10-22 2020-01-24 江苏先安科技有限公司 Novel bidding encryption and decryption method based on SM2 cryptographic algorithm
CN110730184B (en) * 2019-10-22 2021-11-05 江苏先安科技有限公司 Novel bidding encryption and decryption method based on SM2 cryptographic algorithm

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
PH12019500938A1 (en) Data transmission method, apparatus and system
KR101493212B1 (en) Method and system for id-based encryption and decryption
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
JP2013243667A5 (en)
JP2009296190A5 (en)
WO2015127789A1 (en) Communication method, apparatus and system based on combined public key cryptosystem
CA2548229A1 (en) Enabling stateless server-based pre-shared secrets
CN107453880B (en) Cloud data secure storage method and system
JP2017538353A5 (en)
RU2009117677A (en) METHOD AND DEVICE FOR MUTUAL AUTHENTICATION
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN104868996A (en) Data encryption and decryption method, device thereof, and terminal
CN101789865A (en) Dedicated server used for encryption and encryption method
JP2012175156A (en) Key management system
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103634266B (en) A bidirectional authentication method for a server and a terminal
TW201417546A (en) Instant messaging method and system
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
RU2015120264A (en) AGENT FOR SECURING CLOUD SERVICE AND DEVELOPMENT OF SECURITY MARKERS FOR SECURE CLOUD SERVICE
CN105187418B (en) Weak signature algorithm
CN107659405B (en) The encrypting and decrypting method of data communication between a kind of substation boss station
JP2016525836A5 (en)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160127