CN105376258B - A method of based on encryption authorization system Backup and Restore cloud storage file object - Google Patents

A method of based on encryption authorization system Backup and Restore cloud storage file object Download PDF

Info

Publication number
CN105376258B
CN105376258B CN201510918515.4A CN201510918515A CN105376258B CN 105376258 B CN105376258 B CN 105376258B CN 201510918515 A CN201510918515 A CN 201510918515A CN 105376258 B CN105376258 B CN 105376258B
Authority
CN
China
Prior art keywords
backup
cloud storage
data
restore
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510918515.4A
Other languages
Chinese (zh)
Other versions
CN105376258A (en
Inventor
郭家乐
杨耀凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Eisoo Information Technology Co Ltd
Original Assignee
Shanghai Eisoo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Eisoo Information Technology Co Ltd filed Critical Shanghai Eisoo Information Technology Co Ltd
Priority to CN201510918515.4A priority Critical patent/CN105376258B/en
Publication of CN105376258A publication Critical patent/CN105376258A/en
Application granted granted Critical
Publication of CN105376258B publication Critical patent/CN105376258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method based on encryption authorization system Backup and Restore cloud storage file object, and the encryption authorization system includes data center, backup client and cloud storage service device, comprising the following steps: S1, initiates data recovery request;S2, Xiang Suoshu cloud storage service device initiate subscriber authentication, and the cloud storage service device judges whether authentication passes through;If it is not, then returning to mistake and re-starting authentication;If so, the cloud storage service device is to data center's " return " key" and enters step S3;S3, it is decrypted by the backup file of data described in the key pair;And the data restored after decryption to needs are restored.By encryption authorization system come the method for Backup and Restore cloud storage file object, backup and the process for restoring the file object in cloud storage product avoid leakage privacy of user, and allow Backup Data to be carried out in legal authorization the recovery of smaller particle size, to improve the safety of backup and the efficiency of recovery.

Description

A method of based on encryption authorization system Backup and Restore cloud storage file object
Technical field
The present invention relates to cloud storage fields, are based on encryption authorization system Backup and Restore cloud storage file more particularly to one kind The method of object.
Background technique
With the fast development of cloud industry, cloud storage product has become service of goods most basic in cloud service, and with enterprise For industry Dropbox, fall over each other the industry entered as present most popular enterprise-level cloud storage application and major IT giant, cuts Only currently, companies' all involveds field such as Amazon, BAT, love number, Kingsoft, Sohu, Huawei, association.
" storage of cloud object " that " cloud storage " that usually we say refers to, for storing unstructured data, major cloud meter Calculating manufacturer all realizes this cloud computing infrastructure.
There is a kind of form of work compound in cloud storage product, generally relates to polynary system of account management, the prior art In, cloud storage administrator is responsible for the account creation of entire cloud storage platform, can be accordingly after an account creation is completed The account creates a document library, and document library is the catalogue for needing to specify exclusive creation ownership person, such as the document of account A Library, exclusive ownership person are exactly A, and Account Logon can will be used as encryption should for oneself configuration password, the account and password later The foundation of all objects below document library will browse catalogue or file below the document library and corresponding account and password is needed to award Normal browsing could be crossed after weighing successfully and is checked, including cloud storage administrator also cannot be introduced into the case where no authorization and check What content or backstage were seen is exactly the encrypted data of a pile, and the permission that document library ownership person can configure oneself document library is come The file-sharing of oneself is carried out adding to revise looking into other accounts.
The data protection of cloud storage product is usually after cloud storage platform administrator authorization logs in institute on cloud storage platform The document library for having or specifying is backed up, however the file obtained below the document library to be backed up is needed to be traversed in backup procedure, It is in view of the situation, general that there are two processing modes:
The first: the account of the platform administrator can become totally visible catalogue under other account document libraries, file and interior Hold, that is, when browsing other account document libraries, absolutely not permission controls platform administrator, directly may browse through to the inside Data, this kind of mode is obviously very dangerous, and does not conform to regulation, it is seen that privacy of user.
Second: the platform administrator it can be seen that other accounts document library, but catalogue and file under document library Content is all to need to authorize just see true content, because with no authorized is can not to decrypt to back up following file, catalogue Information, so it is all by encryption that the file or catalogue that usually get, which include file content, such mode is protected The privacy of user, but increase the difficulty of Backup Data.
So, the file object of cloud storage is protected in mode two, and data are by encryption, even if the number backed up According to being also that can not be identified that the data of the inside are checked in the case where unauthorized, help user is difficult when so restoring Carry out the recovery of some file-level.
In face of the storing data of miscellaneous cloud storage product and magnanimity, the Backup and Restore of these storing datas at For a great problem, usually after the file object data that entire private clound or publicly-owned cloud platform are completed in backup, user accidentally deletes, damages After going bad or losing file therein, because needing to restore entire document library or restoring entire cloud to deposit the reason of data encryption The data of platform are stored up, efficiency is very low, and it is very big to restore difficulty.
Summary of the invention
In view of the foregoing deficiencies of prior art, it is standby based on encryption authorization system that the purpose of the present invention is to provide one kind The method that part restores cloud storage file object, for solving to need to restore entire document library in the prior art or restoring entire cloud The data of storage platform, efficiency is very low, restores the very big problem of difficulty.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on encryption authorization system Backup and Restore cloud The method of storage file object, the encryption authorization system include data center, backup client and cloud storage service device, including Following steps: S1, data recovery request is initiated;S2, the cloud storage service device initiate user identity to the affiliated person of document library Verifying, the cloud storage service device judge whether the authentication of the affiliated person of document library passes through;If it is not, then return mistake and again Carry out authentication;If so, the cloud storage service device is to data center's " return " key" and enters step S3;S3, lead to The backup file for crossing data described in the key pair is decrypted;And the data restored after decryption to needs are restored.
In one embodiment of the invention, S100 is further comprised the steps of: before the step S1, initiates backup request;S200, The backup client obtains document library, catalogue, the file information and the file of corresponding data by the cloud storage service device Object data block, and saved and backed up.
In one embodiment of the invention, the step S100 further comprises the steps of: the backup client and deposits to the cloud It stores up server and initiates backup administrator authorization login authentication, the session connection for verification operation request is got after being verified ID。
In one embodiment of the invention, the information that the library includes is Noncoded Information, the catalogue, file letter The information that breath and file object data block include is encryption information.
In one embodiment of the invention, realize that the authorization login authentication of the affiliated person of document library is counted with corresponding by API According to document library, catalogue, the file information and file object data block acquisition.
In one embodiment of the invention, the step S1 further comprises the steps of: the document library under browsing backup copies and obtains Take the catalogue, the file information and file object data block of corresponding data.
In one embodiment of the invention, the step S2 further comprise the steps of: the affiliated person of document library authentication not By when, the information that the copy browsed to includes is shown in the form of messy code.
In one embodiment of the invention, the step S3 further comprises the steps of: S31, is selected to decrypt whole numbers according to key According to or only decryption need the data restored;Document library, the catalogue that S32, the Path selection for restoring data as needed need to restore And file.
In one embodiment of the invention, the subscriber authentication of the affiliated person of document library, corresponding secret key are realized by API Return to and need to restore the storage of data.
In one embodiment of the invention, the key is AES key.
As described above, the method for the invention based on encryption authorization system Backup and Restore cloud storage file object, have with Down the utility model has the advantages that being produced by encryption authorization system come the method for Backup and Restore cloud storage file object, backup and recovery cloud storage The process of file object in product avoids leakage privacy of user, and allow in legal authorization to Backup Data carry out compared with The recovery of small grain size, to improve the safety of backup and the efficiency of recovery.
Detailed description of the invention
Fig. 1 is shown as that the present invention is based on encryption authorizations in the method for encryption authorization system Backup and Restore cloud storage file object The systematic square frame schematic diagram of system.
Fig. 2 is shown as that the present invention is based on an embodiments of the method for encryption authorization system Backup and Restore cloud storage file object In process blocks schematic diagram.
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel It is likely more complexity.
It please refers to shown in Fig. 1 to Fig. 2, Fig. 1 is shown as that the present invention is based on encryption authorization system Backup and Restore cloud storage files The systematic square frame schematic diagram of encryption authorization system in the method for object.Fig. 2 is shown as that the present invention is based on the backups of encryption authorization system Restore the process blocks schematic diagram in an embodiment of the method for cloud storage file object.The present invention provides one kind based on encryption The method of authorization system Backup and Restore cloud storage file object, the encryption authorization system includes data center, backup client With cloud storage service device, comprising the following steps:
S1, data recovery request is initiated;Further, it after sending data recovery request, need to browse under backup copies Document library and the catalogue, the file information and file object data block for obtaining corresponding data.In one embodiment of this invention, lead to It crosses client Client and initiates recovery operation, browse corresponding backup copies in data center, browse the document under backup copies Library, due to below document library catalogue or file be by encryption, the data directly browsed to are messy code forms, thus this When authorized, it is therefore desirable into subscriber authentication to be confirmed whether to belong to the scope of authority.It is excellent in of the invention one It selects in embodiment, the key is AES (Advanced Encryption Standard) key, i.e., using superencipherment Standard encrypts file and data, and Rijndael enciphered method is also known as in cryptography, is the one of U.S. Federal Government use Kind block encryption standard.This standard is used to substitute original DES, and the main feature of the algorithm is resistant to all known attack It hits, speed is fast on multiple platforms, and coding is compact, and design is simple.
S2, the cloud storage service device initiate the verifying of user identity, the cloud storage service device to the affiliated person of document library Judge whether the authentication of the affiliated person of document library passes through;If it is not, then returning to mistake and re-starting authentication;If so, The cloud storage service device is to data center's " return " key" and enters step S3;Further, when the affiliated person's of document library When authentication does not pass through, the information that the copy browsed to includes is shown in the form of messy code, to prevent the leakage of information.When recovery Authentication refer to the authentication of the affiliated person of document library, be different from backup administrator identity used when backup.At this In one embodiment of invention, the document library under data center backup copy is browsed, is directly browsed in the case where unauthorized decryption To data be messy code form.
S3, it is decrypted by the backup file of data described in the key pair;And the number that needs are restored after decryption According to being restored.Further, the step S3 further comprises the steps of: S31, selects decryption total data according to key or only decrypt The data for needing to restore;Document library, catalogue and the file that S32, the Path selection for restoring data as needed need to restore.At this In one embodiment of invention, client Client calls cloud storage API to write on cloud storage platform, completes the process restored.That is, In document library, the catalogue, file that data center's selection needs to restore, it is restored to by the open interface that cloud storage service end provides Cloud storage service end.The backup administrator belongs to different identity types from the affiliated person of document library, and backup administrator can be just Often reading the information that all document libraries include is Noncoded Information, and the catalogue, the file information and file object data block include Information be encryption information;The affiliated person of document library have read the file belonging to belonging under the information and document library of his document library, Catalogue, object data block message, information are all decrypted to the affiliated person in the document library.
In the step of above data is restored, subscriber authentication, the corresponding secret key of the affiliated person of document library are realized by API Return and need to restore the storages of data.Unstructured data is abstracted into object, i.e. one object of a file is based on Http protocol offer additions and deletions, which change, looks into interface (i.e. API), to realize storage and operation to unstructured data.
In addition, to have corresponding data backup procedure, usually so that data recovery procedure can be complete before data recovery Therefore whole or better implementation further comprises the steps of: before the step S1
S100, backup request is initiated;Further, after initiating backup request, the backup client is deposited to the cloud It stores up server and initiates backup administrator authorization login authentication, the session connection for verification operation request is got after being verified ID.In one embodiment of this invention, it needs first to carry out authorization and logs in cloud storage server, and in backup client Client This session is maintained, until this backup normal termination or abnormal interrupt.Herein, backup client Client be for initiate with Cloud storage carries out the program of information exchange and task schedule, can be and operates under the operating systems such as Windows or Linux One process or thread.By using session id combination cloud storage API obtain corresponding document library, catalogue, the file information and The information such as file object data block, and these information for getting catalogue, the file information and file object data blocks are all Encrypted content, but document library this layer is not encryption;Here document library represents enter cloud storage after see first Grade catalogue.
S200, the backup client obtain the document library, catalogue, text of corresponding data by the cloud storage service device Part information and file object data block, and saved and backed up.Further, the information that the library includes is unencryption Information, the information that the catalogue, the file information and file object data block include are encryption information.In the process of data backup In, it is same to realize that the authorization login authentication of the affiliated person of document library and the document library of corresponding data, catalogue, file are believed by API The acquisition of breath and file object data block.After backup is completed, data are uniformly placed on Backup Data center and are saved;Complete number After preservation, data can be restored by data center.
It is below to restore object as embodiment to be illustrated using a kind of cloud storage product.
Step 1: initiating backup operation.
Step 2: backup client carries out authorization login authentication by cloud storage API, session company is got after being verified ID is met for other operation requests.
Step 3: backup client obtains corresponding document library, catalogue, the file information and file pair by cloud storage API The information such as image data block, and getting the information such as catalogue, the file information and file object data block is all encrypted content, but This layer of document library is not encryption, and the data got are uniformly put into data center and are protected.
Step 4: initiating recovery operation.
Step 5: the document library under request browsing data center backup copy.
Step 6: using cloud storage API to carry out document library after the input of the affiliated person's progress authentication of document library user The authority checking of user is verified rear cloud storage service end to data center and returns to a string of AES keys.
Step 7: data center provided with cloud storage service end key-pair file, catalogue Backup Data be decrypted.
Step 8: being provided in document library, catalogue, file that data center's selection needs to restore by cloud storage service end Open interface be restored to cloud storage service end.
In conclusion the method for the invention based on encryption authorization system Backup and Restore cloud storage file object, by adding The method that close authorization system carrys out Backup and Restore cloud storage file object, backup and the mistake for restoring the file object in cloud storage product Journey avoids leakage privacy of user, and allows to carry out Backup Data in legal authorization the recovery of smaller particle size, thus Improve the safety of backup and the efficiency of recovery.So the present invention effectively overcomes various shortcoming in the prior art and has height Spend value of industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as At all equivalent modifications or change, should be covered by the claims of the present invention.

Claims (7)

1. a kind of method based on encryption authorization system Backup and Restore cloud storage file object, the encryption authorization system includes number According to center, backup client and cloud storage service device, which comprises the following steps:
S100, backup request is initiated, the backup client initiates backup administrator authorization to the cloud storage service device later Login authentication gets the session connection ID for verification operation request after being verified;
S200, the backup client are believed by the document library, catalogue, file that the cloud storage service device obtains corresponding data Breath and file object data block, and saved and backed up;After backup is completed, data are uniformly placed on the progress of Backup Data center It saves;After completing data preservation, data can be restored by data center;The information that the library includes is not add Confidential information, the information that the catalogue, the file information and file object data block include are encryption information;
S1, data recovery request is initiated;
S2, the cloud storage service device initiate the verifying of user identity, the cloud storage service device judgement to the affiliated person of document library Whether the authentication of the affiliated person of document library passes through;If it is not, then returning to mistake and re-starting authentication;If so, described Cloud storage service device is to data center's " return " key" and enters step S3;
S3, it is decrypted by the backup file of data described in the key pair;And after decryption to the data restored of needs into Row restores.
2. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, the authorization login authentication of the affiliated person of document library and document library, catalogue, the file information of corresponding data is realized by API With the acquisition of file object data block.
3. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, the step S1 further comprises the steps of: the document library under browsing backup copies and obtains the catalogue of corresponding data, file letter Breath and file object data block.
4. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, the step S2 is further comprised the steps of: when the authentication of the affiliated person of document library does not pass through, and the copy browsed to includes Information is shown in the form of messy code.
5. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, the step S3 is further comprised the steps of:
S31, decryption total data is selected according to key or only decrypts the data for needing to restore;
Document library, catalogue and the file that S32, the Path selection for restoring data as needed need to restore.
6. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, by the subscriber authentication of the API realization affiliated person of document library, the return of corresponding secret key and needs to restore depositing for data Storage.
7. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature It is, the key is AES key.
CN201510918515.4A 2015-12-11 2015-12-11 A method of based on encryption authorization system Backup and Restore cloud storage file object Active CN105376258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510918515.4A CN105376258B (en) 2015-12-11 2015-12-11 A method of based on encryption authorization system Backup and Restore cloud storage file object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510918515.4A CN105376258B (en) 2015-12-11 2015-12-11 A method of based on encryption authorization system Backup and Restore cloud storage file object

Publications (2)

Publication Number Publication Date
CN105376258A CN105376258A (en) 2016-03-02
CN105376258B true CN105376258B (en) 2019-03-01

Family

ID=55378063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510918515.4A Active CN105376258B (en) 2015-12-11 2015-12-11 A method of based on encryption authorization system Backup and Restore cloud storage file object

Country Status (1)

Country Link
CN (1) CN105376258B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214206A (en) * 2018-08-01 2019-01-15 武汉普利商用机器有限公司 cloud backup storage system and method
CN109684129B (en) * 2018-11-20 2020-05-05 北京深思数盾科技股份有限公司 Data backup recovery method, storage medium, encryption machine, client and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data
US7774611B2 (en) * 2002-05-06 2010-08-10 Hewlett-Packard Development Company, L.P. Enforcing file authorization access
CN104468627A (en) * 2014-12-30 2015-03-25 成都三零瑞通移动通信有限公司 Data encryption method and system conducting terminal data backup through server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7774611B2 (en) * 2002-05-06 2010-08-10 Hewlett-Packard Development Company, L.P. Enforcing file authorization access
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data
CN104468627A (en) * 2014-12-30 2015-03-25 成都三零瑞通移动通信有限公司 Data encryption method and system conducting terminal data backup through server

Also Published As

Publication number Publication date
CN105376258A (en) 2016-03-02

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
CN109144961B (en) Authorization file sharing method and device
US11784823B2 (en) Object signing within a cloud-based architecture
KR102068580B1 (en) Method of securing a computing device
CN106462718B (en) Store the rapid data protection of equipment
CN110535833B (en) Data sharing control method based on block chain
CA2899027C (en) Data security service
CN103095847B (en) Cloud storage safety-ensuring method and system thereof
CN105378649A (en) Multiple authority data security and access
CN104333545B (en) The method that cloud storage file data is encrypted
CN104995633A (en) Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
CN105915338A (en) Key generation method and key generation system
CN102831359A (en) Encryption file system of portable mobile storage device
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
Nalinipriya et al. Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework
CN104363093A (en) Method for encrypting file data by dynamic authorization code
Jayalekshmi et al. A study of data storage security issues in cloud computing
CN105376258B (en) A method of based on encryption authorization system Backup and Restore cloud storage file object
US11868460B2 (en) Authorized encryption
AU2018256787B2 (en) Systems and methods for distributed data mapping
CN103577771A (en) Virtual desktop data leakage-preventive protection technology on basis of disk encryption
CN109033882A (en) A kind of safe dissemination method of retrospective big data and system
Shakoor et al. Security Technique in Mobile Clouds to Ensure Malware Prevention
Bankar et al. A Survey on Confidential Cloud Data under Secure Key Exposure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant