CN105376258B - A method of based on encryption authorization system Backup and Restore cloud storage file object - Google Patents
A method of based on encryption authorization system Backup and Restore cloud storage file object Download PDFInfo
- Publication number
- CN105376258B CN105376258B CN201510918515.4A CN201510918515A CN105376258B CN 105376258 B CN105376258 B CN 105376258B CN 201510918515 A CN201510918515 A CN 201510918515A CN 105376258 B CN105376258 B CN 105376258B
- Authority
- CN
- China
- Prior art keywords
- backup
- cloud storage
- data
- restore
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method based on encryption authorization system Backup and Restore cloud storage file object, and the encryption authorization system includes data center, backup client and cloud storage service device, comprising the following steps: S1, initiates data recovery request;S2, Xiang Suoshu cloud storage service device initiate subscriber authentication, and the cloud storage service device judges whether authentication passes through;If it is not, then returning to mistake and re-starting authentication;If so, the cloud storage service device is to data center's " return " key" and enters step S3;S3, it is decrypted by the backup file of data described in the key pair;And the data restored after decryption to needs are restored.By encryption authorization system come the method for Backup and Restore cloud storage file object, backup and the process for restoring the file object in cloud storage product avoid leakage privacy of user, and allow Backup Data to be carried out in legal authorization the recovery of smaller particle size, to improve the safety of backup and the efficiency of recovery.
Description
Technical field
The present invention relates to cloud storage fields, are based on encryption authorization system Backup and Restore cloud storage file more particularly to one kind
The method of object.
Background technique
With the fast development of cloud industry, cloud storage product has become service of goods most basic in cloud service, and with enterprise
For industry Dropbox, fall over each other the industry entered as present most popular enterprise-level cloud storage application and major IT giant, cuts
Only currently, companies' all involveds field such as Amazon, BAT, love number, Kingsoft, Sohu, Huawei, association.
" storage of cloud object " that " cloud storage " that usually we say refers to, for storing unstructured data, major cloud meter
Calculating manufacturer all realizes this cloud computing infrastructure.
There is a kind of form of work compound in cloud storage product, generally relates to polynary system of account management, the prior art
In, cloud storage administrator is responsible for the account creation of entire cloud storage platform, can be accordingly after an account creation is completed
The account creates a document library, and document library is the catalogue for needing to specify exclusive creation ownership person, such as the document of account A
Library, exclusive ownership person are exactly A, and Account Logon can will be used as encryption should for oneself configuration password, the account and password later
The foundation of all objects below document library will browse catalogue or file below the document library and corresponding account and password is needed to award
Normal browsing could be crossed after weighing successfully and is checked, including cloud storage administrator also cannot be introduced into the case where no authorization and check
What content or backstage were seen is exactly the encrypted data of a pile, and the permission that document library ownership person can configure oneself document library is come
The file-sharing of oneself is carried out adding to revise looking into other accounts.
The data protection of cloud storage product is usually after cloud storage platform administrator authorization logs in institute on cloud storage platform
The document library for having or specifying is backed up, however the file obtained below the document library to be backed up is needed to be traversed in backup procedure,
It is in view of the situation, general that there are two processing modes:
The first: the account of the platform administrator can become totally visible catalogue under other account document libraries, file and interior
Hold, that is, when browsing other account document libraries, absolutely not permission controls platform administrator, directly may browse through to the inside
Data, this kind of mode is obviously very dangerous, and does not conform to regulation, it is seen that privacy of user.
Second: the platform administrator it can be seen that other accounts document library, but catalogue and file under document library
Content is all to need to authorize just see true content, because with no authorized is can not to decrypt to back up following file, catalogue
Information, so it is all by encryption that the file or catalogue that usually get, which include file content, such mode is protected
The privacy of user, but increase the difficulty of Backup Data.
So, the file object of cloud storage is protected in mode two, and data are by encryption, even if the number backed up
According to being also that can not be identified that the data of the inside are checked in the case where unauthorized, help user is difficult when so restoring
Carry out the recovery of some file-level.
In face of the storing data of miscellaneous cloud storage product and magnanimity, the Backup and Restore of these storing datas at
For a great problem, usually after the file object data that entire private clound or publicly-owned cloud platform are completed in backup, user accidentally deletes, damages
After going bad or losing file therein, because needing to restore entire document library or restoring entire cloud to deposit the reason of data encryption
The data of platform are stored up, efficiency is very low, and it is very big to restore difficulty.
Summary of the invention
In view of the foregoing deficiencies of prior art, it is standby based on encryption authorization system that the purpose of the present invention is to provide one kind
The method that part restores cloud storage file object, for solving to need to restore entire document library in the prior art or restoring entire cloud
The data of storage platform, efficiency is very low, restores the very big problem of difficulty.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on encryption authorization system Backup and Restore cloud
The method of storage file object, the encryption authorization system include data center, backup client and cloud storage service device, including
Following steps: S1, data recovery request is initiated;S2, the cloud storage service device initiate user identity to the affiliated person of document library
Verifying, the cloud storage service device judge whether the authentication of the affiliated person of document library passes through;If it is not, then return mistake and again
Carry out authentication;If so, the cloud storage service device is to data center's " return " key" and enters step S3;S3, lead to
The backup file for crossing data described in the key pair is decrypted;And the data restored after decryption to needs are restored.
In one embodiment of the invention, S100 is further comprised the steps of: before the step S1, initiates backup request;S200,
The backup client obtains document library, catalogue, the file information and the file of corresponding data by the cloud storage service device
Object data block, and saved and backed up.
In one embodiment of the invention, the step S100 further comprises the steps of: the backup client and deposits to the cloud
It stores up server and initiates backup administrator authorization login authentication, the session connection for verification operation request is got after being verified
ID。
In one embodiment of the invention, the information that the library includes is Noncoded Information, the catalogue, file letter
The information that breath and file object data block include is encryption information.
In one embodiment of the invention, realize that the authorization login authentication of the affiliated person of document library is counted with corresponding by API
According to document library, catalogue, the file information and file object data block acquisition.
In one embodiment of the invention, the step S1 further comprises the steps of: the document library under browsing backup copies and obtains
Take the catalogue, the file information and file object data block of corresponding data.
In one embodiment of the invention, the step S2 further comprise the steps of: the affiliated person of document library authentication not
By when, the information that the copy browsed to includes is shown in the form of messy code.
In one embodiment of the invention, the step S3 further comprises the steps of: S31, is selected to decrypt whole numbers according to key
According to or only decryption need the data restored;Document library, the catalogue that S32, the Path selection for restoring data as needed need to restore
And file.
In one embodiment of the invention, the subscriber authentication of the affiliated person of document library, corresponding secret key are realized by API
Return to and need to restore the storage of data.
In one embodiment of the invention, the key is AES key.
As described above, the method for the invention based on encryption authorization system Backup and Restore cloud storage file object, have with
Down the utility model has the advantages that being produced by encryption authorization system come the method for Backup and Restore cloud storage file object, backup and recovery cloud storage
The process of file object in product avoids leakage privacy of user, and allow in legal authorization to Backup Data carry out compared with
The recovery of small grain size, to improve the safety of backup and the efficiency of recovery.
Detailed description of the invention
Fig. 1 is shown as that the present invention is based on encryption authorizations in the method for encryption authorization system Backup and Restore cloud storage file object
The systematic square frame schematic diagram of system.
Fig. 2 is shown as that the present invention is based on an embodiments of the method for encryption authorization system Backup and Restore cloud storage file object
In process blocks schematic diagram.
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification
Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities
The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from
Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation
Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment
Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation
Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel
It is likely more complexity.
It please refers to shown in Fig. 1 to Fig. 2, Fig. 1 is shown as that the present invention is based on encryption authorization system Backup and Restore cloud storage files
The systematic square frame schematic diagram of encryption authorization system in the method for object.Fig. 2 is shown as that the present invention is based on the backups of encryption authorization system
Restore the process blocks schematic diagram in an embodiment of the method for cloud storage file object.The present invention provides one kind based on encryption
The method of authorization system Backup and Restore cloud storage file object, the encryption authorization system includes data center, backup client
With cloud storage service device, comprising the following steps:
S1, data recovery request is initiated;Further, it after sending data recovery request, need to browse under backup copies
Document library and the catalogue, the file information and file object data block for obtaining corresponding data.In one embodiment of this invention, lead to
It crosses client Client and initiates recovery operation, browse corresponding backup copies in data center, browse the document under backup copies
Library, due to below document library catalogue or file be by encryption, the data directly browsed to are messy code forms, thus this
When authorized, it is therefore desirable into subscriber authentication to be confirmed whether to belong to the scope of authority.It is excellent in of the invention one
It selects in embodiment, the key is AES (Advanced Encryption Standard) key, i.e., using superencipherment
Standard encrypts file and data, and Rijndael enciphered method is also known as in cryptography, is the one of U.S. Federal Government use
Kind block encryption standard.This standard is used to substitute original DES, and the main feature of the algorithm is resistant to all known attack
It hits, speed is fast on multiple platforms, and coding is compact, and design is simple.
S2, the cloud storage service device initiate the verifying of user identity, the cloud storage service device to the affiliated person of document library
Judge whether the authentication of the affiliated person of document library passes through;If it is not, then returning to mistake and re-starting authentication;If so,
The cloud storage service device is to data center's " return " key" and enters step S3;Further, when the affiliated person's of document library
When authentication does not pass through, the information that the copy browsed to includes is shown in the form of messy code, to prevent the leakage of information.When recovery
Authentication refer to the authentication of the affiliated person of document library, be different from backup administrator identity used when backup.At this
In one embodiment of invention, the document library under data center backup copy is browsed, is directly browsed in the case where unauthorized decryption
To data be messy code form.
S3, it is decrypted by the backup file of data described in the key pair;And the number that needs are restored after decryption
According to being restored.Further, the step S3 further comprises the steps of: S31, selects decryption total data according to key or only decrypt
The data for needing to restore;Document library, catalogue and the file that S32, the Path selection for restoring data as needed need to restore.At this
In one embodiment of invention, client Client calls cloud storage API to write on cloud storage platform, completes the process restored.That is,
In document library, the catalogue, file that data center's selection needs to restore, it is restored to by the open interface that cloud storage service end provides
Cloud storage service end.The backup administrator belongs to different identity types from the affiliated person of document library, and backup administrator can be just
Often reading the information that all document libraries include is Noncoded Information, and the catalogue, the file information and file object data block include
Information be encryption information;The affiliated person of document library have read the file belonging to belonging under the information and document library of his document library,
Catalogue, object data block message, information are all decrypted to the affiliated person in the document library.
In the step of above data is restored, subscriber authentication, the corresponding secret key of the affiliated person of document library are realized by API
Return and need to restore the storages of data.Unstructured data is abstracted into object, i.e. one object of a file is based on
Http protocol offer additions and deletions, which change, looks into interface (i.e. API), to realize storage and operation to unstructured data.
In addition, to have corresponding data backup procedure, usually so that data recovery procedure can be complete before data recovery
Therefore whole or better implementation further comprises the steps of: before the step S1
S100, backup request is initiated;Further, after initiating backup request, the backup client is deposited to the cloud
It stores up server and initiates backup administrator authorization login authentication, the session connection for verification operation request is got after being verified
ID.In one embodiment of this invention, it needs first to carry out authorization and logs in cloud storage server, and in backup client Client
This session is maintained, until this backup normal termination or abnormal interrupt.Herein, backup client Client be for initiate with
Cloud storage carries out the program of information exchange and task schedule, can be and operates under the operating systems such as Windows or Linux
One process or thread.By using session id combination cloud storage API obtain corresponding document library, catalogue, the file information and
The information such as file object data block, and these information for getting catalogue, the file information and file object data blocks are all
Encrypted content, but document library this layer is not encryption;Here document library represents enter cloud storage after see first
Grade catalogue.
S200, the backup client obtain the document library, catalogue, text of corresponding data by the cloud storage service device
Part information and file object data block, and saved and backed up.Further, the information that the library includes is unencryption
Information, the information that the catalogue, the file information and file object data block include are encryption information.In the process of data backup
In, it is same to realize that the authorization login authentication of the affiliated person of document library and the document library of corresponding data, catalogue, file are believed by API
The acquisition of breath and file object data block.After backup is completed, data are uniformly placed on Backup Data center and are saved;Complete number
After preservation, data can be restored by data center.
It is below to restore object as embodiment to be illustrated using a kind of cloud storage product.
Step 1: initiating backup operation.
Step 2: backup client carries out authorization login authentication by cloud storage API, session company is got after being verified
ID is met for other operation requests.
Step 3: backup client obtains corresponding document library, catalogue, the file information and file pair by cloud storage API
The information such as image data block, and getting the information such as catalogue, the file information and file object data block is all encrypted content, but
This layer of document library is not encryption, and the data got are uniformly put into data center and are protected.
Step 4: initiating recovery operation.
Step 5: the document library under request browsing data center backup copy.
Step 6: using cloud storage API to carry out document library after the input of the affiliated person's progress authentication of document library user
The authority checking of user is verified rear cloud storage service end to data center and returns to a string of AES keys.
Step 7: data center provided with cloud storage service end key-pair file, catalogue Backup Data be decrypted.
Step 8: being provided in document library, catalogue, file that data center's selection needs to restore by cloud storage service end
Open interface be restored to cloud storage service end.
In conclusion the method for the invention based on encryption authorization system Backup and Restore cloud storage file object, by adding
The method that close authorization system carrys out Backup and Restore cloud storage file object, backup and the mistake for restoring the file object in cloud storage product
Journey avoids leakage privacy of user, and allows to carry out Backup Data in legal authorization the recovery of smaller particle size, thus
Improve the safety of backup and the efficiency of recovery.So the present invention effectively overcomes various shortcoming in the prior art and has height
Spend value of industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe
The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause
This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as
At all equivalent modifications or change, should be covered by the claims of the present invention.
Claims (7)
1. a kind of method based on encryption authorization system Backup and Restore cloud storage file object, the encryption authorization system includes number
According to center, backup client and cloud storage service device, which comprises the following steps:
S100, backup request is initiated, the backup client initiates backup administrator authorization to the cloud storage service device later
Login authentication gets the session connection ID for verification operation request after being verified;
S200, the backup client are believed by the document library, catalogue, file that the cloud storage service device obtains corresponding data
Breath and file object data block, and saved and backed up;After backup is completed, data are uniformly placed on the progress of Backup Data center
It saves;After completing data preservation, data can be restored by data center;The information that the library includes is not add
Confidential information, the information that the catalogue, the file information and file object data block include are encryption information;
S1, data recovery request is initiated;
S2, the cloud storage service device initiate the verifying of user identity, the cloud storage service device judgement to the affiliated person of document library
Whether the authentication of the affiliated person of document library passes through;If it is not, then returning to mistake and re-starting authentication;If so, described
Cloud storage service device is to data center's " return " key" and enters step S3;
S3, it is decrypted by the backup file of data described in the key pair;And after decryption to the data restored of needs into
Row restores.
2. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, the authorization login authentication of the affiliated person of document library and document library, catalogue, the file information of corresponding data is realized by API
With the acquisition of file object data block.
3. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, the step S1 further comprises the steps of: the document library under browsing backup copies and obtains the catalogue of corresponding data, file letter
Breath and file object data block.
4. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, the step S2 is further comprised the steps of: when the authentication of the affiliated person of document library does not pass through, and the copy browsed to includes
Information is shown in the form of messy code.
5. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, the step S3 is further comprised the steps of:
S31, decryption total data is selected according to key or only decrypts the data for needing to restore;
Document library, catalogue and the file that S32, the Path selection for restoring data as needed need to restore.
6. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, by the subscriber authentication of the API realization affiliated person of document library, the return of corresponding secret key and needs to restore depositing for data
Storage.
7. the method according to claim 1 based on encryption authorization system Backup and Restore cloud storage file object, feature
It is, the key is AES key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510918515.4A CN105376258B (en) | 2015-12-11 | 2015-12-11 | A method of based on encryption authorization system Backup and Restore cloud storage file object |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510918515.4A CN105376258B (en) | 2015-12-11 | 2015-12-11 | A method of based on encryption authorization system Backup and Restore cloud storage file object |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105376258A CN105376258A (en) | 2016-03-02 |
CN105376258B true CN105376258B (en) | 2019-03-01 |
Family
ID=55378063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510918515.4A Active CN105376258B (en) | 2015-12-11 | 2015-12-11 | A method of based on encryption authorization system Backup and Restore cloud storage file object |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105376258B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214206A (en) * | 2018-08-01 | 2019-01-15 | 武汉普利商用机器有限公司 | cloud backup storage system and method |
CN109684129B (en) * | 2018-11-20 | 2020-05-05 | 北京深思数盾科技股份有限公司 | Data backup recovery method, storage medium, encryption machine, client and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494651A (en) * | 2009-02-11 | 2009-07-29 | 江苏敏捷科技股份有限公司 | Method for active backup of data |
US7774611B2 (en) * | 2002-05-06 | 2010-08-10 | Hewlett-Packard Development Company, L.P. | Enforcing file authorization access |
CN104468627A (en) * | 2014-12-30 | 2015-03-25 | 成都三零瑞通移动通信有限公司 | Data encryption method and system conducting terminal data backup through server |
-
2015
- 2015-12-11 CN CN201510918515.4A patent/CN105376258B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7774611B2 (en) * | 2002-05-06 | 2010-08-10 | Hewlett-Packard Development Company, L.P. | Enforcing file authorization access |
CN101494651A (en) * | 2009-02-11 | 2009-07-29 | 江苏敏捷科技股份有限公司 | Method for active backup of data |
CN104468627A (en) * | 2014-12-30 | 2015-03-25 | 成都三零瑞通移动通信有限公司 | Data encryption method and system conducting terminal data backup through server |
Also Published As
Publication number | Publication date |
---|---|
CN105376258A (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6941146B2 (en) | Data security service | |
CN109144961B (en) | Authorization file sharing method and device | |
US11784823B2 (en) | Object signing within a cloud-based architecture | |
KR102068580B1 (en) | Method of securing a computing device | |
CN106462718B (en) | Store the rapid data protection of equipment | |
CN110535833B (en) | Data sharing control method based on block chain | |
CA2899027C (en) | Data security service | |
CN103095847B (en) | Cloud storage safety-ensuring method and system thereof | |
CN105378649A (en) | Multiple authority data security and access | |
CN104333545B (en) | The method that cloud storage file data is encrypted | |
CN104995633A (en) | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
CN105915338A (en) | Key generation method and key generation system | |
CN102831359A (en) | Encryption file system of portable mobile storage device | |
CN104967591A (en) | Cloud storage data read-write method and device, and read-write control method and device | |
Nalinipriya et al. | Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework | |
CN104363093A (en) | Method for encrypting file data by dynamic authorization code | |
Jayalekshmi et al. | A study of data storage security issues in cloud computing | |
CN105376258B (en) | A method of based on encryption authorization system Backup and Restore cloud storage file object | |
US11868460B2 (en) | Authorized encryption | |
AU2018256787B2 (en) | Systems and methods for distributed data mapping | |
CN103577771A (en) | Virtual desktop data leakage-preventive protection technology on basis of disk encryption | |
CN109033882A (en) | A kind of safe dissemination method of retrospective big data and system | |
Shakoor et al. | Security Technique in Mobile Clouds to Ensure Malware Prevention | |
Bankar et al. | A Survey on Confidential Cloud Data under Secure Key Exposure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |