CN105656934A - Data modification method for cloud storage space - Google Patents
Data modification method for cloud storage space Download PDFInfo
- Publication number
- CN105656934A CN105656934A CN201610133491.6A CN201610133491A CN105656934A CN 105656934 A CN105656934 A CN 105656934A CN 201610133491 A CN201610133491 A CN 201610133491A CN 105656934 A CN105656934 A CN 105656934A
- Authority
- CN
- China
- Prior art keywords
- data
- random number
- private key
- client
- storage space
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data modification method for cloud storage space. The method comprises the steps that when a data modification request sent by a client side is received, a random number is generated; a private key is used for encrypting the random number to obtain permission validation data; the permission validation data is sent to the client side to be decrypted, so that the client side utilizes a public key corresponding to the private key for decrypting the random number from the permission validation data, and utilizes the public key for encrypting the random number and replacement data to obtain coverage data; the coverage data sent by the client side is received; the private key is utilized for decrypting the random number and the replacement data from the coverage data; whether the random number changes or not is judged; if the random number does not change, the data modification request is received, the replacement data replaces original data, or else the data modification request is rejected. By means of the mode, data can be prevented from being modified illegally.
Description
Technical field
The present invention relates to areas of information technology, particularly relate to the data modification method in a kind of cloud storage space.
Background technology
Cloud storage space for providing a user with the storage of online file, access, backup, the file management facilities such as share. By Dropbox, no matter user is anywhere, as long as can connect to the Internet, so that it may by the file of mobile terminal administration cloud storage.
But, owing to using cloud storage space can be connected to the Internet, thus there is data confidentiality safety, once the account in cloud storage space is divulged a secret, it will the private data of user is constituted a threat to. At present, existing cloud storage space does not have strong protection for the account of user, so the private data of user exists disclosure risk, it is easy to by other people illegal modifications.
Summary of the invention
The technical problem that present invention mainly solves is to provide the data modification method in a kind of cloud storage space, it is possible to prevent data to be illegally modified.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: provide the data modification method in a kind of cloud storage space, including: when receiving the data modification request that client sends, generate random number; Utilize private key that described random number is encrypted, obtain Authority Verification data; Described Authority Verification data send extremely described client be decrypted, so that described client utilizes the PKI corresponding with described private key to decrypt described random number from described Authority Verification data, and utilizes described PKI to obtain covering data to described random number and replacement data encryption; Receive the covering data that described client sends; Described private key is utilized to decrypt described random number and replacement data from described covering data; Judge the whether change of described random number; If random number does not have change, accept described data modification request and described replacement data is replaced initial data, otherwise refusing described data modification request.
Preferably, described client is mobile phone or computer.
It is different from the situation of prior art, the invention has the beneficial effects as follows: by generating random number when changing data, and random number being encrypted, the client only having the right can be deciphered and be obtained random number, and then change data such that it is able to prevent data to be illegally modified.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the data modification method in embodiment of the present invention cloud storage space.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, it it is the schematic flow sheet of the data modification method in embodiment of the present invention cloud storage space. The data modification method of the present embodiment includes:
S1: when receiving the data modification request that client sends, generates random number.
Wherein, alternatively, random number can be numeral, letter or their combination. In the present embodiment, client is mobile phone or computer.
S2: utilize private key that random number is encrypted, obtains Authority Verification data.
Wherein, private key is unique, so Authority Verification data are also unique.
S3: the transmission of Authority Verification data is decrypted to client, in order to client utilizes the PKI corresponding with private key to decrypt random number from Authority Verification data, and utilizes PKI to obtain covering data to random number and replacement data encryption.
Wherein, PKI is relative with private key, and the data of only PKI ability decrypted private key encryption, it is possible to prevent Authority Verification leakage of data.
S4: receive the covering data that client sends.
Wherein, if client has PKI, then client can be deciphered and be obtained random number, and otherwise this client is illegitimate client, it is impossible to deciphering obtains random number.
S5: utilize private key to decrypt random number and replacement data from covering data.
S6: judge random number whether change.
Wherein, if client has PKI, the random number so covered in data is exactly the random number in Authority Verification data, then judge that random number does not have change, if client is illegitimate client, so client can only make up a random number again, then cover the random number in data and the random number in Authority Verification data is not the same substantially, then judge random number change.
S7: if random number does not have change, accepts data modification request and replacement data is replaced initial data, otherwise refusing data modification request.
Wherein, refusal data modification request, it is possible to stop amendment data.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.
Claims (2)
1. the data modification method in a cloud storage space, it is characterised in that including:
When receiving the data modification request that client sends, generate random number;
Utilize private key that described random number is encrypted, obtain Authority Verification data;
Described Authority Verification data send extremely described client be decrypted, so that described client utilizes the PKI corresponding with described private key to decrypt described random number from described Authority Verification data, and utilizes described PKI to obtain covering data to described random number and replacement data encryption;
Receive the covering data that described client sends;
Described private key is utilized to decrypt described random number and replacement data from described covering data;
Judge the whether change of described random number;
If random number does not have change, accept described data modification request and described replacement data is replaced initial data, otherwise refusing described data modification request.
2. the data modification method in cloud storage space according to claim 1, it is characterised in that described client is mobile phone or computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610133491.6A CN105656934A (en) | 2016-03-09 | 2016-03-09 | Data modification method for cloud storage space |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610133491.6A CN105656934A (en) | 2016-03-09 | 2016-03-09 | Data modification method for cloud storage space |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105656934A true CN105656934A (en) | 2016-06-08 |
Family
ID=56492425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610133491.6A Pending CN105656934A (en) | 2016-03-09 | 2016-03-09 | Data modification method for cloud storage space |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105656934A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112507296A (en) * | 2020-11-12 | 2021-03-16 | 迅鳐成都科技有限公司 | User login verification method and system based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN104023085A (en) * | 2014-06-25 | 2014-09-03 | 武汉大学 | Security cloud storage system based on increment synchronization |
CN104883255A (en) * | 2015-06-24 | 2015-09-02 | 郑州悉知信息技术有限公司 | Password resetting method and device |
CN105183459A (en) * | 2015-08-14 | 2015-12-23 | 无锡天脉聚源传媒科技有限公司 | Data modification method and apparatus |
-
2016
- 2016-03-09 CN CN201610133491.6A patent/CN105656934A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN104023085A (en) * | 2014-06-25 | 2014-09-03 | 武汉大学 | Security cloud storage system based on increment synchronization |
CN104883255A (en) * | 2015-06-24 | 2015-09-02 | 郑州悉知信息技术有限公司 | Password resetting method and device |
CN105183459A (en) * | 2015-08-14 | 2015-12-23 | 无锡天脉聚源传媒科技有限公司 | Data modification method and apparatus |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112507296A (en) * | 2020-11-12 | 2021-03-16 | 迅鳐成都科技有限公司 | User login verification method and system based on block chain |
CN112507296B (en) * | 2020-11-12 | 2024-04-05 | 迅鳐成都科技有限公司 | User login verification method and system based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108123795B (en) | Quantum key chip issuing method, application method, issuing platform and system | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
CN103248479A (en) | Cloud storage safety system, data protection method and data sharing method | |
CN103973736A (en) | Data sharing method and device | |
CN103001976A (en) | Safe network information transmission method | |
CN104580250A (en) | System and method for authenticating credible identities on basis of safety chips | |
CN102098317A (en) | Data transmitting method and system applied to cloud system | |
CA2714196A1 (en) | Information distribution system and program for the same | |
CN104753953A (en) | Access control system | |
CN102684879A (en) | Method and system for remote bid opening and bid evaluation | |
CN112422500B (en) | Cross-platform data transmission method and device, storage medium and electronic device | |
CN103546421A (en) | Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system | |
CN105162797A (en) | Bidirectional authentication method based on video surveillance system | |
CN105740725A (en) | File protection method and system | |
CN104243494A (en) | Data processing method | |
CN103634265A (en) | Method, device and system for security authentication | |
CN104821883A (en) | Privacy protection credit reporting method based on asymmetric cryptographic algorithm | |
CN103312672A (en) | Identity authentication method and system | |
KR20100114321A (en) | Digital content transaction-breakdown the method thereof | |
CN114826702A (en) | Database access password encryption method and device and computer equipment | |
CN105376242A (en) | Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system | |
CN105656935A (en) | Could data safety modification method | |
CN105656934A (en) | Data modification method for cloud storage space | |
CN203896378U (en) | System for safe transmission of information | |
KR102055888B1 (en) | Encryption and decryption method for protecting information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160608 |