CN105656934A - Data modification method for cloud storage space - Google Patents

Data modification method for cloud storage space Download PDF

Info

Publication number
CN105656934A
CN105656934A CN201610133491.6A CN201610133491A CN105656934A CN 105656934 A CN105656934 A CN 105656934A CN 201610133491 A CN201610133491 A CN 201610133491A CN 105656934 A CN105656934 A CN 105656934A
Authority
CN
China
Prior art keywords
data
random number
private key
client
storage space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610133491.6A
Other languages
Chinese (zh)
Inventor
梁庆欢
王健强
王川林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Baomihua Information Technology Co Ltd
Original Assignee
Chengdu Baomihua Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Baomihua Information Technology Co Ltd filed Critical Chengdu Baomihua Information Technology Co Ltd
Priority to CN201610133491.6A priority Critical patent/CN105656934A/en
Publication of CN105656934A publication Critical patent/CN105656934A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data modification method for cloud storage space. The method comprises the steps that when a data modification request sent by a client side is received, a random number is generated; a private key is used for encrypting the random number to obtain permission validation data; the permission validation data is sent to the client side to be decrypted, so that the client side utilizes a public key corresponding to the private key for decrypting the random number from the permission validation data, and utilizes the public key for encrypting the random number and replacement data to obtain coverage data; the coverage data sent by the client side is received; the private key is utilized for decrypting the random number and the replacement data from the coverage data; whether the random number changes or not is judged; if the random number does not change, the data modification request is received, the replacement data replaces original data, or else the data modification request is rejected. By means of the mode, data can be prevented from being modified illegally.

Description

The data modification method in cloud storage space
Technical field
The present invention relates to areas of information technology, particularly relate to the data modification method in a kind of cloud storage space.
Background technology
Cloud storage space for providing a user with the storage of online file, access, backup, the file management facilities such as share. By Dropbox, no matter user is anywhere, as long as can connect to the Internet, so that it may by the file of mobile terminal administration cloud storage.
But, owing to using cloud storage space can be connected to the Internet, thus there is data confidentiality safety, once the account in cloud storage space is divulged a secret, it will the private data of user is constituted a threat to. At present, existing cloud storage space does not have strong protection for the account of user, so the private data of user exists disclosure risk, it is easy to by other people illegal modifications.
Summary of the invention
The technical problem that present invention mainly solves is to provide the data modification method in a kind of cloud storage space, it is possible to prevent data to be illegally modified.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: provide the data modification method in a kind of cloud storage space, including: when receiving the data modification request that client sends, generate random number; Utilize private key that described random number is encrypted, obtain Authority Verification data; Described Authority Verification data send extremely described client be decrypted, so that described client utilizes the PKI corresponding with described private key to decrypt described random number from described Authority Verification data, and utilizes described PKI to obtain covering data to described random number and replacement data encryption; Receive the covering data that described client sends; Described private key is utilized to decrypt described random number and replacement data from described covering data; Judge the whether change of described random number; If random number does not have change, accept described data modification request and described replacement data is replaced initial data, otherwise refusing described data modification request.
Preferably, described client is mobile phone or computer.
It is different from the situation of prior art, the invention has the beneficial effects as follows: by generating random number when changing data, and random number being encrypted, the client only having the right can be deciphered and be obtained random number, and then change data such that it is able to prevent data to be illegally modified.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the data modification method in embodiment of the present invention cloud storage space.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, it it is the schematic flow sheet of the data modification method in embodiment of the present invention cloud storage space. The data modification method of the present embodiment includes:
S1: when receiving the data modification request that client sends, generates random number.
Wherein, alternatively, random number can be numeral, letter or their combination. In the present embodiment, client is mobile phone or computer.
S2: utilize private key that random number is encrypted, obtains Authority Verification data.
Wherein, private key is unique, so Authority Verification data are also unique.
S3: the transmission of Authority Verification data is decrypted to client, in order to client utilizes the PKI corresponding with private key to decrypt random number from Authority Verification data, and utilizes PKI to obtain covering data to random number and replacement data encryption.
Wherein, PKI is relative with private key, and the data of only PKI ability decrypted private key encryption, it is possible to prevent Authority Verification leakage of data.
S4: receive the covering data that client sends.
Wherein, if client has PKI, then client can be deciphered and be obtained random number, and otherwise this client is illegitimate client, it is impossible to deciphering obtains random number.
S5: utilize private key to decrypt random number and replacement data from covering data.
S6: judge random number whether change.
Wherein, if client has PKI, the random number so covered in data is exactly the random number in Authority Verification data, then judge that random number does not have change, if client is illegitimate client, so client can only make up a random number again, then cover the random number in data and the random number in Authority Verification data is not the same substantially, then judge random number change.
S7: if random number does not have change, accepts data modification request and replacement data is replaced initial data, otherwise refusing data modification request.
Wherein, refusal data modification request, it is possible to stop amendment data.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.

Claims (2)

1. the data modification method in a cloud storage space, it is characterised in that including:
When receiving the data modification request that client sends, generate random number;
Utilize private key that described random number is encrypted, obtain Authority Verification data;
Described Authority Verification data send extremely described client be decrypted, so that described client utilizes the PKI corresponding with described private key to decrypt described random number from described Authority Verification data, and utilizes described PKI to obtain covering data to described random number and replacement data encryption;
Receive the covering data that described client sends;
Described private key is utilized to decrypt described random number and replacement data from described covering data;
Judge the whether change of described random number;
If random number does not have change, accept described data modification request and described replacement data is replaced initial data, otherwise refusing described data modification request.
2. the data modification method in cloud storage space according to claim 1, it is characterised in that described client is mobile phone or computer.
CN201610133491.6A 2016-03-09 2016-03-09 Data modification method for cloud storage space Pending CN105656934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610133491.6A CN105656934A (en) 2016-03-09 2016-03-09 Data modification method for cloud storage space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610133491.6A CN105656934A (en) 2016-03-09 2016-03-09 Data modification method for cloud storage space

Publications (1)

Publication Number Publication Date
CN105656934A true CN105656934A (en) 2016-06-08

Family

ID=56492425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610133491.6A Pending CN105656934A (en) 2016-03-09 2016-03-09 Data modification method for cloud storage space

Country Status (1)

Country Link
CN (1) CN105656934A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507296A (en) * 2020-11-12 2021-03-16 迅鳐成都科技有限公司 User login verification method and system based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060050877A1 (en) * 2004-09-07 2006-03-09 Mitsuhiro Nakamura Information processing apparatus and method, program, and recording medium
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN104883255A (en) * 2015-06-24 2015-09-02 郑州悉知信息技术有限公司 Password resetting method and device
CN105183459A (en) * 2015-08-14 2015-12-23 无锡天脉聚源传媒科技有限公司 Data modification method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060050877A1 (en) * 2004-09-07 2006-03-09 Mitsuhiro Nakamura Information processing apparatus and method, program, and recording medium
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN104883255A (en) * 2015-06-24 2015-09-02 郑州悉知信息技术有限公司 Password resetting method and device
CN105183459A (en) * 2015-08-14 2015-12-23 无锡天脉聚源传媒科技有限公司 Data modification method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507296A (en) * 2020-11-12 2021-03-16 迅鳐成都科技有限公司 User login verification method and system based on block chain
CN112507296B (en) * 2020-11-12 2024-04-05 迅鳐成都科技有限公司 User login verification method and system based on blockchain

Similar Documents

Publication Publication Date Title
CN108123795B (en) Quantum key chip issuing method, application method, issuing platform and system
US20060072745A1 (en) Encryption system using device authentication keys
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
CN103973736A (en) Data sharing method and device
CN103001976A (en) Safe network information transmission method
CN104580250A (en) System and method for authenticating credible identities on basis of safety chips
CN102098317A (en) Data transmitting method and system applied to cloud system
CA2714196A1 (en) Information distribution system and program for the same
CN104753953A (en) Access control system
CN102684879A (en) Method and system for remote bid opening and bid evaluation
CN112422500B (en) Cross-platform data transmission method and device, storage medium and electronic device
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN105162797A (en) Bidirectional authentication method based on video surveillance system
CN105740725A (en) File protection method and system
CN104243494A (en) Data processing method
CN103634265A (en) Method, device and system for security authentication
CN104821883A (en) Privacy protection credit reporting method based on asymmetric cryptographic algorithm
CN103312672A (en) Identity authentication method and system
KR20100114321A (en) Digital content transaction-breakdown the method thereof
CN114826702A (en) Database access password encryption method and device and computer equipment
CN105376242A (en) Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system
CN105656935A (en) Could data safety modification method
CN105656934A (en) Data modification method for cloud storage space
CN203896378U (en) System for safe transmission of information
KR102055888B1 (en) Encryption and decryption method for protecting information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608