CN105656935A - Could data safety modification method - Google Patents

Could data safety modification method Download PDF

Info

Publication number
CN105656935A
CN105656935A CN201610134766.8A CN201610134766A CN105656935A CN 105656935 A CN105656935 A CN 105656935A CN 201610134766 A CN201610134766 A CN 201610134766A CN 105656935 A CN105656935 A CN 105656935A
Authority
CN
China
Prior art keywords
data
random number
client
new data
same field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610134766.8A
Other languages
Chinese (zh)
Inventor
梁庆欢
王健强
王川林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Baomihua Information Technology Co Ltd
Original Assignee
Chengdu Baomihua Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Baomihua Information Technology Co Ltd filed Critical Chengdu Baomihua Information Technology Co Ltd
Priority to CN201610134766.8A priority Critical patent/CN105656935A/en
Publication of CN105656935A publication Critical patent/CN105656935A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a could data safety modification method. The method comprises the steps that when a data modification request carrying new data and sent by a client side is received, a first random number is generated; a private key is utilized for encrypting the first random number to obtain permission validation data; the permission validation data is sent to the client side for decrypting, so that the client side utilizes a public key corresponding to the private key for decrypting the first random number from the permission validation data; a second random number input by the client side is received, and whether the first random number is the same as the second random number is judged, if the two random numbers are the same, the data modification request is received, and field names of all fields in new data and field names of all fields in original data are obtained; values corresponding to the same field names in the new data and the original data are compared; if the values are different, the same field names in the new data are written into the fields, corresponding to the same field names, in the original data. The method can prevent the data from being modified illegally, and the data modification amount is reduced.

Description

Cloud data safe amending method
Technical field
The present invention relates to areas of information technology, particularly relate to a kind of cloud data safe amending method.
Background technology
Cloud storage space for providing a user with the storage of online file, access, backup, the file management facilities such as share. By Dropbox, no matter user is anywhere, as long as can connect to the Internet, so that it may by the file of mobile terminal administration cloud storage.
But, owing to using cloud storage space can be connected to the Internet, thus there is data confidentiality safety, once the account in cloud storage space is divulged a secret, it will the private data of user is constituted a threat to. At present, existing cloud storage space does not have strong protection for the account of user, so the private data of user exists disclosure risk, it is easy to by other people illegal modifications.
Summary of the invention
The technical problem that present invention mainly solves is to provide a kind of cloud data safe amending method, it is possible to prevents data to be illegally modified, and reduces data modification amount.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: provide a kind of cloud data safe amending method, including: when receiving the data modification request carrying new data that client sends, generate the first random number; Utilize private key that described first random number is encrypted, obtain Authority Verification data; Described Authority Verification data send extremely described client be decrypted, in order to described client utilizes the PKI corresponding with described private key to decrypt described first random number from described Authority Verification data; Receive the second random number of described client input, it is judged that whether described first random number is identical with described second random number; If described first random number and the second random number are identical, accept described data modification request, obtain the field name of all fields in the field name of all fields in described new data and former data; Compare the value corresponding to same field title in described new data and former data; If described new data is different from the value corresponding to same field title in former data, then the value corresponding to same field title in described new data is write in field corresponding with described same field title in described former data.
Preferably, described client is mobile phone or computer.
Preferably, also include: if described first random number and the second random number differ, then refuse described data modification request.
It is different from the situation of prior art, the invention has the beneficial effects as follows: by generating random number when changing data, again random number is encrypted, the client only having the right can be deciphered and be obtained random number, client only obtains correct random number could revise data, and only revise the value in some field when revising data such that it is able to prevent data to be illegally modified, and reduce data modification amount.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of embodiment of the present invention cloud data safe amending method.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, it it is the schematic flow sheet of embodiment of the present invention cloud data safe amending method. The cloud data safe amending method of the present embodiment includes:
S1: when receiving the data modification request carrying change data that client sends, generate the first random number.
Wherein, client is when entering cloud storage space amendment data, and when client upload is changed data and determines amendment, data modification request can automatically generate, and the first random number also can automatically generate. Alternatively, the first random number can be numeral, letter or their combination. In the present embodiment, client is mobile phone or computer.
S2: utilize private key that the first random number is encrypted, obtain Authority Verification data.
Wherein, private key is unique.
S3: the transmission of Authority Verification data is decrypted to client, in order to client utilizes the PKI corresponding with private key to decrypt the first random number from Authority Verification data.
Wherein, PKI is relative with private key, and the data of only PKI ability decrypted private key encryption, it is possible to prevent Authority Verification leakage of data.
S4: receive the second random number of client input, it is judged that whether the first random number and the second random number be identical.
Wherein, if client has PKI, then client can be deciphered and be obtained the first random number, user just can input this first random number on the client, thus the first random number and the second random number are identical, otherwise this client is illegitimate client.
S5: if the first random number and the second random number are identical, accepts data modification request, obtains the field name of all fields in the field name of all fields in new data and former data.
Wherein, field name embodies field address in new data, by the value that address is able to know that in data all fields.
S6: than newer data and the value corresponding to same field title in former data.
Wherein it is possible to by all fields of new data and former data are traveled through the value compared corresponding to same field title.
S7: if new data is different from the value corresponding to same field title in former data, then write the value corresponding to same field title in new data in field corresponding with same field title in former data.
Wherein, when value difference corresponding to a certain same field title, it was shown that data change, need amendment data, then performing write activity, then proceeding to next field in traversal new data and former data, until all fields in new data and former data having been traveled through.Accordingly, when the value corresponding to a certain same field title is identical, it was shown that data do not have change, it is not necessary to amendment data, then write activity it is performed without, such that it is able to reduce data modification amount.
In the present embodiment, cloud data safe amending method also includes: if the first random number and the second random number differ, then refuse data modification request. Refusal data modification request, it is possible to stop data modification.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.

Claims (3)

1. a cloud data safe amending method, it is characterised in that including:
When receiving the data modification request carrying new data that client sends, generate the first random number;
Utilize private key that described first random number is encrypted, obtain Authority Verification data;
Described Authority Verification data send extremely described client be decrypted, in order to described client utilizes the PKI corresponding with described private key to decrypt described first random number from described Authority Verification data;
Receive the second random number of described client input, it is judged that whether described first random number is identical with described second random number;
If described first random number and the second random number are identical, accept described data modification request, obtain the field name of all fields in the field name of all fields in described new data and former data;
Compare the value corresponding to same field title in described new data and former data;
If described new data is different from the value corresponding to same field title in former data, then the value corresponding to same field title in described new data is write in field corresponding with described same field title in described former data.
2. cloud data safe amending method according to claim 1, it is characterised in that described client is mobile phone or computer.
3. cloud data safe amending method according to claim 1, it is characterised in that also include:
If described first random number and the second random number differ, then refuse described data modification request.
CN201610134766.8A 2016-03-09 2016-03-09 Could data safety modification method Pending CN105656935A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610134766.8A CN105656935A (en) 2016-03-09 2016-03-09 Could data safety modification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610134766.8A CN105656935A (en) 2016-03-09 2016-03-09 Could data safety modification method

Publications (1)

Publication Number Publication Date
CN105656935A true CN105656935A (en) 2016-06-08

Family

ID=56493430

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610134766.8A Pending CN105656935A (en) 2016-03-09 2016-03-09 Could data safety modification method

Country Status (1)

Country Link
CN (1) CN105656935A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507296A (en) * 2020-11-12 2021-03-16 迅鳐成都科技有限公司 User login verification method and system based on block chain
CN118260799A (en) * 2024-04-15 2024-06-28 方块云(山东)信息技术有限公司 Data security privacy protection method, system and device in cloud environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060050877A1 (en) * 2004-09-07 2006-03-09 Mitsuhiro Nakamura Information processing apparatus and method, program, and recording medium
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN104883255A (en) * 2015-06-24 2015-09-02 郑州悉知信息技术有限公司 Password resetting method and device
CN105183459A (en) * 2015-08-14 2015-12-23 无锡天脉聚源传媒科技有限公司 Data modification method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060050877A1 (en) * 2004-09-07 2006-03-09 Mitsuhiro Nakamura Information processing apparatus and method, program, and recording medium
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN104883255A (en) * 2015-06-24 2015-09-02 郑州悉知信息技术有限公司 Password resetting method and device
CN105183459A (en) * 2015-08-14 2015-12-23 无锡天脉聚源传媒科技有限公司 Data modification method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507296A (en) * 2020-11-12 2021-03-16 迅鳐成都科技有限公司 User login verification method and system based on block chain
CN112507296B (en) * 2020-11-12 2024-04-05 迅鳐成都科技有限公司 User login verification method and system based on blockchain
CN118260799A (en) * 2024-04-15 2024-06-28 方块云(山东)信息技术有限公司 Data security privacy protection method, system and device in cloud environment

Similar Documents

Publication Publication Date Title
KR101908712B1 (en) Security method for smart grid system using block chain
Dagher et al. Broncovote: Secure voting system using ethereum’s blockchain
CN110149322A (en) A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
US7975312B2 (en) Token passing technique for media playback devices
US8806200B2 (en) Method and system for securing electronic data
CN115701301A (en) Integration of blockchains, administrative group permissions, and access in an enterprise environment
US20060072745A1 (en) Encryption system using device authentication keys
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN114024710A (en) Data transmission method, device, system and equipment
CN103973736A (en) Data sharing method and device
EP3841702A1 (en) Method, user device, management device, storage medium and computer program product for key management
CN106027503A (en) Cloud storage data encryption method based on TPM
CA2921740A1 (en) Enabling access to data
CN105025019A (en) Data safety sharing method
CN202455386U (en) Safety system for cloud storage
CN109478214A (en) Device and method for certificate registration
CN105740725A (en) File protection method and system
CN104184736B (en) A kind of method and system realizing secure cloud and calculate
CN106992978A (en) Network safety managing method and server
CN105656935A (en) Could data safety modification method
US8755521B2 (en) Security method and system for media playback devices
CN110708155A (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
EP4254234A1 (en) Digital credential issuing for an entity
CN105701421A (en) Cloud storage data modification method
WO2007085726A1 (en) Certification with distributed certification authority

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608

RJ01 Rejection of invention patent application after publication