CN105656935A - Could data safety modification method - Google Patents
Could data safety modification method Download PDFInfo
- Publication number
- CN105656935A CN105656935A CN201610134766.8A CN201610134766A CN105656935A CN 105656935 A CN105656935 A CN 105656935A CN 201610134766 A CN201610134766 A CN 201610134766A CN 105656935 A CN105656935 A CN 105656935A
- Authority
- CN
- China
- Prior art keywords
- data
- random number
- client
- new data
- same field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a could data safety modification method. The method comprises the steps that when a data modification request carrying new data and sent by a client side is received, a first random number is generated; a private key is utilized for encrypting the first random number to obtain permission validation data; the permission validation data is sent to the client side for decrypting, so that the client side utilizes a public key corresponding to the private key for decrypting the first random number from the permission validation data; a second random number input by the client side is received, and whether the first random number is the same as the second random number is judged, if the two random numbers are the same, the data modification request is received, and field names of all fields in new data and field names of all fields in original data are obtained; values corresponding to the same field names in the new data and the original data are compared; if the values are different, the same field names in the new data are written into the fields, corresponding to the same field names, in the original data. The method can prevent the data from being modified illegally, and the data modification amount is reduced.
Description
Technical field
The present invention relates to areas of information technology, particularly relate to a kind of cloud data safe amending method.
Background technology
Cloud storage space for providing a user with the storage of online file, access, backup, the file management facilities such as share. By Dropbox, no matter user is anywhere, as long as can connect to the Internet, so that it may by the file of mobile terminal administration cloud storage.
But, owing to using cloud storage space can be connected to the Internet, thus there is data confidentiality safety, once the account in cloud storage space is divulged a secret, it will the private data of user is constituted a threat to. At present, existing cloud storage space does not have strong protection for the account of user, so the private data of user exists disclosure risk, it is easy to by other people illegal modifications.
Summary of the invention
The technical problem that present invention mainly solves is to provide a kind of cloud data safe amending method, it is possible to prevents data to be illegally modified, and reduces data modification amount.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: provide a kind of cloud data safe amending method, including: when receiving the data modification request carrying new data that client sends, generate the first random number; Utilize private key that described first random number is encrypted, obtain Authority Verification data; Described Authority Verification data send extremely described client be decrypted, in order to described client utilizes the PKI corresponding with described private key to decrypt described first random number from described Authority Verification data; Receive the second random number of described client input, it is judged that whether described first random number is identical with described second random number; If described first random number and the second random number are identical, accept described data modification request, obtain the field name of all fields in the field name of all fields in described new data and former data; Compare the value corresponding to same field title in described new data and former data; If described new data is different from the value corresponding to same field title in former data, then the value corresponding to same field title in described new data is write in field corresponding with described same field title in described former data.
Preferably, described client is mobile phone or computer.
Preferably, also include: if described first random number and the second random number differ, then refuse described data modification request.
It is different from the situation of prior art, the invention has the beneficial effects as follows: by generating random number when changing data, again random number is encrypted, the client only having the right can be deciphered and be obtained random number, client only obtains correct random number could revise data, and only revise the value in some field when revising data such that it is able to prevent data to be illegally modified, and reduce data modification amount.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of embodiment of the present invention cloud data safe amending method.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, it it is the schematic flow sheet of embodiment of the present invention cloud data safe amending method. The cloud data safe amending method of the present embodiment includes:
S1: when receiving the data modification request carrying change data that client sends, generate the first random number.
Wherein, client is when entering cloud storage space amendment data, and when client upload is changed data and determines amendment, data modification request can automatically generate, and the first random number also can automatically generate. Alternatively, the first random number can be numeral, letter or their combination. In the present embodiment, client is mobile phone or computer.
S2: utilize private key that the first random number is encrypted, obtain Authority Verification data.
Wherein, private key is unique.
S3: the transmission of Authority Verification data is decrypted to client, in order to client utilizes the PKI corresponding with private key to decrypt the first random number from Authority Verification data.
Wherein, PKI is relative with private key, and the data of only PKI ability decrypted private key encryption, it is possible to prevent Authority Verification leakage of data.
S4: receive the second random number of client input, it is judged that whether the first random number and the second random number be identical.
Wherein, if client has PKI, then client can be deciphered and be obtained the first random number, user just can input this first random number on the client, thus the first random number and the second random number are identical, otherwise this client is illegitimate client.
S5: if the first random number and the second random number are identical, accepts data modification request, obtains the field name of all fields in the field name of all fields in new data and former data.
Wherein, field name embodies field address in new data, by the value that address is able to know that in data all fields.
S6: than newer data and the value corresponding to same field title in former data.
Wherein it is possible to by all fields of new data and former data are traveled through the value compared corresponding to same field title.
S7: if new data is different from the value corresponding to same field title in former data, then write the value corresponding to same field title in new data in field corresponding with same field title in former data.
Wherein, when value difference corresponding to a certain same field title, it was shown that data change, need amendment data, then performing write activity, then proceeding to next field in traversal new data and former data, until all fields in new data and former data having been traveled through.Accordingly, when the value corresponding to a certain same field title is identical, it was shown that data do not have change, it is not necessary to amendment data, then write activity it is performed without, such that it is able to reduce data modification amount.
In the present embodiment, cloud data safe amending method also includes: if the first random number and the second random number differ, then refuse data modification request. Refusal data modification request, it is possible to stop data modification.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.
Claims (3)
1. a cloud data safe amending method, it is characterised in that including:
When receiving the data modification request carrying new data that client sends, generate the first random number;
Utilize private key that described first random number is encrypted, obtain Authority Verification data;
Described Authority Verification data send extremely described client be decrypted, in order to described client utilizes the PKI corresponding with described private key to decrypt described first random number from described Authority Verification data;
Receive the second random number of described client input, it is judged that whether described first random number is identical with described second random number;
If described first random number and the second random number are identical, accept described data modification request, obtain the field name of all fields in the field name of all fields in described new data and former data;
Compare the value corresponding to same field title in described new data and former data;
If described new data is different from the value corresponding to same field title in former data, then the value corresponding to same field title in described new data is write in field corresponding with described same field title in described former data.
2. cloud data safe amending method according to claim 1, it is characterised in that described client is mobile phone or computer.
3. cloud data safe amending method according to claim 1, it is characterised in that also include:
If described first random number and the second random number differ, then refuse described data modification request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134766.8A CN105656935A (en) | 2016-03-09 | 2016-03-09 | Could data safety modification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134766.8A CN105656935A (en) | 2016-03-09 | 2016-03-09 | Could data safety modification method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105656935A true CN105656935A (en) | 2016-06-08 |
Family
ID=56493430
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610134766.8A Pending CN105656935A (en) | 2016-03-09 | 2016-03-09 | Could data safety modification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105656935A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112507296A (en) * | 2020-11-12 | 2021-03-16 | 迅鳐成都科技有限公司 | User login verification method and system based on block chain |
CN118260799A (en) * | 2024-04-15 | 2024-06-28 | 方块云(山东)信息技术有限公司 | Data security privacy protection method, system and device in cloud environment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN104023085A (en) * | 2014-06-25 | 2014-09-03 | 武汉大学 | Security cloud storage system based on increment synchronization |
CN104883255A (en) * | 2015-06-24 | 2015-09-02 | 郑州悉知信息技术有限公司 | Password resetting method and device |
CN105183459A (en) * | 2015-08-14 | 2015-12-23 | 无锡天脉聚源传媒科技有限公司 | Data modification method and apparatus |
-
2016
- 2016-03-09 CN CN201610134766.8A patent/CN105656935A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN104023085A (en) * | 2014-06-25 | 2014-09-03 | 武汉大学 | Security cloud storage system based on increment synchronization |
CN104883255A (en) * | 2015-06-24 | 2015-09-02 | 郑州悉知信息技术有限公司 | Password resetting method and device |
CN105183459A (en) * | 2015-08-14 | 2015-12-23 | 无锡天脉聚源传媒科技有限公司 | Data modification method and apparatus |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112507296A (en) * | 2020-11-12 | 2021-03-16 | 迅鳐成都科技有限公司 | User login verification method and system based on block chain |
CN112507296B (en) * | 2020-11-12 | 2024-04-05 | 迅鳐成都科技有限公司 | User login verification method and system based on blockchain |
CN118260799A (en) * | 2024-04-15 | 2024-06-28 | 方块云(山东)信息技术有限公司 | Data security privacy protection method, system and device in cloud environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101908712B1 (en) | Security method for smart grid system using block chain | |
Dagher et al. | Broncovote: Secure voting system using ethereum’s blockchain | |
CN110149322A (en) | A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild | |
US7975312B2 (en) | Token passing technique for media playback devices | |
US8806200B2 (en) | Method and system for securing electronic data | |
CN115701301A (en) | Integration of blockchains, administrative group permissions, and access in an enterprise environment | |
US20060072745A1 (en) | Encryption system using device authentication keys | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
CN114024710A (en) | Data transmission method, device, system and equipment | |
CN103973736A (en) | Data sharing method and device | |
EP3841702A1 (en) | Method, user device, management device, storage medium and computer program product for key management | |
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CA2921740A1 (en) | Enabling access to data | |
CN105025019A (en) | Data safety sharing method | |
CN202455386U (en) | Safety system for cloud storage | |
CN109478214A (en) | Device and method for certificate registration | |
CN105740725A (en) | File protection method and system | |
CN104184736B (en) | A kind of method and system realizing secure cloud and calculate | |
CN106992978A (en) | Network safety managing method and server | |
CN105656935A (en) | Could data safety modification method | |
US8755521B2 (en) | Security method and system for media playback devices | |
CN110708155A (en) | Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium | |
EP4254234A1 (en) | Digital credential issuing for an entity | |
CN105701421A (en) | Cloud storage data modification method | |
WO2007085726A1 (en) | Certification with distributed certification authority |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160608 |
|
RJ01 | Rejection of invention patent application after publication |