CN106453384A - Security cloud disk system and security encryption method thereof - Google Patents
Security cloud disk system and security encryption method thereof Download PDFInfo
- Publication number
- CN106453384A CN106453384A CN201610985283.9A CN201610985283A CN106453384A CN 106453384 A CN106453384 A CN 106453384A CN 201610985283 A CN201610985283 A CN 201610985283A CN 106453384 A CN106453384 A CN 106453384A
- Authority
- CN
- China
- Prior art keywords
- key
- cloud
- module
- data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000007726 management method Methods 0.000 claims abstract description 55
- 238000003860 storage Methods 0.000 claims abstract description 46
- 230000000694 effects Effects 0.000 claims abstract description 14
- 238000013467 fragmentation Methods 0.000 claims description 25
- 238000006062 fragmentation reaction Methods 0.000 claims description 25
- 238000012795 verification Methods 0.000 claims description 16
- 230000014759 maintenance of location Effects 0.000 claims description 10
- 230000011218 segmentation Effects 0.000 claims description 10
- 239000012634 fragment Substances 0.000 claims description 9
- 238000005192 partition Methods 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 5
- 239000006185 dispersion Substances 0.000 claims description 5
- 238000013523 data management Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 abstract description 16
- 238000000638 solvent extraction Methods 0.000 abstract 1
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 210000004247 hand Anatomy 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000005728 strengthening Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a security cloud disk system and a security encryption method thereof. The security cloud disk system comprises a host microcomputer, a key, a cloud security management center and a cloud disk pool, wherein the cloud security management center comprises a server and a client, the server is connected with the host microcomputer through a network, the host microcomputer is matched and connected with the key, and is connected with the cloud disk pool through the client of the cloud security management center, the server comprises a key module, a user management module, a security module and a storage module, the client comprises an identity information module, a virtual disk module, an encryption and decryption module, a data partitioning coding module, a load balancing module, an information management module and a cloud disk management module, and the cloud disk pool comprises a plurality of private cloud disks or public cloud disks. The security cloud disk system has the effects of portability, capability of endowing a user with an active control right over data storage of the cloud disks and prominent security encryption performance.
Description
Technical field
The invention belongs to field of computer technology, more particularly to a kind of secure cloud disc system and its safe encryption method.
Background technology
With information technology and the fast development of intelligent terminal, cloud disk is widely used in every field.Use using cloud disk
Family can all produce mass data file daily, much be directed to the personal secret with enterprise or privacy, and therefore data safety is asked
Topic is the key of cloud disk.At present, although mostly cloud disk has provided the user some security solutions, but cloud disk service end reality
On be incredible, initiative is not in user's handss, and some professionals or manager can obtain data file, user easily
In passive state, the generation of a large number of users leakage of data event is easily caused.Also there is user manually to the leading encryption of data, then
Cloud disk is uploaded to, although so user is possessed of control power, as the data file after encryption still has by the possibility of Brute Force,
And frequent access process causes the process of manual encrypting and decrypting complex, makes troubles.Simultaneously as mobile office etc. is needed
Ask, user often accesses cloud disk on different computers or operating platform, this results in data file in transmission operating environment
In cannot obtain reliable security isolation, there is obvious disclosure risk.The safety of the grasp cloud service for how allowing user real
Initiative, safe handling that is not only efficient and convenient but also ensureing data, is pendulum in our important topic.
Content of the invention
The purpose of the present invention is for above-mentioned the deficiencies in the prior art, provides a kind of Mobile portable, user can be allowed to enjoy
The active control power of cloud disk data storage, more safe and reliable secure cloud disc system and its safe encryption method.
The technical scheme for being adopted for realizing the purpose of the present invention is:A kind of secure cloud disc system, including mainframe micro, key
Key, cloud security administrative center and cloud disk pond, wherein, the cloud security administrative center includes service end and client, and service end is led to
Cross network to be connected with mainframe micro, mainframe micro and key Key are connected, mainframe micro by the client of cloud security administrative center with
Cloud disk pond connects, and the service end includes cipher key module, user management module, security module and memory module, is mainly used in close
Key information (KI) and the management of user's registration certification, the client includes identity information module, virtual disk module, encryption and decryption
Module, data partition encoding module, load balancing module, information management module and cloud disk management module, are mainly used in data
Process and the data access to cloud disk, the cloud disk pond includes some privately owned cloud disks or public's cloud disk, is mainly used in providing cloud
Storage dilatation high in the clouds amount of memory, privately owned cloud disk is towards specific user and the cloud storage do not opened to the outside world, Gong Zhongyun
Disk is the cloud storage for opening towards the public and to all groups.
The key Key is to include to be provided with the unique mark code of hardware(KID)Encryption chip, controller and memorizer shifting
Dynamic storage device, using data and the information security of hardware cryptographic means protection user.
The mainframe micro be include central processing unit, EMMC internal memory, SSD memory, input/output port, WiFi module and
The intelligent movable equipment of display module, is mainly used in use for key Key, the operation transmission of data provides safe and reliable row
His sexual isolation's environment.
The cipher key module is mainly used in the key information (KI) of counterpart keys Key and the management of entry password, and participates in
Cloud key is in the process of service end.
The user management module is mainly used in the authentication registration of user, user's unique mark(UID), lawful authority, power
The management of limit scope, time and number of times.
The security module, is mainly responsible for the safety guarantee of user management, key information (KI) and entry password, effectively anti-
Reset, anti-tamper etc. attack.
The memory module, is mainly used in the storage of information database.
The identification management module, is mainly used in the accesses of the mobile device on mainframe micro such as identification management key Key and is permitted
Can, intrusion of the illegal access device to system can be excluded.
The virtual disk module, loads and is deposited with mainframe micro EMMC internal memory, exit or close cancelling immediately, be responsible for
User provides virtualized local logical memory space, is easy to user that data are carried out with local operation, and reducing frequently network please
Ask, the absolute safety of user data operating environment can be improved, prevent the leakage of a state or party secret for causing because of virus or wooden horse.
The data split redundant module, process for carrying out piecemeal segmentation and coding redundancy to data storage, complete number
Become, according to by random division, some fragmentation of data that number is different and differs in size, and some fragmentation of data that segmentation is produced are carried out
Redundant is processed, and can effectively solve the problem that cloud disk loss of data, improves the reliability of cloud disk data storage.Meanwhile, it is also data
Parallel transmission provides precondition, can be effectively improved the access efficiency of data.
The load balancing module, is mainly used in, by task reasonable distribution, making whole system load balance, so as to improve being
Entirety ability of the system to data, monitor in real time can split situation according to the performance indications and data of cloud disk and network
Distribution store tasks, optimize the utilization rate of different cloud disk storage resources, improve the efficiency that cloud disk simultaneously and concurrently accesses data, effectively
Strengthening system integrally accesses the performance of data.
The encryption/decryption module, is mainly used in carrying out data storage encryption and decryption processing and participating in cloud key in client
Process, provide the user in real time automatically file encryption-decryption and process, improve the safe confidentiality of data further.
Described information management module, is mainly used in the control information management of data, and control information is respectively file division letter
Breath (FSEI) and file storage catalogue information (FSLI), by data storage data control information itself is carried out separating, with
The control right transfer of data storage is realized, control information is stored in key Key, even if data storage sheet is let out in cloud disk end
Dew, due to lacking corresponding control information, still can not use to data access, give up user deposit for cloud disk from technological layer
The security concerns of storage data.
The cloud disk management module, is mainly used in being that privately owned cloud disk and public's cloud disk provide unified cloud disk interface, realizes cloud
Pan Chi, is processed to the cloud disk of access system, is easy to the management of user data, can be according to user operation and each module of system
Feedack carries out specific operation to specified single cloud disk or multiple cloud disks, can ensure data segmentation redundant module generation
Fragmentation of data be stored in the different cloud storages of multiple cloud disks, ensure and will not find all broken of data in any one cloud disk
Piece, ensures confidentiality and the privacy of storage data from mechanism.
The present invention furthermore provides a kind of safe encryption method based on secure cloud disc system, and the method includes following step
Suddenly:
(1) unregistered key Key is inserted mainframe micro by user, and mainframe micro is by the client of cloud security administrative center to accessing
Key Key be first identified management, recognize incorrect then refusal operation, identification correct then to cloud security administrative center service
Registration request is initiated at end;
(2) log-on message that service end is provided to user is audited, and examination & verification is by then uniquely indicating according to the hardware of key Key
Code(KID)Produce user's unique mark UID and service end is stored in, while generating user's key message, user's key message bag
Include but key information (KI), user profile P and entry password C is not limited only to, examination & verification failure then hang up;
(3) service end does initializing set to key Key, and stores write user's key message to key Key, completes key
The registration of Key;
(4) user completes the key Key of registration using step (3) and inserts mainframe micro, and mainframe micro passes through cloud security administrative center
Client management is first identified to the key Key for accessing, recognize incorrect then refusal operation, identification is correct then to cloud security
The service end of administrative center initiates logging request;
(5) logging request that service end is sent to client carries out the retrieval approval of user's key message and UID and KID, checks and approves
By then entrance step (6), on the contrary then hang up;
(6) client obtains following information from key Key:The unique mark code KID of hardware, user profile P, hour of log-on T, have
Effect phase E, random number R;
(7) client generates time stamp T u according to current time, and the information combination for obtaining in time stamp T u and step (6) is sentenced
Disconnected user identity legitimacy, mismatches or expired, fails, and correctly then KID and user profile P are added by client by SM3 algorithm
Close, generate and obtain key A, A=KID&P;Pass through SM4 algorithm again by user profile P, hour of log-on T, effect duration E, time stamp T u
Encrypt with random number R, generate and ciphertext B is obtained, B=A&P&T&E&Tu&R, ciphertext B is sent jointly to by client together with protocol header
Service end, includes KID information in the section protocol head;
(8) service end obtains KID by analysis protocol head, then by KID in corresponding user profile P of server side searches, services
KID and user profile P are encrypted by end by SM3 algorithm, are generated and are obtained ciphering key, such as ciphering key=key A, and service end then passes through
SM4 algorithm decrypting ciphertext B obtains user profile P, hour of log-on T, effect duration E, time stamp T u and random number R;As ciphering key ≠ close
Key A, then fail;
(9) service end carries out verification judgement by time stamp T u for obtaining, and such as deviates current server time ± 3min and is then recognized
For TIMEOUT, so as to failure, have not timed out, the effect duration E for being obtained according to service end judge whether expired, expired, fail, not
User's unique mark UID that is expired, calling service end to store;
(10) service end generates new time stamp T s further according to current time, and service end does+n computing to random number R, obtain new with
Machine number Rn, then pass through new random number R n of SM3 algorithm for encryption, generate and obtain key K, K=Rn;Again by SM4 algorithm by UID, new
Random number R n and the encryption of new time stamp T s, obtain ciphertext D, D=K&UID&Rn&Ts;Service end is by ciphertext D together with protocol header
Service end is sent to, in the section protocol head, includes new random number R n information;
(11) client obtains new random number R n by analysis protocol head, and client passes through new random number R n of SM3 algorithm for encryption, raw
Become to obtain key J;As key J=key K, client then passes through key K decrypting ciphertext D, obtains UID, new random number R n and new
Time stamp T s, and-n computing is done to new random number R n, random number R is obtained, such as key J ≠ key K, then fail;
(12) client carries out verification judgement by new time stamp T s for obtaining, such as deviate the active client time ± 3min then by
Think TIMEOUT, so as to failure, have not timed out, judge whether random number R changes, change and then fail, do not change then certification and lead to
Cross, client obtains UID, the KID that UID is obtained with step (6) becomes ciphertext by sm3 algorithm for encryption, obtain cloud key V;
(13), when uploading data, the virtual disk module of cloud security administrative center produces a virtual logic on mainframe micro
Disk, user is first operated to data on virtual logic magnetic disc temporarily, the data partition encoding of cloud security administrative center
User data on virtual disk is randomly divided into module the fragmentation of data that several pieces differ in size, and per part of fragmentation of data is entered
Row redundancy is processed, and information management module is while generate file division information (FSEI), then encryption/decryption module uses step
(6) the cloud key V that step (12) real-time operation gets is encrypted to per part of fragmentation of data, then passes through cloud disk management module
Connection cloud disk pond, the random dispersion after load balancing module process of the fragment file after per part of encryption is uploaded to multiple cloud disks parallel
Different cloud storages on, information management module generate file storage catalogue information (FSLI), information management module pass through micro- master
Machine completes number by the file division information (FSEI) of fragment file and file storage catalogue information (FSLI) write key Key
According to upload;
(14)During downloading data, the data management module of cloud security administrative center obtains the file of fragment file from key Key
Segmentation information (FSEI) and file storage catalogue information (FSLI), cloud disk management module connects cloud disk pond, stores further according to file
Directory information (FSLI) is from the different cloud storages of multiple cloud disks by corresponding fragmentation of data after load balancing module process
Download in virtual disk, the cloud key V that encryption/decryption module is got by step (6) step (12) real-time operation is to all
Fragmentation of data be decrypted, the fragmentation of data for obtaining after deciphering is again through data partition encoding module according to file division information
(FSEI) group is merged into row redundancy check, and verification is wrong, carries out redundancy process, then regenerates data clear text after verification is errorless
Itself is simultaneously stored in virtual disk, completes the download of data.
A kind of secure cloud disc system for obtaining according to such scheme and its safe encryption method, user is only needed by key
Data are directly uploaded by Key and mainframe micro operation client, and maltilevel security encryption measures are all automatically complete for user on backstage
Become, key Key and mainframe micro, as user's controllable device, are completely believable, and mainframe micro is that key Key and user provide
The transmission operating environment of security isolation, it is to avoid the unstable factor of access device and divulging a secret for causing.Key Key itself also has
Standby hardware encryption measures, can effectively reduce the security risk that random use key Key brings.Multiple knowledge between each component in system
Not Jiao Yan and verification process, improve relatedness and the safety of whole system, even if cloud security administrative center and cloud disk can
Broken through or occurred by hacker to reveal, but as the height that cloud key is each component in system is participated in and by safe encryption method reality
When computing obtain, even if obtaining KID and UID, correct cloud key can not be obtained, is unlikely verified, therefore
Secure user data is higher.Meanwhile, cloud disk pond make use of the distributed nature of cloud storage and fully expand cloud disk storage right
As number, data are after divided encryption, and dispersion is stored on the different cloud storages of multiple cloud disks, cause not only to crack all
The difficulty of cloud disk is big, even and if crack successfully, as file division information (FSEI) and file storage catalogue information (FSLI) are
On key Key, rest in user's handss, so the composition of fragmentation of data cannot be obtained completely, by Brute Force and obtain
The probability of initial data is extremely low.Have and can allow user that the active control power to cloud disk data storage, and Mobile portable is enjoyed,
The very prominent feature of safe encryption.
Description of the drawings
Fig. 1 is the structured flowchart of the present invention.
Fig. 2 is the register flow path figure of the present invention.
Fig. 3 is the login process figure of the present invention.
Fig. 4 is the safe encryption method flow chart of the present invention.
Fig. 5 is the upload data of the present invention and downloading data flow chart.
Specific embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited
In this.
Referring to Fig. 1, a kind of secure cloud disc system of the present invention, the system includes mainframe micro 2, key Key1, cloud security pipe
Reason center 3 and cloud disk pond 4, wherein, the cloud security administrative center 3 includes service end 3-1 and client 3-2, and service end 3-1 is led to
Cross network to be connected with mainframe micro 2, mainframe micro 2 and key Key1 are connected, client of the mainframe micro 2 by cloud security administrative center
End 3-2 is connected with cloud disk pond, and service end 3-1 includes cipher key module, user management module, security module and memory module,
It is mainly used in the management of key information (KI) and user's registration certification, client 3-2 includes identity information module, virtual magnetic
Disk module, encryption/decryption module, data partition encoding module, load balancing module, information management module and cloud disk management module, main
It is used for the process to data and the data access to cloud disk.The key Key1 includes to be installed with the unique mark code of hardware
(KID)Encryption chip, controller and memorizer, using data and the information security of hardware cryptographic means protection user.Described
Mainframe micro 2 includes central processing unit, EMMC internal memory, SSD memory, input/output port, WiFi module and display module, mainly
Safe and reliable exclusiveness isolation environment is provided for the operation transmission of the use for key Key, data.The cloud disk pond includes
Some privately owned cloud disks or public's cloud disk, are mainly used in providing cloud storage dilatation high in the clouds amount of memory, privately owned cloud disk be towards
Specific user and the cloud storage that does not open to the outside world, public's cloud disk is the cloud storage for opening towards the public and to all groups.
The cipher key module is mainly used in the key information (KI) of counterpart keys Key and the management of entry password, and participates in
Cloud key is in the process of service end.
The user management module is mainly used in the authentication registration of user, user's unique mark(UID), lawful authority, power
The management of limit scope, time and number of times.
The security module, is mainly responsible for the safety guarantee of user management, key information (KI) and entry password, effectively anti-
Reset, anti-tamper etc. attack.
The memory module, is mainly used in the storage of information database.
The identification management module, is mainly used in the accesses of the mobile device on mainframe micro such as identification management key Key and is permitted
Can, intrusion of the illegal access device to system can be excluded.
The virtual disk module, loads and is deposited with mainframe micro EMMC internal memory, exit or close cancelling immediately, be responsible for
User provides virtualized local logical memory space, is easy to user that data are carried out with local operation, and reducing frequently network please
Ask, the absolute safety of user data operating environment can be improved, prevent the leakage of a state or party secret for causing because of virus or wooden horse.
The data split redundant module, process for carrying out piecemeal segmentation and coding redundancy to data storage, complete number
Become, according to by random division, some fragmentation of data that number is different and differs in size, and some fragmentation of data that segmentation is produced are carried out
Redundant is processed, and can effectively solve the problem that cloud disk loss of data, improves the reliability of cloud disk data storage.Meanwhile, it is also data
Parallel transmission provides precondition, can be effectively improved the access efficiency of data.
The load balancing module, is mainly used in, by task reasonable distribution, making whole system load balance, so as to improve being
Entirety ability of the system to data, monitor in real time can split situation according to the performance indications and data of cloud disk and network
Distribution store tasks, optimize the utilization rate of different cloud disk storage resources, improve the efficiency that cloud disk simultaneously and concurrently accesses data, effectively
Strengthening system integrally accesses the performance of data.
The encryption/decryption module, is mainly used in carrying out data storage encryption and decryption processing and participating in cloud key in client
Process, provide the user in real time automatically file encryption-decryption and process, improve the safe confidentiality of data further.
Described information management module, is mainly used in the control information management of data, and control information is respectively file division letter
Breath (FSEI) and file storage catalogue information (FSLI), by data storage data control information itself is carried out separating, with
The control right transfer of data storage is realized, control information is stored in key Key, even if data storage sheet is let out in cloud disk end
Dew, due to lacking corresponding control information, still can not use to data access, give up user deposit for cloud disk from technological layer
The security concerns of storage data.
The cloud disk management module, is mainly used in being that privately owned cloud disk and public's cloud disk provide unified cloud disk interface, realizes cloud
Pan Chi, is processed to the cloud disk of access system, is easy to the management of user data, can be according to user operation and each module of system
Feedack carries out specific operation to specified single cloud disk or multiple cloud disks, can ensure data segmentation redundant module generation
Fragmentation of data be stored in the different cloud storages of multiple cloud disks, ensure and will not find all broken of data in any one cloud disk
Piece, ensures confidentiality and the privacy of storage data from mechanism.
Referring to Fig. 2, Fig. 3, Fig. 4, Fig. 5, a kind of safe encryption method based on secure cloud disc system, comprise the following steps:
As Fig. 2, during registration, unregistered key Key is inserted mainframe micro by user, visitor of the mainframe micro by cloud security administrative center
Family end is first identified management to the key Key for accessing, and recognizes incorrect then refusal operation, and identification is correct then to be managed to cloud security
The service end at center initiates registration request;The log-on message that service end is provided to user is audited, and examination & verification passes through then according to close
The unique mark code of the hardware of key Key(KID)Produce user's unique mark UID and service end is stored in, while generating user's key
Information, user's key message includes but are not limited to key information (KI), user profile P and entry password C, in examination & verification failure then
Only operate;Service end does initializing set to key Key, and stores write user's key message to key Key, obtains registered
Key Key, complete registration.
As Fig. 3, during login, user by registered key Key and inserts mainframe micro, during mainframe micro is managed by cloud security
The client of the heart is first identified management to the key Key for accessing, and recognizes incorrect then hang up, and identification is correct then to Yunan County
The service end of full administrative center initiates logging request;The logging request that service end is sent to client carry out user's key message and
UID and KID matched authorization, checks and approves and passes through then to log in complete, on the contrary then hang up.
As Fig. 4, during safe cryptographic calculation, client obtains following user's key message from key Key:Hardware is uniquely marked
Show a yard KID, user profile P, hour of log-on T, effect duration E, random number R;Client generates time stamp T u according to current time, and
The information for obtaining in time stamp T u and step (6) is combined and judges user identity legitimacy, mismatch or expired, fail, correctly
Then KID and user profile P are encrypted by client by SM3 algorithm, are generated and are obtained key A, A=KID&P;Again will by SM4 algorithm
User profile P, hour of log-on T, effect duration E, time stamp T u and random number R encryption, generate and obtain ciphertext B, B=A&P&T&E&Tu&
R, ciphertext B is sent jointly to service end together with protocol header by client, includes KID information in the section protocol head;Service end is led to
Cross analysis protocol head and KID is obtained, then pass through KID in corresponding user profile P of server side searches, service end will by SM3 algorithm
KID and the encryption of user profile P, generate and obtain ciphering key, such as ciphering key=key A, and service end then passes through SM4 algorithm decrypting ciphertext B
Obtain user profile P, hour of log-on T, effect duration E, time stamp T u and random number R;As ciphering key ≠ key A, then fail;Service
Holding carries out verification judgement by time stamp T u for obtaining, and such as deviateing current server time ± 3min is then considered as TIMEOUT,
So as to failure, have not timed out, according to service end obtain effect duration E judge whether expired, expired, fail, not out of date, call
User's unique mark UID of service end storage;Service end generates new time stamp T s further according to current time, and service end is to random number
R does+n computing, obtains new random number R n, then passes through new random number R n of SM3 algorithm for encryption, generates and obtain key K, K=Rn;Lead to again
Cross SM4 algorithm UID, new random number R n and new time stamp T s is encrypted, obtain ciphertext D, D=K&UID&Rn&Ts;Service end will be close
Literary D sends jointly to service end together with protocol header, includes new random number R n information in the section protocol head;Client is by parsing
Protocol header obtains new random number R n, and client passes through new random number R n of SM3 algorithm for encryption, generates and obtains key J;As key J=is close
Key K, client then passes through key K decrypting ciphertext D, obtains UID, new random number R n and new time stamp T s, and to new random number R n
- n computing is done, random number R is obtained, such as key J ≠ key K, then fail;Client is verified by new time stamp T s for obtaining
Judge, such as deviateing active client time ± 3min is then considered as TIMEOUT, so as to failure, has not timed out then and judges random number R
Whether change, change and then fail, do not change, certification passes through, and client obtains UID, the KID that UID is obtained with step (6) leads to
Cross sm3 algorithm for encryption and become ciphertext, finally give cloud key V.
As Fig. 5, when uploading data, the virtual disk module of cloud security administrative center produce on mainframe micro one virtual
Logic magnetic disc, user is first operated to data on virtual logic magnetic disc temporarily, the data segmentation of cloud security administrative center
User data on virtual disk is randomly divided into coding module the fragmentation of data that several pieces differ in size, and to every number according to broken
Piece carries out redundancy process, and information management module is while generate file division information (FSEI), then encryption/decryption module is using real-time
The cloud key V that computing gets is encrypted to per part of fragmentation of data, then by cloud disk management module connect cloud disk pond, will per part plus
Fragment file after close random dispersion after load balancing module process is uploaded on the different cloud storages of multiple cloud disks parallel,
Information management module generates file storage catalogue information (FSLI), and information management module passes through mainframe micro by the file of fragment file
In segmentation information (FSEI) and file storage catalogue information (FSLI) write key Key, the upload of data is completed.Downloading data
When, the data management module of cloud security administrative center obtain from key Key the file division information (FSEI) of fragment file and
File storage catalogue information (FSLI), cloud disk management module network connection cloud disk pond, further according to file storage catalogue information
(FSLI) from the different cloud storages of multiple cloud disks, corresponding fragmentation of data is downloaded to void after load balancing module process
Intend in disk, the cloud key V that encryption/decryption module is got by real-time operation is decrypted to all of fragmentation of data, after deciphering
To fragmentation of data through data partition encoding module, row redundancy check, school are merged into according to file division information (FSEI) group again
Test wrong, carry out redundancy process, verify errorless after then regenerate data clear text itself and be stored in virtual disk, for
Family uses or copies, and after user exits or closes, virtual disk is unloaded automatically and cleared data.
The method have the characteristics that be not only simple using key Key and mainframe micro as security terminal, but by its with
Cloud security administrative center and cloud disk pond composition system, the component of whole system is indispensable during safety encryption.Which is excellent
Even if point is that cloud security administrative center and cloud disk end can be broken through by hacker or occur revealing, KID and UID is therefrom obtained,
But DecryptDecryption process being participated in due to lacking key Key and mainframe micro, still cannot obtain complete safe encryption method, not complete
Safe encryption method cannot obtain correct cloud key, therefore user data can not possibly be obtained, and vice versa, and while broken
In solution the system, the probability of all component is not high.Also, cloud disk pond make use of the distributed nature of cloud storage, further dilatation
The terminal quantity of cloud storage, data are after divided encryption, and dispersion is stored on the different cloud storages of multiple cloud disks, causes
The difficulty for not only cracking all cloud disks is big, even and if cracking successfully, file division information (FSEI) and file storage catalogue information
(FSLI) it is stored on key Key, rests in user's handss, therefore also cannot obtains the composition of fragmentation of data completely, by sudden and violent
Power crack and obtain initial data probability extremely low.With Mobile portable, user can be allowed to enjoy the master of cloud disk data storage
Dynamic control, it is to avoid leaking data, the very prominent effect of safe encryption.
Technical scheme is not restricted in the range of embodiment of the present invention.The not detailed description of the present invention
Technology contents be known technology.
Claims (4)
1. a kind of secure cloud disc system, it is characterised in that:Including mainframe micro, key Key, cloud security administrative center and cloud disk pond,
Wherein, the cloud security administrative center includes service end and client, and service end is connected with mainframe micro by network, mainframe micro and
Key Key is connected, and mainframe micro is connected with cloud disk pond by the client of cloud security administrative center, and the service end includes close
Key module, user management module, security module and memory module, the client includes identity information module, virtual disk mould
Block, encryption/decryption module, data partition encoding module, load balancing module, information management module and cloud disk management module, the cloud
Pan Chi includes some privately owned cloud disks or public's cloud disk.
2. a kind of secure cloud disc system according to claim 1, it is characterised in that:The key Key is to include to be provided with firmly
The unique mark code of part(KID)Encryption chip, controller and memorizer movable storage device.
3. a kind of secure cloud disc system according to claim 1, it is characterised in that:The mainframe micro is to include central authorities' process
Device, EMMC internal memory, SSD memory, input/output port, the intelligent movable equipment of WiFi module and display module.
4. a kind of secure cloud disc system according to claim 1, it is characterised in that:Also provide a kind of based on safe cloud disk system
The safe encryption method of system, the method is comprised the following steps:
(1) unregistered key Key is inserted mainframe micro by user, and mainframe micro is by the client of cloud security administrative center to accessing
Key Key be first identified management, recognize incorrect then refusal operation, identification correct then to cloud security administrative center service
Registration request is initiated at end;
(2) log-on message that service end is provided to user is audited, and examination & verification is by then uniquely marking according to the hardware of key Key
Show code(KID)Produce user's unique mark UID and service end is stored in, while generating user's key message, user's key message
Include but are not limited to key information (KI), user profile P and entry password C, examination & verification failure then hang up;
(3) service end does initializing set to key Key, and stores write user's key message to key Key, completes key
The registration of Key;
(4) user completes the key Key of registration using step (3) and inserts mainframe micro, and mainframe micro passes through cloud security administrative center
Client management is first identified to the key Key for accessing, recognize incorrect then refusal operation, identification is correct then to cloud security
The service end of administrative center initiates logging request;
(5) logging request that service end is sent to client carries out the retrieval approval of user's key message and UID and KID, checks and approves
By then entrance step (6), on the contrary then hang up;
(6) client obtains following information from key Key:The unique mark code KID of hardware, user profile P, hour of log-on T,
Effect duration E, random number R;
(7) client generates time stamp T u according to current time, and the information combination for obtaining in time stamp T u and step (6) is sentenced
Disconnected user identity legitimacy, mismatches or expired, fails, and correctly then KID and user profile P are added by client by SM3 algorithm
Close, generate and obtain key A, A=KID&P;Pass through SM4 algorithm again by user profile P, hour of log-on T, effect duration E, time stamp T u
Encrypt with random number R, generate and ciphertext B is obtained, B=A&P&T&E&Tu&R, ciphertext B is sent jointly to by client together with protocol header
Service end, includes KID information in the section protocol head;
(8) service end obtains KID by analysis protocol head, then by KID in corresponding user profile P of server side searches, services
KID and user profile P are encrypted by end by SM3 algorithm, are generated and are obtained ciphering key, such as ciphering key=key A, and service end then passes through
SM4 algorithm decrypting ciphertext B obtains user profile P, hour of log-on T, effect duration E, time stamp T u and random number R;As ciphering key ≠ close
Key A, then fail;
(9) service end carries out verification judgement by time stamp T u for obtaining, and such as deviates current server time ± 3min and is then recognized
For TIMEOUT, so as to failure, have not timed out, the effect duration E for being obtained according to service end judge whether expired, expired, fail, not
User's unique mark UID that is expired, calling service end to store;
(10) service end generates new time stamp T s further according to current time, and service end does+n computing to random number R, obtain new with
Machine number Rn, then pass through new random number R n of SM3 algorithm for encryption, generate and obtain key K, K=Rn;Again by SM4 algorithm by UID, new
Random number R n and the encryption of new time stamp T s, obtain ciphertext D, D=K&UID&Rn&Ts;Service end is by ciphertext D together with protocol header
Service end is sent to, in the section protocol head, includes new random number R n information;
(11) client obtains new random number R n by analysis protocol head, and client passes through new random number R n of SM3 algorithm for encryption, raw
Become to obtain key J;As key J=key K, client then passes through key K decrypting ciphertext D, obtains UID, new random number R n and new
Time stamp T s, and-n computing is done to new random number R n, random number R is obtained, such as key J ≠ key K, then fail;
(12) client carries out verification judgement by new time stamp T s for obtaining, such as deviate the active client time ± 3min then by
Think TIMEOUT, so as to failure, have not timed out, judge whether random number R changes, change and then fail, do not change then certification and lead to
Cross, client obtains UID, the KID that UID is obtained with step (6) becomes ciphertext by sm3 algorithm for encryption, obtain cloud key V;
(13), when uploading data, the virtual disk module of cloud security administrative center produces a virtual logic on mainframe micro
Disk, user is first operated to data on virtual logic magnetic disc temporarily, the data partition encoding of cloud security administrative center
User data on virtual disk is randomly divided into module the fragmentation of data that several pieces differ in size, and per part of fragmentation of data is entered
Row redundancy is processed, and information management module is while generate file division information (FSEI), then encryption/decryption module uses step
(6) the cloud key V that step (12) real-time operation gets is encrypted to per part of fragmentation of data, then passes through cloud disk management module
Connection cloud disk pond, the random dispersion after load balancing module process of the fragment file after per part of encryption is uploaded to multiple cloud disks parallel
Different cloud storages on, information management module generate file storage catalogue information (FSLI), information management module pass through micro- master
Machine completes number by the file division information (FSEI) of fragment file and file storage catalogue information (FSLI) write key Key
According to upload;
(14)During downloading data, the data management module of cloud security administrative center obtains the file of fragment file from key Key
Segmentation information (FSEI) and file storage catalogue information (FSLI), cloud disk management module connects cloud disk pond, stores further according to file
Directory information (FSLI) is from the different cloud storages of multiple cloud disks by corresponding fragmentation of data after load balancing module process
Download in virtual disk, the cloud key V that encryption/decryption module is got by step (6) step (12) real-time operation is to all
Fragmentation of data be decrypted, the fragmentation of data for obtaining after deciphering is again through data partition encoding module according to file division information
(FSEI) group is merged into row redundancy check, and verification is wrong, carries out redundancy process, then regenerates data clear text after verification is errorless
Itself is simultaneously stored in virtual disk, completes the download of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610985283.9A CN106453384B (en) | 2016-11-09 | 2016-11-09 | Secure cloud disk system and secure encryption method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610985283.9A CN106453384B (en) | 2016-11-09 | 2016-11-09 | Secure cloud disk system and secure encryption method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106453384A true CN106453384A (en) | 2017-02-22 |
CN106453384B CN106453384B (en) | 2023-05-16 |
Family
ID=58208062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610985283.9A Expired - Fee Related CN106453384B (en) | 2016-11-09 | 2016-11-09 | Secure cloud disk system and secure encryption method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453384B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106788983A (en) * | 2017-03-01 | 2017-05-31 | 深圳市中博睿存信息技术有限公司 | A kind of communication data encryption method and device based on customer end/server mode |
CN107493287A (en) * | 2017-08-25 | 2017-12-19 | 天津中新智冠信息技术有限公司 | Industry control network data security system |
CN107590395A (en) * | 2017-08-15 | 2018-01-16 | 国家电网公司 | Suitable for multi-layer data encryption method, device, equipment and the system of cloud environment |
CN108900510A (en) * | 2018-06-29 | 2018-11-27 | 平安科技(深圳)有限公司 | Off-line data storage method, device, computer equipment and storage medium |
CN110032414A (en) * | 2019-03-06 | 2019-07-19 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN110263556A (en) * | 2019-05-22 | 2019-09-20 | 广东安创信息科技开发有限公司 | A kind of encryption and decryption method and system of OA system data |
CN110874485A (en) * | 2018-08-31 | 2020-03-10 | 洪绍御 | Smart data distributed storage system and method thereof |
CN113037770A (en) * | 2021-03-29 | 2021-06-25 | 武汉华工安鼎信息技术有限责任公司 | Industrial control data safety system and method based on storage virtualization |
CN113067892A (en) * | 2021-04-09 | 2021-07-02 | 北京理工大学 | Method for realizing safe cloud synchronization and cloud storage by using public cloud |
CN114189511A (en) * | 2021-12-06 | 2022-03-15 | 成都傲梅科技有限公司 | Third-party cloud-based multi-cloud combination method |
CN114466015A (en) * | 2022-01-25 | 2022-05-10 | 柏域信息科技(上海)有限公司 | Data storage system and method based on multi-cloud architecture |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
CN114553478A (en) * | 2022-01-13 | 2022-05-27 | 成都储迅科技有限责任公司 | Security system and method for accessing solid state disk by cloud server based on state password |
CN114567479A (en) * | 2022-02-28 | 2022-05-31 | 中国科学院软件研究所 | Intelligent equipment safety control reinforcement and monitoring early warning method |
CN116760546A (en) * | 2023-08-18 | 2023-09-15 | 湖南省通信建设有限公司 | Modularized password service method based on cloud environment |
CN118170499A (en) * | 2024-05-11 | 2024-06-11 | 中移(苏州)软件技术有限公司 | Virtual cloud disk segmentation method and device, electronic equipment and storage medium |
CN118400206A (en) * | 2024-06-28 | 2024-07-26 | 国网浙江省电力有限公司 | Intelligent control method and system for number of rooms of power distribution station |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201716734U (en) * | 2010-07-21 | 2011-01-19 | 郑州信大捷安信息技术有限公司 | Usb safe storage encryption device |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN103973440A (en) * | 2014-05-13 | 2014-08-06 | 东方斯泰克信息技术研究院(北京)有限公司 | File cloud security management method and system based on CPK |
US20140380057A1 (en) * | 2013-06-05 | 2014-12-25 | Huawei Technologies Co., Ltd. | Method, Server, Host, and System for Protecting Data Security |
CN104378206A (en) * | 2014-10-20 | 2015-02-25 | 中国科学院信息工程研究所 | Virtualization desktop safety certification method and system based on USB-Key |
CN105100076A (en) * | 2015-07-03 | 2015-11-25 | 浪潮电子信息产业股份有限公司 | Cloud data security system based on USB Key |
CN105450636A (en) * | 2015-11-06 | 2016-03-30 | 长春智信创联科技有限公司 | Cloud computing management system and management method of cloud computing management system |
-
2016
- 2016-11-09 CN CN201610985283.9A patent/CN106453384B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201716734U (en) * | 2010-07-21 | 2011-01-19 | 郑州信大捷安信息技术有限公司 | Usb safe storage encryption device |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
US20140380057A1 (en) * | 2013-06-05 | 2014-12-25 | Huawei Technologies Co., Ltd. | Method, Server, Host, and System for Protecting Data Security |
CN103973440A (en) * | 2014-05-13 | 2014-08-06 | 东方斯泰克信息技术研究院(北京)有限公司 | File cloud security management method and system based on CPK |
CN104378206A (en) * | 2014-10-20 | 2015-02-25 | 中国科学院信息工程研究所 | Virtualization desktop safety certification method and system based on USB-Key |
CN105100076A (en) * | 2015-07-03 | 2015-11-25 | 浪潮电子信息产业股份有限公司 | Cloud data security system based on USB Key |
CN105450636A (en) * | 2015-11-06 | 2016-03-30 | 长春智信创联科技有限公司 | Cloud computing management system and management method of cloud computing management system |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106788983A (en) * | 2017-03-01 | 2017-05-31 | 深圳市中博睿存信息技术有限公司 | A kind of communication data encryption method and device based on customer end/server mode |
CN107590395A (en) * | 2017-08-15 | 2018-01-16 | 国家电网公司 | Suitable for multi-layer data encryption method, device, equipment and the system of cloud environment |
CN107493287A (en) * | 2017-08-25 | 2017-12-19 | 天津中新智冠信息技术有限公司 | Industry control network data security system |
CN108900510A (en) * | 2018-06-29 | 2018-11-27 | 平安科技(深圳)有限公司 | Off-line data storage method, device, computer equipment and storage medium |
CN110874485A (en) * | 2018-08-31 | 2020-03-10 | 洪绍御 | Smart data distributed storage system and method thereof |
CN110032414B (en) * | 2019-03-06 | 2023-06-06 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN110032414A (en) * | 2019-03-06 | 2019-07-19 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN110263556A (en) * | 2019-05-22 | 2019-09-20 | 广东安创信息科技开发有限公司 | A kind of encryption and decryption method and system of OA system data |
CN113037770A (en) * | 2021-03-29 | 2021-06-25 | 武汉华工安鼎信息技术有限责任公司 | Industrial control data safety system and method based on storage virtualization |
CN113067892A (en) * | 2021-04-09 | 2021-07-02 | 北京理工大学 | Method for realizing safe cloud synchronization and cloud storage by using public cloud |
CN114189511A (en) * | 2021-12-06 | 2022-03-15 | 成都傲梅科技有限公司 | Third-party cloud-based multi-cloud combination method |
CN114189511B (en) * | 2021-12-06 | 2024-01-09 | 成都傲梅科技有限公司 | Multi-cloud combination method based on third party cloud |
CN114553478A (en) * | 2022-01-13 | 2022-05-27 | 成都储迅科技有限责任公司 | Security system and method for accessing solid state disk by cloud server based on state password |
CN114466015A (en) * | 2022-01-25 | 2022-05-10 | 柏域信息科技(上海)有限公司 | Data storage system and method based on multi-cloud architecture |
CN114466015B (en) * | 2022-01-25 | 2024-03-15 | 柏域信息科技(上海)有限公司 | Data storage system and method based on multi-cloud architecture |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
CN114500073B (en) * | 2022-02-11 | 2024-04-12 | 浪潮云信息技术股份公司 | User data cutting method and system supporting privacy protection in cloud storage system |
CN114567479A (en) * | 2022-02-28 | 2022-05-31 | 中国科学院软件研究所 | Intelligent equipment safety control reinforcement and monitoring early warning method |
CN116760546A (en) * | 2023-08-18 | 2023-09-15 | 湖南省通信建设有限公司 | Modularized password service method based on cloud environment |
CN116760546B (en) * | 2023-08-18 | 2023-10-31 | 湖南省通信建设有限公司 | Modularized password service method based on cloud environment |
CN118170499A (en) * | 2024-05-11 | 2024-06-11 | 中移(苏州)软件技术有限公司 | Virtual cloud disk segmentation method and device, electronic equipment and storage medium |
CN118170499B (en) * | 2024-05-11 | 2024-08-16 | 中移(苏州)软件技术有限公司 | Virtual cloud disk segmentation method and device, electronic equipment and storage medium |
CN118400206A (en) * | 2024-06-28 | 2024-07-26 | 国网浙江省电力有限公司 | Intelligent control method and system for number of rooms of power distribution station |
Also Published As
Publication number | Publication date |
---|---|
CN106453384B (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453384A (en) | Security cloud disk system and security encryption method thereof | |
US11470054B2 (en) | Key rotation techniques | |
US11695555B2 (en) | Federated key management | |
US10911457B2 (en) | Immediate policy effectiveness in eventually consistent systems | |
AU2017204853B2 (en) | Data security service | |
CA2899014C (en) | Policy enforcement with associated data | |
US11372993B2 (en) | Automatic key rotation | |
US10210341B2 (en) | Delayed data access | |
US9300639B1 (en) | Device coordination | |
US20140229732A1 (en) | Data security service | |
CN106936579A (en) | Cloud storage data storage and read method based on trusted third party agency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20230516 |