CN107204997A - The method and apparatus for managing cloud storage data - Google Patents

The method and apparatus for managing cloud storage data Download PDF

Info

Publication number
CN107204997A
CN107204997A CN201710652532.7A CN201710652532A CN107204997A CN 107204997 A CN107204997 A CN 107204997A CN 201710652532 A CN201710652532 A CN 201710652532A CN 107204997 A CN107204997 A CN 107204997A
Authority
CN
China
Prior art keywords
data
aes
cloud storage
encryption
adelman
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710652532.7A
Other languages
Chinese (zh)
Inventor
张俊雷
高飞
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710652532.7A priority Critical patent/CN107204997A/en
Publication of CN107204997A publication Critical patent/CN107204997A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method and apparatus for managing cloud storage data.Methods described includes:Obtain the data volume size of data to be stored;According to the data volume size, the AES that the data are used is determined, wherein the AES is rivest, shamir, adelman or symmetric encipherment algorithm;Using the AES, the data are encrypted, encryption data is obtained;The encryption data is sent to cloud storage system.

Description

The method and apparatus for managing cloud storage data
Technical field
The present invention relates to field of information processing, espespecially a kind of method and apparatus for managing cloud storage data.
Background technology
Cloud computing has been obtained than larger concern as a kind of present emerging calculation, has been had developed into newly Research and application field.In this mode, it is supplied to user to make by network using, the mode that has serviced of data and IT resources With.Cloud computing is the traditional computers such as Distributed Calculation, parallel computation, effectiveness calculating, the network storage, virtualization, load balancing The product merged with network technical development.Can be that user and enterprise create due to the flexibility of cloud computing, high efficiency and accuracy Make more profits.From the point of view of the development of current cloud computing, the safety of user data, the protection of privacy of user, data The problems such as storage and cloud computing stability in itself and high efficiency are to influence the important obstruction of cloud computing development, it is ensured that used The safety of family information, is the key that user selects cloud computing.
Mention cloud computing to have to cloud storage, the mass data that cloud computing is related to can be stored on hard disk.So hard disk The storage safety and transmission safety of upper data will necessarily be used as the most important thing.
The content of the invention
In order to solve the above-mentioned technical problem, can the invention provides a kind of method and apparatus for managing cloud storage data Improve the security of data transfer in cloud storage system.
In order to reach the object of the invention, the invention provides a kind of method for managing cloud storage data, including:
Obtain the data volume size of data to be stored;According to the data volume size, determine it is that the data are used plus Close algorithm, wherein the AES is rivest, shamir, adelman or symmetric encipherment algorithm;Using the AES, to described Data are encrypted, and obtain encryption data;The encryption data is sent to cloud storage system.
Wherein, it is described according to the data volume size, the AES that the data are used is determined, including:
The data volume size and the first data-quantity threshold for pre-setting are compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines The data use symmetric encipherment algorithm.
Wherein, it is described according to the data volume size, the AES that the data are used is determined, including:
When the data volume is more than the Second Threshold pre-set, the data volume and verification letter in the data are divided Breath;
Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
Wherein, the AES is being used, the data is being encrypted, before obtaining encryption data, methods described Also include:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, it is symmetrical after being encrypted Key;
The symmetric key after the encryption is sent to the cloud storage system.
Wherein, sending the encryption data to cloud storage system also includes:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES is institute State the AES that each several part data are used in encryption data.
A kind of device for managing cloud storage data, including:
First acquisition module, the data volume size of data to be stored for obtaining;
Determining module, for according to the data volume size, determining the AES that the data are used, wherein described add Close algorithm is rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module;
First sending module, for sending the encryption data to cloud storage system.
Wherein, the determining module includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use asymmetric encryption Algorithm, otherwise, it determines the data use symmetric encipherment algorithm.
Wherein, the determining module specifically for:
When the data volume is more than the Second Threshold pre-set, the data volume and verification letter in the data are divided Breath, determines that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
Wherein, described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, is deposited from the cloud Storage system obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, the symmetric key is encrypted, Symmetric key after being encrypted;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
Wherein, first sending module is additionally operable to:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES is institute State the AES that each several part data are used in encryption data.
The embodiment that the present invention is provided, according to the data volume size of data to be stored, determines encryption used in the data Algorithm, the characteristics of making full use of data storage in cloud computing encrypts the side combined with asymmetry encryption technology using symmetry Case, realizes the Security Data Transmission under efficiently management cloud storage.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by specification, rights Specifically noted structure is realized and obtained in claim and accompanying drawing.
Brief description of the drawings
Accompanying drawing is used for providing further understanding technical solution of the present invention, and constitutes a part for specification, with this The embodiment of application is used to explain technical scheme together, does not constitute the limitation to technical solution of the present invention.
The flow chart of the method for the management cloud storage data that Fig. 1 provides for the present invention;
The structure chart of the device for the management cloud storage data that Fig. 2 provides for the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application Feature can mutually be combined.
Can be in the computer system of such as one group computer executable instructions the step of the flow of accompanying drawing is illustrated Perform.And, although logical order is shown in flow charts, but in some cases, can be with suitable different from herein Sequence performs shown or described step.
The flow chart of the method for the management cloud storage data that Fig. 1 provides for the present invention.Method includes shown in Fig. 1:
Step 101, the data volume size for obtaining data to be stored;
Step 102, according to the data volume size, determine the AES that the data are used, wherein it is described encryption calculate Method is rivest, shamir, adelman or symmetric encipherment algorithm;
Step 103, using the AES, the data are encrypted, encryption data is obtained;
Step 104, to cloud storage system send the encryption data.
The embodiment of the method that the present invention is provided, according to the data volume size of data to be stored, is determined used in the data AES, the characteristics of making full use of data storage in cloud computing is combined using symmetry encryption and asymmetry encryption technology Scheme, realize efficiently management cloud storage under Security Data Transmission.
The embodiment of the method that the present invention is provided is described further below:
Cloud storage is divided into three part management:Firstth, accumulation layer.Cloud storage the most basic part, it be by What a series of network equipment and storage device were constituted.Secondth, basic management layer.It is the important part of cloud storage, the layer The demand of the availability of system and the stability of system is not only met, also for the encryption for realizing data and back-up job.3rd, Application-interface layer.This layer carries out the core component of application and development as cloud storage, can carry out opening for system application Hair.4th, access layer, realizes the shared of cloud storage data.
Therefore, the data encryption of cloud storage and encrypted data transmission are particularly important.The encryption skill of current comparative maturity Art is generally divided into symmetric encipherment algorithm (DES) and the class of rivest, shamir, adelman (RSA) two.But both cipher modes are each favourable Disadvantage, the encryption of symmetry AES, decryption speed ratio are very fast, are adapted in substantial amounts of data dissemination, but public key is identical with private key, Security can not be protected.Asymmetric encryption calculates complicated, and security is higher, but speed is slow.Meet more complicated Data processing, both can not complete encrypted work well.
Mode that we can be combined with both ensures the security of cloud user data.
In embodiments of the present invention, after data volume to be stored is obtained, by the data volume size and pre-set First data-quantity threshold is compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines The data use symmetric encipherment algorithm.
Wherein, the data-quantity threshold can be configured based on experience value, it is therefore an objective to make that data volume is less, importance High data are encrypted using unsymmetrical key, such as verification data;And for the larger file of data volume, such as video text Part etc., can be encrypted using symmetric key.
On the premise of key safety is ensured, with DES to whole data encryption, using RSA to data volume very small school Information encryption is tested, it is extraordinary to realize the security and efficiency of transmission of data.
Further, when a usual file is much, if the verification data of this document is destroyed, the number can be caused According to verification operation can not be realized, this bust this is caused, therefore, in the big data of transmission data, verification data is weighed very much Will, accordingly, it would be desirable to carry out specially treated to verification data.
In the present invention, when the data volume is more than the Second Threshold pre-set, the data in the data are divided Body and check information;Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
For example, a video file, the video file includes the school that video data is verified in itself and to video data Data are tested, symmetric encipherment algorithm can be used in itself to video data, rivest, shamir, adelman is used to verification data.
In addition, for the AES and the key of rivest, shamir, adelman used in user terminal ciphering process, it is necessary to Key agreement is carried out with server end.
In the present invention, the AES is being used, the data is being encrypted, before obtaining encryption data, institute Stating method also includes:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, it is symmetrical after being encrypted Key;
The symmetric key after the encryption is sent to the cloud storage system.
For example, user terminal to server end send request when, storage server produce RSA public key/private pair, then public affairs Key is sent to user.User terminal has generated the DES keys of oneself, and the RSA public key encryptions oneself sent using server end DES keys, and the DES keys after encryption are sent to server end, then server end is again with RSA private keys come decrypted user end The DES keys of transmission.
This method is advantageous in that, even if data are intercepted in network transmission process by attack, if not having DES keys, Even if data are intercepted, initial data can not be obtained;If DES Key Exposures, have passed through RSA public key encryptions, so decryption Private key is still stored in server end, and attacker still can not obtain initial data, therefore, and such double-encryption is greatly improved The security of data.
Because user terminal is when data are encrypted, the key that can be used has three kinds of possibility, is respectively that data are only made Only unsymmetrical key and symmetric key are used with symmetric key, to data using asymmetric symmetric key and to data.
Therefore, when sending the encryption data to cloud storage system, AES is sent to the cloud storage system Use information, wherein the AES that the use information of the AES uses for each several part data in the encryption data, The key information that this transmission of notification server end is used, facilitates server end to be rapidly completed decryption, mentions data-handling efficiency.
The structure chart of the device for the management cloud storage data that Fig. 2 provides for the present invention.Fig. 2 shown devices include:
First acquisition module 201, the data volume size of data to be stored for obtaining;
Determining module 202, for according to the data volume size, determining the AES that the data are used, wherein institute AES is stated for rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module 203;
First sending module 204, for sending the encryption data to cloud storage system.
Wherein, the determining module 202 includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use asymmetric encryption Algorithm, otherwise, it determines the data use symmetric encipherment algorithm.
Wherein, the determining module, specifically for when the data volume is more than the Second Threshold pre-set, dividing institute The data volume and check information in data are stated, determines that the data volume uses symmetric encipherment algorithm, the check information is used Rivest, shamir, adelman.
Optionally, described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, is deposited from the cloud Storage system obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, the symmetric key is encrypted, Symmetric key after being encrypted;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
Wherein, first sending module, is additionally operable to send the use information of AES to the cloud storage system, its Described in the use information of AES be the AES that uses of each several part data in the encryption data.
The device embodiment that the present invention is provided, according to the data volume size of data to be stored, is determined used in the data AES, the characteristics of making full use of data storage in cloud computing is combined using symmetry encryption and asymmetry encryption technology Scheme, realize efficiently management cloud storage under Security Data Transmission.
Although disclosed herein embodiment as above, described content be only readily appreciate the present invention and use Embodiment, is not limited to the present invention.Technical staff in any art of the present invention, is taken off not departing from the present invention On the premise of the spirit and scope of dew, any modification and change, but the present invention can be carried out in the form and details of implementation Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.

Claims (10)

1. a kind of method for managing cloud storage data, it is characterised in that including:
Obtain the data volume size of data to be stored;
According to the data volume size, the AES that the data are used is determined, wherein the AES adds to be asymmetric Close algorithm or symmetric encipherment algorithm;
Using the AES, the data are encrypted, encryption data is obtained;
The encryption data is sent to cloud storage system.
2. according to the method described in claim 1, it is characterised in that described according to the data volume size, determine the data The AES used, including:
The data volume size and the first data-quantity threshold for pre-setting are compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines described Data use symmetric encipherment algorithm.
3. method according to claim 2, it is characterised in that described according to the data volume size, determines the data The AES used, including:
When the data volume is more than the Second Threshold pre-set, the data volume and check information in the data are divided;
Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
4. according to the method described in claim 1, it is characterised in that using the AES, the data are added It is close, obtain before encryption data, methods described also includes:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, the symmetric key after being encrypted;
The symmetric key after the encryption is sent to the cloud storage system.
5. according to the method described in claim 1, it is characterised in that sending the encryption data to cloud storage system also includes:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES adds to be described The AES that each several part data are used in ciphertext data.
6. a kind of device for managing cloud storage data, it is characterised in that including:
First acquisition module, the data volume size of data to be stored for obtaining;
Determining module, for according to the data volume size, determining the AES that the data are used, wherein the encryption is calculated Method is rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module;
First sending module, for sending the encryption data to cloud storage system.
7. device according to claim 6, it is characterised in that the determining module includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, Otherwise, it determines the data use symmetric encipherment algorithm.
8. device according to claim 7, it is characterised in that the determining module specifically for:
When the data volume is more than the Second Threshold pre-set, the data volume and check information in the data are divided, Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
9. device according to claim 6, it is characterised in that described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, from the cloud storage system System obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, is encrypted to the symmetric key, obtains Symmetric key after encryption;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
10. device according to claim 6, it is characterised in that first sending module is additionally operable to:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES adds to be described The AES that each several part data are used in ciphertext data.
CN201710652532.7A 2017-08-02 2017-08-02 The method and apparatus for managing cloud storage data Pending CN107204997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710652532.7A CN107204997A (en) 2017-08-02 2017-08-02 The method and apparatus for managing cloud storage data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710652532.7A CN107204997A (en) 2017-08-02 2017-08-02 The method and apparatus for managing cloud storage data

Publications (1)

Publication Number Publication Date
CN107204997A true CN107204997A (en) 2017-09-26

Family

ID=59911566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710652532.7A Pending CN107204997A (en) 2017-08-02 2017-08-02 The method and apparatus for managing cloud storage data

Country Status (1)

Country Link
CN (1) CN107204997A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737365A (en) * 2018-03-26 2018-11-02 刘喆 A kind of network data information guard method and device
CN110781504A (en) * 2019-09-27 2020-02-11 深圳市大拿科技有限公司 Data protection method and related equipment
CN113242121A (en) * 2021-04-15 2021-08-10 哈尔滨工业大学 Safety communication method based on combined encryption
CN113242122A (en) * 2021-04-15 2021-08-10 哈尔滨工业大学 Encryption method based on DH and RSA encryption algorithm
CN113259345A (en) * 2021-05-12 2021-08-13 国网山东省电力公司东平县供电公司 Intelligent power distribution network data secure transmission method, system and storage medium
CN115883257A (en) * 2023-02-09 2023-03-31 广州万协通信息技术有限公司 Password operation method and device based on security chip
CN116186747A (en) * 2023-04-27 2023-05-30 暗链科技(深圳)有限公司 Adaptive hash encryption method, nonvolatile readable storage medium, and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223229A (en) * 2011-06-21 2011-10-19 航天科工深圳(集团)有限公司 Method for safe transmission of data in public network
CN102857338A (en) * 2012-08-31 2013-01-02 浪潮电子信息产业股份有限公司 Method for realizing secure transmission of data in cloud storage system
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
CN104852949A (en) * 2014-02-14 2015-08-19 航天信息股份有限公司 Cloud storage data management method and system based on hybrid encryption mechanism
CN106230776A (en) * 2016-07-15 2016-12-14 南京睦泽信息科技有限公司 The safety protecting method of cloud computing data and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223229A (en) * 2011-06-21 2011-10-19 航天科工深圳(集团)有限公司 Method for safe transmission of data in public network
CN102857338A (en) * 2012-08-31 2013-01-02 浪潮电子信息产业股份有限公司 Method for realizing secure transmission of data in cloud storage system
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
CN104852949A (en) * 2014-02-14 2015-08-19 航天信息股份有限公司 Cloud storage data management method and system based on hybrid encryption mechanism
CN106230776A (en) * 2016-07-15 2016-12-14 南京睦泽信息科技有限公司 The safety protecting method of cloud computing data and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737365A (en) * 2018-03-26 2018-11-02 刘喆 A kind of network data information guard method and device
CN110781504A (en) * 2019-09-27 2020-02-11 深圳市大拿科技有限公司 Data protection method and related equipment
CN113242121A (en) * 2021-04-15 2021-08-10 哈尔滨工业大学 Safety communication method based on combined encryption
CN113242122A (en) * 2021-04-15 2021-08-10 哈尔滨工业大学 Encryption method based on DH and RSA encryption algorithm
CN113259345A (en) * 2021-05-12 2021-08-13 国网山东省电力公司东平县供电公司 Intelligent power distribution network data secure transmission method, system and storage medium
CN115883257A (en) * 2023-02-09 2023-03-31 广州万协通信息技术有限公司 Password operation method and device based on security chip
CN116186747A (en) * 2023-04-27 2023-05-30 暗链科技(深圳)有限公司 Adaptive hash encryption method, nonvolatile readable storage medium, and electronic device

Similar Documents

Publication Publication Date Title
US11784801B2 (en) Key management method and related device
CN107204997A (en) The method and apparatus for managing cloud storage data
Kaur et al. Analysis of security algorithms in cloud computing
CN109361510B (en) Information processing method supporting overflow detection and large integer operation and application
CN104967693B (en) Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage
KR101615137B1 (en) Data access method based on attributed
Yan et al. Context-aware verifiable cloud computing
El Bouchti et al. Encryption as a service for data healthcare cloud security
WO2016088453A1 (en) Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program
Huang et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
CN108882030A (en) A kind of monitor video classification encryption and decryption method and system based on time-domain information
Bakro et al. Performance analysis of cloud computing encryption algorithms
Nguyen et al. An enhanced scheme for privacy-preserving association rules mining on horizontally distributed databases
JP5972181B2 (en) Tamper detection device, tamper detection method, and program
JP5669204B2 (en) Distributed information management system, distributed information management method, and distributed information management program
CN115599959A (en) Data sharing method, device, equipment and storage medium
CN112637233B (en) Safe averaging method based on multi-user data
Chavan et al. Secure CRM cloud service using RC5 algorithm
CN107483387A (en) A kind of method of controlling security and device
Pardeshi et al. Enhancing information security in cloud computing environment using cryptographic techniques
Mishra et al. Service Level Trust Key Encryption based Cloud Security using Starvation End-Point Encryption
Ahmed et al. Enhancing The Data Security In Cloud Computing By Using New Encryption Method
US11811741B2 (en) Information processing system and information processing method
Filaly et al. Hybrid Encryption Algorithm for Information Security in Hadoop
US11743293B2 (en) Remote attestation transport layer security and split trust encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170926