CN107204997A - The method and apparatus for managing cloud storage data - Google Patents
The method and apparatus for managing cloud storage data Download PDFInfo
- Publication number
- CN107204997A CN107204997A CN201710652532.7A CN201710652532A CN107204997A CN 107204997 A CN107204997 A CN 107204997A CN 201710652532 A CN201710652532 A CN 201710652532A CN 107204997 A CN107204997 A CN 107204997A
- Authority
- CN
- China
- Prior art keywords
- data
- aes
- cloud storage
- encryption
- adelman
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and apparatus for managing cloud storage data.Methods described includes:Obtain the data volume size of data to be stored;According to the data volume size, the AES that the data are used is determined, wherein the AES is rivest, shamir, adelman or symmetric encipherment algorithm;Using the AES, the data are encrypted, encryption data is obtained;The encryption data is sent to cloud storage system.
Description
Technical field
The present invention relates to field of information processing, espespecially a kind of method and apparatus for managing cloud storage data.
Background technology
Cloud computing has been obtained than larger concern as a kind of present emerging calculation, has been had developed into newly
Research and application field.In this mode, it is supplied to user to make by network using, the mode that has serviced of data and IT resources
With.Cloud computing is the traditional computers such as Distributed Calculation, parallel computation, effectiveness calculating, the network storage, virtualization, load balancing
The product merged with network technical development.Can be that user and enterprise create due to the flexibility of cloud computing, high efficiency and accuracy
Make more profits.From the point of view of the development of current cloud computing, the safety of user data, the protection of privacy of user, data
The problems such as storage and cloud computing stability in itself and high efficiency are to influence the important obstruction of cloud computing development, it is ensured that used
The safety of family information, is the key that user selects cloud computing.
Mention cloud computing to have to cloud storage, the mass data that cloud computing is related to can be stored on hard disk.So hard disk
The storage safety and transmission safety of upper data will necessarily be used as the most important thing.
The content of the invention
In order to solve the above-mentioned technical problem, can the invention provides a kind of method and apparatus for managing cloud storage data
Improve the security of data transfer in cloud storage system.
In order to reach the object of the invention, the invention provides a kind of method for managing cloud storage data, including:
Obtain the data volume size of data to be stored;According to the data volume size, determine it is that the data are used plus
Close algorithm, wherein the AES is rivest, shamir, adelman or symmetric encipherment algorithm;Using the AES, to described
Data are encrypted, and obtain encryption data;The encryption data is sent to cloud storage system.
Wherein, it is described according to the data volume size, the AES that the data are used is determined, including:
The data volume size and the first data-quantity threshold for pre-setting are compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines
The data use symmetric encipherment algorithm.
Wherein, it is described according to the data volume size, the AES that the data are used is determined, including:
When the data volume is more than the Second Threshold pre-set, the data volume and verification letter in the data are divided
Breath;
Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
Wherein, the AES is being used, the data is being encrypted, before obtaining encryption data, methods described
Also include:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, it is symmetrical after being encrypted
Key;
The symmetric key after the encryption is sent to the cloud storage system.
Wherein, sending the encryption data to cloud storage system also includes:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES is institute
State the AES that each several part data are used in encryption data.
A kind of device for managing cloud storage data, including:
First acquisition module, the data volume size of data to be stored for obtaining;
Determining module, for according to the data volume size, determining the AES that the data are used, wherein described add
Close algorithm is rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module;
First sending module, for sending the encryption data to cloud storage system.
Wherein, the determining module includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use asymmetric encryption
Algorithm, otherwise, it determines the data use symmetric encipherment algorithm.
Wherein, the determining module specifically for:
When the data volume is more than the Second Threshold pre-set, the data volume and verification letter in the data are divided
Breath, determines that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
Wherein, described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, is deposited from the cloud
Storage system obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, the symmetric key is encrypted,
Symmetric key after being encrypted;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
Wherein, first sending module is additionally operable to:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES is institute
State the AES that each several part data are used in encryption data.
The embodiment that the present invention is provided, according to the data volume size of data to be stored, determines encryption used in the data
Algorithm, the characteristics of making full use of data storage in cloud computing encrypts the side combined with asymmetry encryption technology using symmetry
Case, realizes the Security Data Transmission under efficiently management cloud storage.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by specification, rights
Specifically noted structure is realized and obtained in claim and accompanying drawing.
Brief description of the drawings
Accompanying drawing is used for providing further understanding technical solution of the present invention, and constitutes a part for specification, with this
The embodiment of application is used to explain technical scheme together, does not constitute the limitation to technical solution of the present invention.
The flow chart of the method for the management cloud storage data that Fig. 1 provides for the present invention;
The structure chart of the device for the management cloud storage data that Fig. 2 provides for the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention
Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application
Feature can mutually be combined.
Can be in the computer system of such as one group computer executable instructions the step of the flow of accompanying drawing is illustrated
Perform.And, although logical order is shown in flow charts, but in some cases, can be with suitable different from herein
Sequence performs shown or described step.
The flow chart of the method for the management cloud storage data that Fig. 1 provides for the present invention.Method includes shown in Fig. 1:
Step 101, the data volume size for obtaining data to be stored;
Step 102, according to the data volume size, determine the AES that the data are used, wherein it is described encryption calculate
Method is rivest, shamir, adelman or symmetric encipherment algorithm;
Step 103, using the AES, the data are encrypted, encryption data is obtained;
Step 104, to cloud storage system send the encryption data.
The embodiment of the method that the present invention is provided, according to the data volume size of data to be stored, is determined used in the data
AES, the characteristics of making full use of data storage in cloud computing is combined using symmetry encryption and asymmetry encryption technology
Scheme, realize efficiently management cloud storage under Security Data Transmission.
The embodiment of the method that the present invention is provided is described further below:
Cloud storage is divided into three part management:Firstth, accumulation layer.Cloud storage the most basic part, it be by
What a series of network equipment and storage device were constituted.Secondth, basic management layer.It is the important part of cloud storage, the layer
The demand of the availability of system and the stability of system is not only met, also for the encryption for realizing data and back-up job.3rd,
Application-interface layer.This layer carries out the core component of application and development as cloud storage, can carry out opening for system application
Hair.4th, access layer, realizes the shared of cloud storage data.
Therefore, the data encryption of cloud storage and encrypted data transmission are particularly important.The encryption skill of current comparative maturity
Art is generally divided into symmetric encipherment algorithm (DES) and the class of rivest, shamir, adelman (RSA) two.But both cipher modes are each favourable
Disadvantage, the encryption of symmetry AES, decryption speed ratio are very fast, are adapted in substantial amounts of data dissemination, but public key is identical with private key,
Security can not be protected.Asymmetric encryption calculates complicated, and security is higher, but speed is slow.Meet more complicated
Data processing, both can not complete encrypted work well.
Mode that we can be combined with both ensures the security of cloud user data.
In embodiments of the present invention, after data volume to be stored is obtained, by the data volume size and pre-set
First data-quantity threshold is compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines
The data use symmetric encipherment algorithm.
Wherein, the data-quantity threshold can be configured based on experience value, it is therefore an objective to make that data volume is less, importance
High data are encrypted using unsymmetrical key, such as verification data;And for the larger file of data volume, such as video text
Part etc., can be encrypted using symmetric key.
On the premise of key safety is ensured, with DES to whole data encryption, using RSA to data volume very small school
Information encryption is tested, it is extraordinary to realize the security and efficiency of transmission of data.
Further, when a usual file is much, if the verification data of this document is destroyed, the number can be caused
According to verification operation can not be realized, this bust this is caused, therefore, in the big data of transmission data, verification data is weighed very much
Will, accordingly, it would be desirable to carry out specially treated to verification data.
In the present invention, when the data volume is more than the Second Threshold pre-set, the data in the data are divided
Body and check information;Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
For example, a video file, the video file includes the school that video data is verified in itself and to video data
Data are tested, symmetric encipherment algorithm can be used in itself to video data, rivest, shamir, adelman is used to verification data.
In addition, for the AES and the key of rivest, shamir, adelman used in user terminal ciphering process, it is necessary to
Key agreement is carried out with server end.
In the present invention, the AES is being used, the data is being encrypted, before obtaining encryption data, institute
Stating method also includes:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, it is symmetrical after being encrypted
Key;
The symmetric key after the encryption is sent to the cloud storage system.
For example, user terminal to server end send request when, storage server produce RSA public key/private pair, then public affairs
Key is sent to user.User terminal has generated the DES keys of oneself, and the RSA public key encryptions oneself sent using server end
DES keys, and the DES keys after encryption are sent to server end, then server end is again with RSA private keys come decrypted user end
The DES keys of transmission.
This method is advantageous in that, even if data are intercepted in network transmission process by attack, if not having DES keys,
Even if data are intercepted, initial data can not be obtained;If DES Key Exposures, have passed through RSA public key encryptions, so decryption
Private key is still stored in server end, and attacker still can not obtain initial data, therefore, and such double-encryption is greatly improved
The security of data.
Because user terminal is when data are encrypted, the key that can be used has three kinds of possibility, is respectively that data are only made
Only unsymmetrical key and symmetric key are used with symmetric key, to data using asymmetric symmetric key and to data.
Therefore, when sending the encryption data to cloud storage system, AES is sent to the cloud storage system
Use information, wherein the AES that the use information of the AES uses for each several part data in the encryption data,
The key information that this transmission of notification server end is used, facilitates server end to be rapidly completed decryption, mentions data-handling efficiency.
The structure chart of the device for the management cloud storage data that Fig. 2 provides for the present invention.Fig. 2 shown devices include:
First acquisition module 201, the data volume size of data to be stored for obtaining;
Determining module 202, for according to the data volume size, determining the AES that the data are used, wherein institute
AES is stated for rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module 203;
First sending module 204, for sending the encryption data to cloud storage system.
Wherein, the determining module 202 includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use asymmetric encryption
Algorithm, otherwise, it determines the data use symmetric encipherment algorithm.
Wherein, the determining module, specifically for when the data volume is more than the Second Threshold pre-set, dividing institute
The data volume and check information in data are stated, determines that the data volume uses symmetric encipherment algorithm, the check information is used
Rivest, shamir, adelman.
Optionally, described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, is deposited from the cloud
Storage system obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, the symmetric key is encrypted,
Symmetric key after being encrypted;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
Wherein, first sending module, is additionally operable to send the use information of AES to the cloud storage system, its
Described in the use information of AES be the AES that uses of each several part data in the encryption data.
The device embodiment that the present invention is provided, according to the data volume size of data to be stored, is determined used in the data
AES, the characteristics of making full use of data storage in cloud computing is combined using symmetry encryption and asymmetry encryption technology
Scheme, realize efficiently management cloud storage under Security Data Transmission.
Although disclosed herein embodiment as above, described content be only readily appreciate the present invention and use
Embodiment, is not limited to the present invention.Technical staff in any art of the present invention, is taken off not departing from the present invention
On the premise of the spirit and scope of dew, any modification and change, but the present invention can be carried out in the form and details of implementation
Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.
Claims (10)
1. a kind of method for managing cloud storage data, it is characterised in that including:
Obtain the data volume size of data to be stored;
According to the data volume size, the AES that the data are used is determined, wherein the AES adds to be asymmetric
Close algorithm or symmetric encipherment algorithm;
Using the AES, the data are encrypted, encryption data is obtained;
The encryption data is sent to cloud storage system.
2. according to the method described in claim 1, it is characterised in that described according to the data volume size, determine the data
The AES used, including:
The data volume size and the first data-quantity threshold for pre-setting are compared;
If less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman, otherwise, it determines described
Data use symmetric encipherment algorithm.
3. method according to claim 2, it is characterised in that described according to the data volume size, determines the data
The AES used, including:
When the data volume is more than the Second Threshold pre-set, the data volume and check information in the data are divided;
Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
4. according to the method described in claim 1, it is characterised in that using the AES, the data are added
It is close, obtain before encryption data, methods described also includes:
The public key of rivest, shamir, adelman is obtained from the cloud storage system;
Using the Symmetric key generation strategy pre-set, symmetric key is generated;
Using the public key of the rivest, shamir, adelman, the symmetric key is encrypted, the symmetric key after being encrypted;
The symmetric key after the encryption is sent to the cloud storage system.
5. according to the method described in claim 1, it is characterised in that sending the encryption data to cloud storage system also includes:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES adds to be described
The AES that each several part data are used in ciphertext data.
6. a kind of device for managing cloud storage data, it is characterised in that including:
First acquisition module, the data volume size of data to be stored for obtaining;
Determining module, for according to the data volume size, determining the AES that the data are used, wherein the encryption is calculated
Method is rivest, shamir, adelman or symmetric encipherment algorithm;
The data, for using the AES, are encrypted, obtain encryption data by the first encrypting module;
First sending module, for sending the encryption data to cloud storage system.
7. device according to claim 6, it is characterised in that the determining module includes:
Comparing unit, for the data volume size and the first data-quantity threshold for pre-setting to be compared;
Determining unit, for if less than first data-quantity threshold, it is determined that the data use rivest, shamir, adelman,
Otherwise, it determines the data use symmetric encipherment algorithm.
8. device according to claim 7, it is characterised in that the determining module specifically for:
When the data volume is more than the Second Threshold pre-set, the data volume and check information in the data are divided,
Determine that the data volume uses symmetric encipherment algorithm, the check information uses rivest, shamir, adelman.
9. device according to claim 6, it is characterised in that described device also includes:
Second acquisition module, for using the AES, before the data are encrypted, from the cloud storage system
System obtains the public key of rivest, shamir, adelman;
Generation module, for using the Symmetric key generation strategy pre-set, generating symmetric key;
Second encrypting module, for the public key using the rivest, shamir, adelman, is encrypted to the symmetric key, obtains
Symmetric key after encryption;
Second sending module, for sending the symmetric key after the encryption to the cloud storage system.
10. device according to claim 6, it is characterised in that first sending module is additionally operable to:
The use information of AES is sent to the cloud storage system, wherein the use information of the AES adds to be described
The AES that each several part data are used in ciphertext data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710652532.7A CN107204997A (en) | 2017-08-02 | 2017-08-02 | The method and apparatus for managing cloud storage data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710652532.7A CN107204997A (en) | 2017-08-02 | 2017-08-02 | The method and apparatus for managing cloud storage data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107204997A true CN107204997A (en) | 2017-09-26 |
Family
ID=59911566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710652532.7A Pending CN107204997A (en) | 2017-08-02 | 2017-08-02 | The method and apparatus for managing cloud storage data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107204997A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737365A (en) * | 2018-03-26 | 2018-11-02 | 刘喆 | A kind of network data information guard method and device |
CN110781504A (en) * | 2019-09-27 | 2020-02-11 | 深圳市大拿科技有限公司 | Data protection method and related equipment |
CN113242121A (en) * | 2021-04-15 | 2021-08-10 | 哈尔滨工业大学 | Safety communication method based on combined encryption |
CN113242122A (en) * | 2021-04-15 | 2021-08-10 | 哈尔滨工业大学 | Encryption method based on DH and RSA encryption algorithm |
CN113259345A (en) * | 2021-05-12 | 2021-08-13 | 国网山东省电力公司东平县供电公司 | Intelligent power distribution network data secure transmission method, system and storage medium |
CN115883257A (en) * | 2023-02-09 | 2023-03-31 | 广州万协通信息技术有限公司 | Password operation method and device based on security chip |
CN116186747A (en) * | 2023-04-27 | 2023-05-30 | 暗链科技(深圳)有限公司 | Adaptive hash encryption method, nonvolatile readable storage medium, and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223229A (en) * | 2011-06-21 | 2011-10-19 | 航天科工深圳(集团)有限公司 | Method for safe transmission of data in public network |
CN102857338A (en) * | 2012-08-31 | 2013-01-02 | 浪潮电子信息产业股份有限公司 | Method for realizing secure transmission of data in cloud storage system |
CN103780622A (en) * | 2014-01-24 | 2014-05-07 | 华中科技大学 | Data classification and encryption method for cloud storage |
CN104852949A (en) * | 2014-02-14 | 2015-08-19 | 航天信息股份有限公司 | Cloud storage data management method and system based on hybrid encryption mechanism |
CN106230776A (en) * | 2016-07-15 | 2016-12-14 | 南京睦泽信息科技有限公司 | The safety protecting method of cloud computing data and device |
-
2017
- 2017-08-02 CN CN201710652532.7A patent/CN107204997A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223229A (en) * | 2011-06-21 | 2011-10-19 | 航天科工深圳(集团)有限公司 | Method for safe transmission of data in public network |
CN102857338A (en) * | 2012-08-31 | 2013-01-02 | 浪潮电子信息产业股份有限公司 | Method for realizing secure transmission of data in cloud storage system |
CN103780622A (en) * | 2014-01-24 | 2014-05-07 | 华中科技大学 | Data classification and encryption method for cloud storage |
CN104852949A (en) * | 2014-02-14 | 2015-08-19 | 航天信息股份有限公司 | Cloud storage data management method and system based on hybrid encryption mechanism |
CN106230776A (en) * | 2016-07-15 | 2016-12-14 | 南京睦泽信息科技有限公司 | The safety protecting method of cloud computing data and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737365A (en) * | 2018-03-26 | 2018-11-02 | 刘喆 | A kind of network data information guard method and device |
CN110781504A (en) * | 2019-09-27 | 2020-02-11 | 深圳市大拿科技有限公司 | Data protection method and related equipment |
CN113242121A (en) * | 2021-04-15 | 2021-08-10 | 哈尔滨工业大学 | Safety communication method based on combined encryption |
CN113242122A (en) * | 2021-04-15 | 2021-08-10 | 哈尔滨工业大学 | Encryption method based on DH and RSA encryption algorithm |
CN113259345A (en) * | 2021-05-12 | 2021-08-13 | 国网山东省电力公司东平县供电公司 | Intelligent power distribution network data secure transmission method, system and storage medium |
CN115883257A (en) * | 2023-02-09 | 2023-03-31 | 广州万协通信息技术有限公司 | Password operation method and device based on security chip |
CN116186747A (en) * | 2023-04-27 | 2023-05-30 | 暗链科技(深圳)有限公司 | Adaptive hash encryption method, nonvolatile readable storage medium, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11784801B2 (en) | Key management method and related device | |
CN107204997A (en) | The method and apparatus for managing cloud storage data | |
Kaur et al. | Analysis of security algorithms in cloud computing | |
CN109361510B (en) | Information processing method supporting overflow detection and large integer operation and application | |
CN104967693B (en) | Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage | |
KR101615137B1 (en) | Data access method based on attributed | |
Yan et al. | Context-aware verifiable cloud computing | |
El Bouchti et al. | Encryption as a service for data healthcare cloud security | |
WO2016088453A1 (en) | Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program | |
Huang et al. | Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing | |
CN108882030A (en) | A kind of monitor video classification encryption and decryption method and system based on time-domain information | |
Bakro et al. | Performance analysis of cloud computing encryption algorithms | |
Nguyen et al. | An enhanced scheme for privacy-preserving association rules mining on horizontally distributed databases | |
JP5972181B2 (en) | Tamper detection device, tamper detection method, and program | |
JP5669204B2 (en) | Distributed information management system, distributed information management method, and distributed information management program | |
CN115599959A (en) | Data sharing method, device, equipment and storage medium | |
CN112637233B (en) | Safe averaging method based on multi-user data | |
Chavan et al. | Secure CRM cloud service using RC5 algorithm | |
CN107483387A (en) | A kind of method of controlling security and device | |
Pardeshi et al. | Enhancing information security in cloud computing environment using cryptographic techniques | |
Mishra et al. | Service Level Trust Key Encryption based Cloud Security using Starvation End-Point Encryption | |
Ahmed et al. | Enhancing The Data Security In Cloud Computing By Using New Encryption Method | |
US11811741B2 (en) | Information processing system and information processing method | |
Filaly et al. | Hybrid Encryption Algorithm for Information Security in Hadoop | |
US11743293B2 (en) | Remote attestation transport layer security and split trust encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170926 |