CN107395612A - Realize the System and method for of network disk data safety - Google Patents

Realize the System and method for of network disk data safety Download PDF

Info

Publication number
CN107395612A
CN107395612A CN201710670947.7A CN201710670947A CN107395612A CN 107395612 A CN107395612 A CN 107395612A CN 201710670947 A CN201710670947 A CN 201710670947A CN 107395612 A CN107395612 A CN 107395612A
Authority
CN
China
Prior art keywords
encryption
file
dropbox
network disk
disk data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710670947.7A
Other languages
Chinese (zh)
Inventor
刘剑飞
常清雪
肖建
李成东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201710670947.7A priority Critical patent/CN107395612A/en
Publication of CN107395612A publication Critical patent/CN107395612A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention discloses a kind of System and method for for realizing network disk data safety, it is intended to protects network disk data, the safety of information and privacy, the sensitive data that need to be passed to Dropbox preservation is encrypted by installing the terminal applies of the system, terminal applies in terminal by user.After the completion of encryption, then incoming Dropbox is preserved.When user needs to extract data, former encryption data is first downloaded from Dropbox, then encryption data is decrypted by terminal applies and is reduced to former data file.So that to be stored in the sensitive data in Dropbox, there is provided a kind of security mechanism and service.

Description

Realize the System and method for of network disk data safety
Technical field
The present invention relates to Dropbox security technology area, and in particular to a kind of System and method for for realizing network disk data safety.
Background technology
With the development of internet, Dropbox is with more and more common.Have personal Dropbox, enterprise's Dropbox, have free Dropbox and Charge Dropbox, the space of Dropbox are also increasing.Increasing people stores the texts such as video, audio, text, picture with Dropbox Part, the source code of exploitation is even transferred to Dropbox storage backup by application developer, while Dropbox may also be used for friend point Enjoy the content being stored in Dropbox.Dropbox is that data message exchange storage provides a great convenience.But there is also one for Dropbox Fixed potential safety hazard.Such as provide that the server of Dropbox service is obtained by a hacker, the sensitive data of storage can be provided Dropbox clothes The third company of business, and possess keeper's acquisition of high authority.So it is stored in sensitivity in Dropbox, private data is present Compromised risk.
The content of the invention
Instant invention overcomes the deficiencies in the prior art, there is provided a kind of System and method for for realizing network disk data safety, it is intended to To be stored in the sensitive data in Dropbox, there is provided a kind of security mechanism and service.
In view of the above mentioned problem of prior art, according to one side disclosed by the invention, the present invention uses following technology Scheme:
A kind of method for realizing network disk data safety, its ciphering process include:
According to the cipher mode that User Defined selects to being used to be uploaded to before third party's Dropbox on application terminal File is encrypted, and generates encryption and decryption key at random by server;
Server preserves encryption and decryption key and recording of encrypted fileinfo;
Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
In order to which the present invention is better achieved, further technical scheme is:
According to one embodiment of the invention, before to file encryption, the file for bytecode format is translated the file into.
According to another embodiment of the invention, the symmetric encipherment algorithm of the User Defined selection encryption file.
According to another embodiment of the invention, after file encryption, the encryption file of .rar forms is generated.
According to another embodiment of the invention, the title or terminal applies of User Defined encryption file are ordered automatically Name.
According to another embodiment of the invention, the encryption fileinfo includes the filename and original text of encryption file Part name.
According to another embodiment of the invention, the cipher mode of the User Defined selection is calculated using symmetric cryptography Method.
According to another embodiment of the invention, in addition to:
Terminal applies carry out Hash operation to encryption file, and server obtains and preserves Hash operation value.
According to another embodiment of the invention, decrypting process includes:
It is close to obtain the encryption and decryption for encrypting file according to the encryption file to be decrypted of selection from server for application terminal Key, Hash operation value and encryption fileinfo;
The Hash operation value of file to be decrypted on application terminal is contrasted with the Hash operation value obtained from server, It is determined that in the case that the two is consistent, then the file of explanation preservation third party's Dropbox is not modified;
Corresponding AES and key are called in application terminal, and encryption file is decrypted.
The present invention can also be:
A kind of system for realizing network disk data safety, including:
It is corresponding for realizing the cipher mode selected according to User Defined and generating encryption and decryption key at random by server With the device being encrypted for the file before being uploaded to third party's Dropbox in terminal;And
Realize by encryption situation of the described device to server feedback, encryption and decryption key and recording of encrypted are preserved by server Fileinfo;Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
Compared with prior art, one of beneficial effects of the present invention are:
A kind of System and method for for realizing network disk data safety of the present invention, server download terminal of the user from the system Using, you can the file for preparing encryption is encrypted.Then the file after encryption is uploaded into Dropbox to be preserved.So protect Having demonstrate,proved after the file being stored in Dropbox is stolen to be read, while key is not together preservation with encryption file, ensure that Encryption file is not easy to be cracked.The server of the system provides download terminal application, preserves the function such as key, user's login.With Family changes terminal or when being in strange land, can also obtain the encryption file for uploading or downloading Dropbox, and encryption and decryption file.So make The system of obtaining has good applicability and versatility.
Brief description of the drawings
, below will be to embodiment for clearer explanation present specification embodiment or technical scheme of the prior art Or the required accompanying drawing used is briefly described in the description of prior art, it should be apparent that, drawings in the following description are only It is the reference to some embodiments in present specification, for those skilled in the art, is not paying creative work In the case of, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the file encryption schematic flow sheet according to the network disk data encryption system of one embodiment of the invention.
Fig. 2 is the file decryption schematic flow sheet according to the network disk data encryption system of one embodiment of the invention.
Embodiment
The present invention is described in further detail with reference to embodiment, but the implementation of the present invention is not limited to this.
The system of this Dropbox data safety is mainly made up of server and the part of application terminal two, and its major function includes:
Server is responsible for downloading application terminal, manages user data, enciphering and deciphering algorithm, the file name of recording of encrypted, life Deposit and preserve the functions such as encryption and decryption key.
Application terminal need to be arranged in the terminal that user uses, such as PC, smart mobile phone etc..Major function is responsible for Encryption and decryption file, encryption and decryption key is obtained to server, managing encrypted algorithm, obtains the functions such as user data.
As shown in figure 1, Fig. 1 shows the file encryption stream of network disk data encryption system according to an embodiment of the invention Journey, its idiographic flow are:
1st, user accesses network disk data encryption system server, downloads and installs network disk data encryption system terminal.
2nd, user starts installation network disk data encryption system terminal, is registered by terminal interface and is passed to user to server The information such as name, password, E-mail address, phone.
3rd, the file that user need to be encrypted by the selection of terminal applies dialog box, such as text, audio file, video text Part, picture file, compressed file etc., translate the file into the file for bytecode format.
4th, user can customize the symmetric encipherment algorithm of selection encryption file, and algorithm is supplied to from small to large by Cipher Strength User, symmetric encipherment algorithm include TEA, BLOWFISH, AES.Default encryption algorithm is BLOWFISH.Encryption key is by server Random generation, and preserve in the server.There are 32 according to customer option key length, 64,128, default key length For 64.When User Defined selects AES, intensity is stronger, and corresponding key is also longer.
5th, after file encryption, the encryption file of .rar forms is generated.Encrypt file filename user can oneself definition or Named automatically by terminal applies.Terminal applies carry out MD5 Hash operations to encryption file again, obtain the MD5 cryptographic Hash of ciphertext with Filename, the old file name of encryption file together preserve in the server.After the filename preservation for completing MD5 and encryption file, Application terminal can prompt the filename that user not change encryption file arbitrarily again.Such as need to change, need to be by terminal applies, will be new The filename of change is updated into server.
6th, user is obtained after encrypting file, and encryption file is uploaded in third party's Dropbox and preserved.
As shown in Fig. 2 Fig. 2 shows the file decryption stream of network disk data encryption system according to an embodiment of the invention Journey, its idiographic flow are:
1st, user logs in third party's Dropbox by encryption file download to user terminal, such as PC, intelligent terminal etc..
2nd, the application terminal of network disk data encryption system is started on the subscriber terminal, such as user leads in other place reasons Changes terminal is caused, then needs to access network disk data encryption system server download application terminal, in new terminal.
3rd, user logs in application terminal, starts application terminal decryption dialog box, selects the encryption file that need to be decrypted.Using end End obtains the letter such as AES and key, MD5 values, old file name of the encryption file according to user name, filename from server Breath.
4th, application terminal obtains the MD5 values contrast that the MD5 values of file to be decrypted obtain with server first, it is determined that unanimously, The file for illustrating to have third party's Dropbox is without any change.
5th, corresponding AES and key are finally called in application terminal, and encryption file is decrypted.Obtained after decryption The file of bytecode format.
6th, the file of bytecode format is finally converted to by original according to the suffix of old file name.
To sum up, the present invention can protect network disk data, the safety of information and privacy, and user in terminal by installing the system Terminal applies, the sensitive data that need to be passed to Dropbox preservation is encrypted terminal applies, and after the completion of encryption, then incoming Dropbox is carried out Preserve.When user needs to extract data, former encryption data is first downloaded from Dropbox, then by terminal applies to encrypting number Former data file is reduced to according to being decrypted, so as to be the sensitive data being stored in Dropbox, there is provided a kind of safe and secret machine System and service.
Scheme disclosed by the invention can be applied to 360 cloud disks, Baidu's cloud Dropbox, 115 Dropbox, association's enterprise disk, MediaFire etc., preserve sensitive data and sensitive document.To preserving secret privacy information, prevent third party, hacker from obtaining, usurping Change and play good safeguard protection effect.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be with it is other The difference of embodiment, identical similar portion cross-reference between each embodiment.
" one embodiment " for being spoken of in this manual, " another embodiment ", " embodiment ", etc., refer to tying Specific features, structure or the feature for closing embodiment description are included at least one embodiment of the application generality description In.It is not necessarily to refer to same embodiment that statement of the same race, which occur, in multiple places in the description.Appoint furthermore, it is understood that combining When one embodiment describes a specific features, structure or feature, what is advocated is this to realize with reference to other embodiment Feature, structure or feature are also fallen within the scope of the present invention.
Although reference be made herein to invention has been described for multiple explanatory embodiments of the invention, however, it is to be understood that Those skilled in the art can be designed that a lot of other modifications and embodiment, and these modifications and embodiment will fall in this Shen Please be within disclosed spirit and spirit.More specifically, can be to master in the range of disclosure and claim The building block and/or layout for inscribing composite configuration carry out a variety of variations and modifications.Except what is carried out to building block and/or layout Outside variations and modifications, to those skilled in the art, other purposes also will be apparent.

Claims (10)

  1. A kind of 1. method for realizing network disk data safety, it is characterised in that ciphering process includes:
    File before third party's Dropbox is uploaded to being used on application terminal according to the cipher mode that User Defined selects It is encrypted, and generates encryption and decryption key at random by server;
    Server preserves encryption and decryption key and recording of encrypted fileinfo;
    Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
  2. 2. the method according to claim 1 for realizing network disk data safety, it is characterised in that before to file encryption, by text Part is converted to the file of bytecode format.
  3. 3. the method according to claim 1 for realizing network disk data safety, it is characterised in that the User Defined selection Encrypt the symmetric encipherment algorithm of file.
  4. 4. the method according to claim 1 for realizing network disk data safety, it is characterised in that after file encryption, generate .rar The encryption file of form.
  5. 5. the method according to claim 1 for realizing network disk data safety, it is characterised in that User Defined encrypts file Title or terminal applies name automatically.
  6. 6. the method according to claim 1 for realizing network disk data safety, it is characterised in that the encryption fileinfo bag Include the filename and old file name of encryption file.
  7. 7. the method according to claim 1 for realizing network disk data safety, it is characterised in that the User Defined selection Cipher mode use symmetric encipherment algorithm.
  8. 8. the method according to claim 1 for realizing network disk data safety, it is characterised in that also include:
    Terminal applies carry out Hash operation to encryption file, and server obtains and preserves Hash operation value.
  9. 9. network disk data according to claim 8 securely achieves method, it is characterised in that decrypting process includes:
    Application terminal according to the encryption file to be decrypted of selection, from server obtain the encryption file encryption and decryption key, Hash operation value and encryption fileinfo;
    By the Hash operation value of the file to be decrypted on application terminal with from server obtain Hash operation value contrast, it is determined that In the case that the two is consistent, then the file of explanation preservation third party's Dropbox is not modified;
    Corresponding AES and key are called in application terminal, and encryption file is decrypted.
  10. A kind of 10. system for realizing network disk data safety, it is characterised in that including:
    For realizing the cipher mode selected according to User Defined and generating encryption and decryption key at random by server, to application eventually The device being encrypted for the file before being uploaded to third party's Dropbox on end;And
    Realize by encryption situation of the described device to server feedback, encryption and decryption key and recording of encrypted file are preserved by server Information;Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
CN201710670947.7A 2017-08-08 2017-08-08 Realize the System and method for of network disk data safety Pending CN107395612A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710670947.7A CN107395612A (en) 2017-08-08 2017-08-08 Realize the System and method for of network disk data safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710670947.7A CN107395612A (en) 2017-08-08 2017-08-08 Realize the System and method for of network disk data safety

Publications (1)

Publication Number Publication Date
CN107395612A true CN107395612A (en) 2017-11-24

Family

ID=60354953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710670947.7A Pending CN107395612A (en) 2017-08-08 2017-08-08 Realize the System and method for of network disk data safety

Country Status (1)

Country Link
CN (1) CN107395612A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259609A (en) * 2018-01-20 2018-07-06 福建省数字福建云计算运营有限公司 The management method and Cloud Server of a kind of family high in the clouds data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123143A (en) * 2011-01-21 2011-07-13 宁波市胜源技术转移有限公司 Method for storing data in network safely
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
CN103595793A (en) * 2013-11-13 2014-02-19 华中科技大学 Cloud data safe deleting system and method without support of trusted third party
CN103617401A (en) * 2013-11-25 2014-03-05 北京深思数盾科技有限公司 Method and device for protecting data files
US20140372750A1 (en) * 2013-05-08 2014-12-18 Intermedia.net. Inc. Client-side encryption
CN106254324A (en) * 2016-07-26 2016-12-21 杭州文签网络技术有限公司 A kind of encryption method storing file and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123143A (en) * 2011-01-21 2011-07-13 宁波市胜源技术转移有限公司 Method for storing data in network safely
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
US20140372750A1 (en) * 2013-05-08 2014-12-18 Intermedia.net. Inc. Client-side encryption
CN103595793A (en) * 2013-11-13 2014-02-19 华中科技大学 Cloud data safe deleting system and method without support of trusted third party
CN103617401A (en) * 2013-11-25 2014-03-05 北京深思数盾科技有限公司 Method and device for protecting data files
CN106254324A (en) * 2016-07-26 2016-12-21 杭州文签网络技术有限公司 A kind of encryption method storing file and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259609A (en) * 2018-01-20 2018-07-06 福建省数字福建云计算运营有限公司 The management method and Cloud Server of a kind of family high in the clouds data
CN108259609B (en) * 2018-01-20 2020-10-16 福建省数字福建云计算运营有限公司 Family cloud data management method and cloud server

Similar Documents

Publication Publication Date Title
JP6609010B2 (en) Multiple permission data security and access
US9537864B2 (en) Encryption system using web browsers and untrusted web servers
CN104917759B (en) Based on third-party secure file storage and shared system and method
US9070112B2 (en) Method and system for securing documents on a remote shared storage resource
JP5033916B2 (en) Digital copyright management method for compressed files
CN109948322B (en) Personal cloud storage data safe box device and method for localized encryption protection
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
CA2714196A1 (en) Information distribution system and program for the same
CN107368747A (en) A kind of mobile office method, service end, client and system
CN103078959A (en) Encryption and decryption method for protecting safety of cloud storage data
CN114175580B (en) Enhanced secure encryption and decryption system
WO2020123926A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN105072134A (en) Cloud disk system file secure transmission method based on three-level key
CN103312690A (en) System and method for key management of cloud computing platform
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN114679340A (en) File sharing method, system, device and readable storage medium
CN108494724B (en) Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN112995204B (en) Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
US10380352B2 (en) Document security in enterprise content management systems
CN105187379B (en) Password based on multi-party mutual mistrust splits management method
CN107395612A (en) Realize the System and method for of network disk data safety
CN111031352A (en) Audio and video encryption method, security processing method, device and storage medium
CN103684780B (en) Domain-based file encryption protection method
JP4974863B2 (en) File management system, file management method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124