CN108171078A - A kind of data security method and device towards third-party cloud platform evaluation system - Google Patents

A kind of data security method and device towards third-party cloud platform evaluation system Download PDF

Info

Publication number
CN108171078A
CN108171078A CN201711441199.1A CN201711441199A CN108171078A CN 108171078 A CN108171078 A CN 108171078A CN 201711441199 A CN201711441199 A CN 201711441199A CN 108171078 A CN108171078 A CN 108171078A
Authority
CN
China
Prior art keywords
daily record
party
encrypted
evaluation system
cloud platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711441199.1A
Other languages
Chinese (zh)
Other versions
CN108171078B (en
Inventor
梁露露
凌晨
杨天识
刘彦钊
姚轶崭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Information Technology Security Evaluation Center
Original Assignee
China Information Technology Security Evaluation Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Information Technology Security Evaluation Center filed Critical China Information Technology Security Evaluation Center
Priority to CN201711441199.1A priority Critical patent/CN108171078B/en
Publication of CN108171078A publication Critical patent/CN108171078A/en
Application granted granted Critical
Publication of CN108171078B publication Critical patent/CN108171078B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of data security methods and device towards third-party cloud platform evaluation system.The daily record data and daily record that this method provides cloud service platform prove that information is encrypted, and daily record data is stored in the form of log chain.When third party's evaluating system evaluates and tests a cloud service platform using collected daily record data; the verification of information and log chain sequence verification are proved firstly the need of daily record is carried out to daily record data; prevent daily record data from illegally being distorted in use; so as to ensure that primitiveness and integrality to journal file verify, while privacy of user is protected using encrypted means.

Description

A kind of data security method and device towards third-party cloud platform evaluation system
Technical field
This application involves cloud service field, more specifically to a kind of towards third-party cloud platform evaluation system Data security method and device.
Background technology
The fast development of cloud service has provided great convenience to the user, but also brings some safety issues simultaneously.It is empty During planization terminal use, since account becomes whether control resource allows the unique control mode used, if cloud is put down Platform safety and management measure are improper, can cause the security risks such as unauthorized use, unauthorized access and leaking data.To user Speech, it is to know cloud service provider infrastructure and cloud system to evaluate and test system to carry out real-time auditing and evaluation to cloud platform by third party Credible effective way.But during collector journal data, it can equally face that the safety such as illegally to intercept and capture, distort hidden Suffer from.In addition, cloud service provider needs to consider the secret protection of user, the number with user information usually can not be directly provided According to.
Invention content
In view of this, the application provides a kind of data security method and dress towards third-party cloud platform evaluation system It puts, not only can guarantee that third party's evaluating system verifies, but also put forward from cloud service the primitiveness and integrality of journal file Privacy of user is protected for the angle of quotient.
To achieve these goals, it is proposed that scheme it is as follows:
A kind of data security method of facing cloud platform third party evaluation system, the method is tested and assessed towards third party is System, including:
The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily record examples;
The multiple first daily record example is encrypted, generates multiple second daily record examples;
According to the Last modification time of daily record example, the multiple second daily record example is carried out according to sequencing Arrangement generates log chain;
Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information instances;
The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove example;
Example, which is encrypted, to be proved to the second daily record example and the corresponding daily record of the second daily record example, is generated Including proves the third daily record example of information.
Preferably, it is described that the multiple first daily record example is encrypted, multiple second daily record examples are generated, including:
The multiple first daily record example is encrypted using the public key of third party's evaluation system, generates multiple second days Will example.
Preferably, it is described the second daily record example and the corresponding daily record of the second daily record example are proved example into Row encryption, generation include the third daily record example for proving information, including:
The second daily record example and the corresponding daily record of the second daily record example are proved using the private key of cloud platform Example is encrypted, and generation includes the third daily record example for proving information.
Preferably, it further includes:The second daily record example and the log chain were stored to the day of third party's evaluation system Will database.
Preferably, it further includes:The daily record that the third daily record example is stored to third party's evaluation system is proved into number According to library.
A kind of data secure device of facing cloud platform third party evaluation system, described device is tested and assessed towards third party is System, including:
First data acquisition unit, for obtaining the daily record data of cloud platform, and the daily record data is parsed with Generate multiple first daily record examples;
First encryption unit for the multiple first daily record example to be encrypted, generates multiple second daily record examples;
Log chain generation unit, for the Last modification time according to daily record example, according to sequencing to described Multiple second daily record examples are arranged, and generate log chain;
Second data acquisition unit, the daily record for obtaining the second daily record example of cloud platform offer prove information, Generating daily record proves information instances;
Retrieval unit, it is corresponding for retrieving the second daily record example of each virtual IP address and the second daily record example Daily record proves example;
Second encryption unit, for proving the second daily record example and the corresponding daily record of the second daily record example Example is encrypted, and generation includes the third daily record example for proving information.
Preferably, first encryption unit uses the public key of third party's evaluation system to the multiple first daily record example It is encrypted, generates multiple second daily record examples.
Preferably, second encryption unit uses the private key of cloud platform to the second daily record example and described second The corresponding daily record of daily record example proves that example is encrypted, and generation includes the third daily record example for proving information.
Preferably:The log chain generation unit is additionally operable to store the second daily record example and the log chain to The log database of tripartite's evaluation system.
Preferably, second encryption unit, which is additionally operable to store to the third party to test and assess by the third daily record example, is The daily record of system proves database.
As can be seen from the above technical solutions, this application discloses a kind of data towards third-party cloud platform evaluation system Security method and device.The daily record data and daily record that this method provides cloud service platform prove that information is encrypted, and Daily record data is stored in the form of log chain.When third party's evaluating system using collected daily record data to a cloud When service platform is evaluated and tested, it is necessary first to carrying out daily record to daily record data proves the verification of information and log chain sequence verification, Prevent daily record data from illegally being distorted in use, so as to ensure that primitiveness and the integrality progress to journal file Verification, while protect privacy of user using encrypted means.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 shows an a kind of data towards third-party cloud platform evaluation system disclosed in one embodiment of the invention Security method flow diagram;
Fig. 2 is to prove Information Authentication flow;
Fig. 3 is log chain sequence verification flow;
Fig. 4 shows a kind of data towards third-party cloud platform evaluation system disclosed in another embodiment of the present invention The structure diagram of secure device.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained without making creative work Example is applied, shall fall within the protection scope of the present invention.
A kind of data of facing cloud platform third party evaluation system disclosed in one embodiment of the invention are shown referring to Fig. 1 The flow diagram of security method.
In the present embodiment, this method includes:
S101:The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily records Example.
First with cloud platform foundation communicate, with collect different types of daily record data (including network log, process daily record, Operating system daily record), and daily record data is parsed to generate the first daily record example, it is illustrated below with network log.
One network log example definition is as follows:
LE=<FromIP,ToIP,TL,Port,UserID,Content>
Wherein, FromIP is source IP, and ToIP is destination IP, and TL is the UTC time of network operation, and Port is port numbers, UserID is the ID of cloud platform user, and Content is other contents of operation note.
S102:The multiple first daily record example is encrypted, generates multiple second daily record examples.
Safety in order to protect data, using the public key PKA of third party's evaluating system come to the data information in daily record example It is encrypted, the second daily record example (Encrypted Log Entry, ELE) after generation encryption represents as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
S103:According to the Last modification time of daily record example, according to sequencing to the multiple second daily record reality Example is arranged, and generates log chain.
After ELE is generated, (it is included in the timestamp information of file) according to Last modification time of file, according to Sequencing is arranged as log chain (Log chain, LC), log chain can be caused to reset if there is illegally distorting.Log chain It represents as follows:
LC=<ELE,LCprev>
LCprev is the first sequence daily record example of current log example.
And then store the second daily record example and log chain to log database, DBLE is expressed as, is made of ELE and LC:
DBLE=<ELE,LC>
S104:Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information Example.
Obtaining the daily record that cloud service provider provides proves information and generates daily record proof information instances, including raw log files Check value, all kinds of timestamp informations, be expressed as pro:
Pro=<H(LE),time-stamp 1,time-stamp 2,...>
Newer daily record proof example is sent to daily record proves that database stores.
S105:The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove Example.
Database, which is retrieved, to be proved to log database and daily record in preset time, obtains the second of each virtual IP address Daily record example and the corresponding daily record of the second daily record example prove information, are expressed as AED:
AED=<ELE,Pro>
S106:Example, which adds, to be proved to the second daily record example and the corresponding daily record of the second daily record example Close, generation includes the third daily record example for proving information.
The second daily record example and the corresponding daily record of the second daily record example are proved using the private key of cloud platform Example is encrypted, and generation includes the third daily record example for proving information, represents as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
Tp represents the generated time of this document, SigSKC (AED, Tp) be using cloud service provider private key SKC to (AED, TP the digital signature of generation) is encrypted.
It is right first when third party's evaluating system evaluates and tests a cloud service platform using collected daily record data Daily record data carries out proving the verification of information and log chain sequence verification.Fig. 2 is to prove Information Authentication flow, first uses cloud respectively Platform public key and third party's evaluation system private key by third daily record example and the corresponding daily record of third daily record example prove example into Row decryption, if that can prove that example verifies third daily record example with the daily record of decryption again if successful decryption, if verification By carrying out the verification of daily record chain-ordering again, to verify the integrality of journal file.Fig. 3 is log chain sequence verification flow, false If there are one log chains:(ELE0, LC0) (ELE1, LC1) ...
Because LC1 is the first sequence of second daily record example, that is, (ELE0, LC0), if so log chain have passed through it is non- Method is distorted, and sequence can change (because being arranged according to Last modification timestamp), if (ELE0, LC0) and LC1 Identical explanation is not distorted illegally.The verification method is able to verify that the primitiveness of journal file, prevents from existing during use Illegally distort.
Compared with prior art, the present invention provides daily record by cloud service provider proves information, and use the private key of cloud service provider Digital signature is generated, protects cloud platform privacy of user;Journal file is stored in the form of log chain, prevents from making by sequence verification With illegally being distorted in the process.
It is shown referring to Fig. 4 a kind of towards third-party cloud platform evaluation system disclosed in another embodiment of the present invention The structure diagram of data secure device.
As shown in Figure 4, which includes:First data acquisition unit 1, the first encryption unit 2, log chain generation unit 3, Second data acquisition unit 4, retrieval unit 5, the second encryption unit 6.
First data acquisition unit 1 is used to obtain the daily record data of cloud platform, and the daily record data is parsed with Generate multiple first daily record examples.
For network example, which is represented by
LE=<FromIP,ToIP,TL,Port,UserID,Content>
Wherein, FromIP is source IP, and ToIP is destination IP, and TL is the UTC time of network operation, and Port is port numbers, UserID is the ID of cloud platform user, and Content is other contents of operation note.
And then first encryption unit 2 using the public key PKA of third party's evaluating system come to the data in the first daily record example Information is encrypted, and the second daily record example (EncryptedLog Entry, ELE) after generation encryption represents as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
Log chain generation unit 3 is used for the Last modification time according to daily record example, according to sequencing to second Daily record example is arranged, and generates log chain.Wherein, which represents as follows:
LC=<ELE,LCprev>
LCprev is the first sequence daily record example of current log example.
And then store the second daily record example and log chain to log database, DBLE is expressed as, is made of ELE and LC.
The daily record that second data acquisition unit 4 is used to obtain the second daily record example of cloud platform offer proves information, Generating daily record proves information instances, and then newer daily record proof information instances are stored in the daily record card of third party's evaluation system In bright database.
In daily regular time point, retrieval unit 5 proves to retrieve each in database in log database and daily record The corresponding daily record of the second daily record example and the second daily record example of virtual IP address proves example, is expressed as AED:
AED=<ELE,Pro>
Wherein, ELE is the second daily record example, and Pro is the corresponding daily record permit of the second daily record example.
Second encryption unit 6 is to the second daily record example and the second daily record example pair described in the private key using cloud platform The daily record answered proves that example is encrypted, and generation includes the third daily record example for proving information, and third daily record example is sent out The daily record to third party's evaluation system is sent to prove to store in database, wherein third daily record example represents as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
Tp represents the generated time of this document, SigSKC (AED, Tp) be using cloud service provider private key SKC to (AED, TP the digital signature of generation) is encrypted.
It should be noted that the system embodiment is corresponding with embodiment of the method, implementation procedure is identical with implementation principle, Therefore not to repeat here.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only include that A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except also there are other identical elements in the process, method, article or apparatus that includes the element.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the present invention. A variety of modifications of these embodiments will be apparent for those skilled in the art, it is as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one The most wide range caused.

Claims (10)

1. a kind of data security method of facing cloud platform third party evaluation system, which is characterized in that including:
The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily record examples;
The multiple first daily record example is encrypted, generates multiple second daily record examples;
According to the Last modification time of daily record example, the multiple second daily record example is arranged according to sequencing Row generate log chain;
Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information instances;
The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove example;
Example, which is encrypted, to be proved to the second daily record example and the corresponding daily record of the second daily record example, generation includes Having proves the third daily record example of information.
2. according to the method described in claim 1, it is characterized in that, described be encrypted the multiple first daily record example, Multiple second daily record examples are generated, including:
The multiple first daily record example is encrypted using the public key of third party's evaluation system, it is real to generate multiple second daily records Example.
It is 3. according to the method described in claim 1, it is characterized in that, described to the second daily record example and the second day The corresponding daily record of will example proves that example is encrypted, and generation includes the third daily record example for proving information, including:
Example is proved to the second daily record example and the corresponding daily record of the second daily record example using the private key of cloud platform It is encrypted, generation includes the third daily record example for proving information.
4. it according to the method described in claim 1, it is characterized in that, further includes:By the second daily record example and the daily record Chain is stored to the log database of third party's evaluation system.
5. it according to the method described in claim 1, it is characterized in that, further includes:The third daily record example is stored to described The daily record of third party's evaluation system proves database.
6. a kind of data secure device of facing cloud platform third party evaluation system, described device towards third party's evaluation system, It is characterised in that it includes:
First data acquisition unit for obtaining the daily record data of cloud platform, and parses the daily record data to generate Multiple first daily record examples;
First encryption unit for the multiple first daily record example to be encrypted, generates multiple second daily record examples;
Log chain generation unit, for the Last modification time according to daily record example, according to sequencing to the multiple Second daily record example is arranged, and generates log chain;
Second data acquisition unit, the daily record for obtaining the second daily record example of cloud platform offer prove information, generation Daily record proves information instances;
Retrieval unit, for retrieving the second daily record example of each virtual IP address and the corresponding daily record of the second daily record example Prove example;
Second encryption unit, for proving example to the second daily record example and the corresponding daily record of the second daily record example It is encrypted, generation includes the third daily record example for proving information.
7. device according to claim 6, which is characterized in that first encryption unit is using third party's evaluation system The multiple first daily record example is encrypted in public key, generates multiple second daily record examples.
8. device according to claim 6, which is characterized in that second encryption unit is using the private key of cloud platform to institute Stating the second daily record example and the corresponding daily record of the second daily record example proves that example is encrypted, and generation includes permit The third daily record example of breath.
9. device according to claim 6, which is characterized in that the log chain generation unit is additionally operable to the second day Will example and the log chain are stored to the log database of third party's evaluation system.
10. device according to claim 6, which is characterized in that second encryption unit is additionally operable to the third daily record Example, which is stored to the daily record of third party's evaluation system, proves database.
CN201711441199.1A 2017-12-27 2017-12-27 Data preservation method and device of cloud platform evaluation system facing third party Active CN108171078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711441199.1A CN108171078B (en) 2017-12-27 2017-12-27 Data preservation method and device of cloud platform evaluation system facing third party

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711441199.1A CN108171078B (en) 2017-12-27 2017-12-27 Data preservation method and device of cloud platform evaluation system facing third party

Publications (2)

Publication Number Publication Date
CN108171078A true CN108171078A (en) 2018-06-15
CN108171078B CN108171078B (en) 2021-08-31

Family

ID=62521695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711441199.1A Active CN108171078B (en) 2017-12-27 2017-12-27 Data preservation method and device of cloud platform evaluation system facing third party

Country Status (1)

Country Link
CN (1) CN108171078B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697605A (en) * 2019-01-11 2019-04-30 深圳讼融通网络科技有限公司 Generation method, system and the readable storage medium storing program for executing of property preservation data record
CN111444519A (en) * 2019-01-16 2020-07-24 西门子股份公司 Protecting integrity of log data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6339828B1 (en) * 1997-05-28 2002-01-15 Symantec Corporation System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
CN101039186A (en) * 2007-05-08 2007-09-19 中国科学院软件研究所 Method for auditing safely system log
US20110150221A1 (en) * 2009-12-18 2011-06-23 Kabushiki Kaisha Toshiba Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system
CN107104804A (en) * 2017-05-10 2017-08-29 成都麟成科技有限公司 A kind of platform integrity verification method and device
CN107395355A (en) * 2017-06-12 2017-11-24 广东工业大学 A kind of cloud storage data integrity verification method based on implicit trusted third party

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6339828B1 (en) * 1997-05-28 2002-01-15 Symantec Corporation System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
CN101039186A (en) * 2007-05-08 2007-09-19 中国科学院软件研究所 Method for auditing safely system log
US20110150221A1 (en) * 2009-12-18 2011-06-23 Kabushiki Kaisha Toshiba Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system
CN107104804A (en) * 2017-05-10 2017-08-29 成都麟成科技有限公司 A kind of platform integrity verification method and device
CN107395355A (en) * 2017-06-12 2017-11-24 广东工业大学 A kind of cloud storage data integrity verification method based on implicit trusted third party

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697605A (en) * 2019-01-11 2019-04-30 深圳讼融通网络科技有限公司 Generation method, system and the readable storage medium storing program for executing of property preservation data record
CN111444519A (en) * 2019-01-16 2020-07-24 西门子股份公司 Protecting integrity of log data
CN111444519B (en) * 2019-01-16 2023-08-22 西门子股份公司 Protecting the integrity of log data

Also Published As

Publication number Publication date
CN108171078B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN109413087B (en) Data sharing method and device, digital gateway and computer readable storage medium
CN101834860B (en) Method for remote dynamic verification on integrality of client software
Accorsi BBox: A distributed secure log architecture
CN108449345A (en) A kind of networked asset continues method for safety monitoring, system, equipment and storage medium
CN103368987B (en) Cloud server, application program verification, certification and management system and application program verification, certification and management method
AU2852999A (en) Method for securing safety of electronic information
US20160134495A1 (en) Logging device and log aggregation device
CN103617402B (en) A kind of multimedia electronic data forensic report and generation, methods of exhibiting and system
CN109254734A (en) A kind of date storage method, device, equipment and computer readable storage medium
CN113672998B (en) Anti-counterfeiting method and system for data in construction process of constructional engineering
US20060242088A1 (en) System, method and program for managing information
CN108809990A (en) A kind of crowdsourcing data safety encryption method, server and storage medium
Accorsi Log data as digital evidence: What secure logging protocols have to offer?
CN109309645A (en) A kind of software distribution security guard method
JP4295684B2 (en) Program production device
Ćosić et al. (Im) proving chain of custody and digital evidence integrity with time stamp
CN108171078A (en) A kind of data security method and device towards third-party cloud platform evaluation system
KR102013415B1 (en) System and method for verifying integrity of personal information
CN105404470B (en) Date storage method and safety device, data-storage system
CN110493011B (en) Block chain-based certificate issuing management method and device
Holmes et al. A framework for live host-based Bitcoin wallet forensics and triage
KR20200004229A (en) Method for protecting personal information in block chain environment and apparatus therefor
Kuntze et al. On the creation of reliable digital evidence
CN116827821B (en) Block chain cloud-based application program performance monitoring method
CN108900472A (en) The transmission method and device of information

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant