CN108694331A - A kind of date storage method, device, system and computer readable storage medium - Google Patents

A kind of date storage method, device, system and computer readable storage medium Download PDF

Info

Publication number
CN108694331A
CN108694331A CN201810461230.6A CN201810461230A CN108694331A CN 108694331 A CN108694331 A CN 108694331A CN 201810461230 A CN201810461230 A CN 201810461230A CN 108694331 A CN108694331 A CN 108694331A
Authority
CN
China
Prior art keywords
data
encryption
subdirectory
application
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810461230.6A
Other languages
Chinese (zh)
Other versions
CN108694331B (en
Inventor
张浩川
张泽航
余荣
缪志鹏
朱杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Longjianda Electronics Co ltd
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201810461230.6A priority Critical patent/CN108694331B/en
Publication of CN108694331A publication Critical patent/CN108694331A/en
Application granted granted Critical
Publication of CN108694331B publication Critical patent/CN108694331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses a kind of date storage methods, including are to obtain to apply data type catalogue using data setting label file;Application data type of directory, which divides to obtain, applies data mode subdirectory;Include that data subdirectory is applied in current application data subdirectory and encryption using data mode subdirectory;Current application data is added to current application data subdirectory;It encrypts current application data and obtains encryption using data and encryption key, encryption is added to encryption using data and applies data subdirectory, encryption key is preserved to key file;Encryption is uploaded to data storage network using data and obtains data directory;Data directory is preserved to key file.This method will be standardized using data to be classified and stores to data storage network, personal data source is correctly identified convenient for user, and ensure that the safety of users personal data.Disclosed herein as well is a kind of data storage device, system and computer readable storage mediums, it may have above-mentioned advantageous effect.

Description

A kind of date storage method, device, system and computer readable storage medium
Technical field
This application involves field of information security technology, more particularly to a kind of date storage method further relates to a kind of data and deposits Storage device, system and computer readable storage medium.
Background technology
Maturation with big data technology and development, data are concerned in the application of every profession and trade, and the value of data obtains Unprecedented attention and embodiment.User will produce various personal data during using application, dispersion It is stored in memory space defined in each application, on the one hand these personal data are related to the individual privacy of user, another Aspect contain it is huge can tap value.Therefore, user needs to carry out personal data into the storage of rational classification and safety, Data can be easily managed while ensureing that individual privacy is safe, to play the value of data.
However, each application has respective data mode classification, user a when using different application programs at present Personal data, which is that mode is scattered in different categories, to be stored in corresponding memory space, thus causes user to be difficult to bright Which personal data the application really oneself used produces;Meanwhile independent mode classification be unfavorable for user to personal data into Row management, the storage mode of dispersion do not store personal data remotely using user.
Storage mode commonly used in the prior art is cloud storage, and common cloud storage system consists of two parts:It operates in The long-range centralization Cloud Server controlled by service provider, and operate in the execution data upload of user terminal and download work( The cloud storage application of energy first, is swept in the work course by the file directory to each application in operating system It retouches, obtains the data that all applications externally expose, name is expanded according to the file of these data files and is simply classified, is such as schemed Piece png, document doc etc., then category file that the data classified are uploaded to Cloud Server after being locally encrypted press from both sides In.
However, since aforesaid way is to be used uniformly simple file to personal data to expand name sorting technique, have ignored Data characteristics between different application, therefore the normal data classification demand of user is cannot be satisfied, as user can not know that some is answered With which personal data stored;It, will be similar but from different application meanwhile after expanding name classification by simple file Personal data Hybrid Encryption stores, and cannot be satisfied the data management demand of user's fine granularity, can not individually obtain such as user or Share the part personal data of some application;Further, since being stored using the centralization Cloud Server of service provider's control The personal data of the data of user, user can be controlled by the service provider, therefore there is huge for the personal information of user Security risk.
Therefore, how the personal data generated to application are standardized classification, to help user accurately to identify individual The source of data further effectively manages personal data convenient for user, while can ensure that users personal data is believed again The safety of breath is those skilled in the art's urgent problem to be solved.
Invention content
The purpose of the application is to provide a kind of date storage method, and this method can be to applying the personal data generated into rower Standardization is classified, and is helped user accurately to identify the source of personal data, is easily facilitated user and effectively managed personal data, The safety of users personal data information is in turn ensured simultaneously;The another object of the application be to provide a kind of data storage device, System and computer readable storage medium, it may have above-mentioned advantageous effect.
In order to solve the above technical problems, this application provides a kind of date storage method, the method includes:
Label file is set for the application data that application generates, obtains and applies data type catalogue;
The application data type catalogue is divided, obtains and applies data mode subdirectory;Wherein, the application number Include that data subdirectory is applied in current application data subdirectory and encryption according to state subdirectory;
Current application data is added to the current application data subdirectory;
The current application data is encrypted, acquisition encryption adds using data and the encryption using data are corresponding Key, and the encryption is added to the encryption using data subdirectory using data, by the encryption key preserve to Key file;
The encryption is uploaded to data storage network using data, the encryption is obtained and applies the corresponding data rope of data Draw;
The data directory is preserved to the key file.
Preferably, described that the current application data is encrypted, including:
The current application data is encrypted using symmetric encipherment algorithm.
Preferably, the date storage method further includes:
The encryption is deleted to schedule using the encryption application data in data subdirectory.
Preferably, the date storage method further includes:
When needing to obtain intended application data, the corresponding mesh of the intended application data is obtained in the key file Mark data directory and corresponding target encryption key;
Target data index is sent to the data storage network, corresponding target encryption is obtained and applies data;
The target is encrypted using the target encryption key and is decrypted using data, the intended application number is obtained According to.
In order to solve the above technical problems, this application provides a kind of data storage device, described device includes:
Catalogue setting unit, the application data for being generated for application are arranged label file, obtain and apply data type mesh Record;
Catalogue division unit obtains for being divided to the application data type catalogue and applies data mode specific item Record;Wherein, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Data adding device, for current application data to be added to the current application data subdirectory;
DEU data encryption unit, for the current application data to be encrypted, obtain encryption using data and it is described plus The corresponding encryption key of close application data, and the encryption is added to the encryption using data and applies data subdirectory, general The encryption key is preserved to key file;
Data uploading unit obtains the encryption and answers for the encryption to be uploaded to data storage network using data With the corresponding data directory of data;
Data saving unit, for preserving the data directory to the key file.
Preferably, the DEU data encryption unit includes:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
Preferably, the data storage device further includes:
Data deleting unit is answered for deleting the encryption to schedule using the encryption in data subdirectory Use data.
Preferably, the data storage device further includes:
Data query unit, for when needing to obtain intended application data, the mesh to be inquired in the key file Mark is using the corresponding target data index of data and corresponding target encryption key;
Data download unit obtains corresponding for target data index to be sent to the data storage network Data are applied in target encryption;
Data decryption unit is decrypted for being encrypted to the target using the target encryption key using data, Obtain the intended application data.
In order to solve the above technical problems, this application provides a kind of data-storage system, the system comprises:
Memory, for storing computer program;
Processor realizes the step of the date storage method described in above-mentioned any one when for executing the computer program Suddenly.
In order to solve the above technical problems, this application provides a kind of computer readable storage medium, it is described computer-readable Computer program is stored on storage medium, the computer program is realized when being executed by processor described in above-mentioned any one The step of date storage method.
A kind of date storage method provided herein includes that label file is arranged in the application data generated for application, It obtains and applies data type catalogue;The application data type catalogue is divided, obtains and applies data mode subdirectory;Its In, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;It will currently answer It is added to the current application data subdirectory with data;The current application data is encrypted, encryption is obtained and applies number The encryption is added to using data using data using the corresponding encryption key of data, and by the encryption according to the encryption Subdirectory preserves the encryption key to key file;The encryption is uploaded to data storage network using data, is obtained The corresponding data directory of data is applied in the encryption;The data directory is preserved to the key file.
As it can be seen that date storage method provided herein, is that each of platform applies journey by the way that label file is arranged Sequence provides standardization, the classification of standardization and storage mode, has helped user that can correctly identify the source of personal data, i.e., The data which function from which application generates, such as wechat the data that generate of circle of friends;Further, by of user Personal data is uploaded to data storage network, and data storage network is the block chain network being made of memory node, has and goes to center Change, data can not distort and the characteristics of persistences, and data storage network replaces the centralization cloud service of service provider's control Device remotely stores personal data with the storage mode of decentralization, the safety of users personal data has been effectively ensured.
A kind of data storage device, system and computer readable storage medium provided herein, it may have above-mentioned to have Beneficial effect, details are not described herein.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of date storage method provided herein;
Fig. 2 is that a kind of data provided herein store schematic diagram;
Fig. 3 is a kind of data acquisition schematic diagram provided herein;
Fig. 4 is a kind of schematic diagram of data storage device provided herein;
Fig. 5 is a kind of schematic diagram of data-storage system provided herein.
Specific implementation mode
The core of the application is to provide a kind of date storage method, and this method can be to applying the personal data generated into rower Standardization is classified, and is helped user accurately to identify the source of personal data, is easily facilitated user and effectively managed personal data, The safety of users personal data information is in turn ensured simultaneously;Another core of the application be to provide a kind of data storage device, System and computer readable storage medium, it may have above-mentioned advantageous effect.
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art The all other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of date storage method provided herein, this method can be with Including:
S101:Label file is set for the application data that application generates, obtains and applies data type catalogue;
Specifically, using referring to the executable application programs for having specific function, system can be that phase is arranged in each application The label file answered is established in a manner of describing to classify using data caused by corresponding application for the personal data of application Local storage space, specifically can by the label file come state this apply data classification type, as wechat generate picture, Audio, document etc. apply data type catalogue to obtain.For example, the mode classification using data can be as follows:
Wherein, above-mentioned tagList is label file, and it is Json data formats which, which uses, will apply number Classify according to according to label tag.After application platform load is using APP, you can read and parse label file, and record The quantity N of tag keys, the corresponding value of record tag keys arrive temp arrays.Further, you can generate N number of subdirectory, that is, apply data Type of directory, by each element being named as using data type catalogue in temp arrays, i.e., the corresponding value of each tag keys.
S102:Application data type of directory is divided, and is obtained and is applied data mode subdirectory;Wherein, using data State subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Specifically, after obtaining using data type catalogue, you can divided again to it, data type mesh will be applied Record is divided into using data mode subdirectory, this may include current application data subdirectory using data mode subdirectory and adds Close application data subdirectory.Such as:
As it appears from the above, renewable at current subdirectories and encryption application data modes under each tag subdirectories Subdirectory, wherein current subdirectories are above-mentioned current application data subdirectory, can be used for storing and apply current slot The personal data of generation, i.e. current application data;Encryption application data mode subdirectories are above-mentioned encryption application number According to subdirectory, it can be used for storing and encrypted personal data to be uploaded, is i.e. data are applied in encryption.
S103:Current application data is added to current application data subdirectory;
S104:Current application data is encrypted, encryption is obtained and applies the corresponding encryption of data using data and encryption Key, and encryption is added to encryption using data and applies data subdirectory, encryption key is preserved to key file;
Specifically, for using the data currently generated, i.e. current application data, current application data can be saved to Subdirectory can further be encrypted the current application data in current application data subdirectory, obtain encryption and apply data And its corresponding encryption key, and encryption is preserved to encryption using data using data subdirectory, by encryption key preserve to Key file.
Preferably, above-mentioned current application data is encrypted may include utilizing symmetric encipherment algorithm to current application number According to being encrypted.
Specifically, being encrypted using the current application data that symmetric encipherment algorithm generates application, i.e., to each Individually being encrypted per a kind of personal data in is applied data and its corresponding encryption key to obtain encryption, is led to Cross such fine granularity encryption storage mode can significantly more efficient assistance user personal data are managed.Wherein, above-mentioned Symmetric encipherment algorithm is to develop a kind of data encryption algorithm more mature compared with early, technology, and algorithm discloses, calculation amount is smaller, Enciphering rate is very fast and encryption efficiency is higher.Certainly, which is only a kind of embodiment provided herein, not Uniquely, such as current application data can also be encrypted using rivest, shamir, adelman, further to improve user The safety of personal data information.
In addition, above-mentioned key file is generated by platform, it can be used for storing encryption and apply the corresponding encryption key of data, and Data directory described hereinafter.In the starting stage, i.e. initial key file is used for the encryption that storage platform is used in effective time Key and data directory, as follows:
Wherein, startTime is the initial time using encryption key, and endTime is the end time, and tag is contingency table Label, key is encryption key, and indexID is data directory.
S105:Encryption is uploaded to data storage network using data, encryption is obtained and applies the corresponding data directory of data;
S106:Data directory is preserved to key file.
Specifically, for the key file of above-mentioned starting stage, at the end of the effective time of encryption key, platform One group of random encryption key is generated according to the temporal information, current application data is encrypted using the encryption key and is added After close application data, then encryption can be uploaded to data storage network using data, be its generation correspondence by data storage network Data directory, and encryption key and data directory are filled into key file, shown in filling key file is specific as follows:
In this application, identical as label file, the format of key file is using Json data formats, json data Format is a kind of data interchange format of lightweight, is a subset based on JavaScript, and json is easy to developer's reading With write, while be also easy to machine parsing and generate.Certainly, the selection of above-mentioned format is a kind of embodiment party provided herein Formula uniquely can also be not XML format etc., the application is not specifically limited this.
In addition, above-mentioned data storage network (Data Storage Network, DSN) is the block being made of memory node Chain network, based on the data storage service that block chain technology provides, block chain technology is a kind of distributed peace of decentralization Full verification, memory technology, have higher security reliability.
Further, referring to FIG. 2, Fig. 2, which is a kind of data provided herein, stores schematic diagram, platform load application Afterwards, you can parsing label file and establishes local storage space, after generating key file, you can at that time using data into Row encryption obtains encryption and applies data, further upload to data storage network, and receives the data of data storage network return Index.
Date storage method provided herein is provided by the way that label file is arranged for each application program in platform Standardization, the classification of standardization and storage mode have helped user that can correctly identify the sources of personal data, that is, which come from The data which function of applying a bit generates, such as wechat the data that generate of circle of friends;Further, by the personal data of user It is uploaded to data storage network, data storage network is the block chain network being made of memory node, has decentralization, data The centralization Cloud Server controlled by feature, data storage network substitution service provider that can not be distorted and preserve forever, to go The storage mode of centralization remotely stores personal data, and the safety of users personal data has been effectively ensured.
On the basis of the above embodiments:
As a kind of preferred embodiment, which can also include deleting encryption to schedule to apply number According to the encryption application data in subdirectory.
Specifically, since local storage space is limited, after encryption is uploaded to data storage network using data, locally deposit The encryption application data in space are stored up without retaining, you can be deleted, can specifically be realized by setting interval, i.e., every pre- Fix time delete a local storage space encryption application data, with ensure local storage space can real-time update its preservation Data are applied in encryption.
In addition, date storage method provided herein, under the premise of ensureing that users personal data does not leak safely, Can also be achieved the deletion using data, specifically, the characteristic based on block chain, be uploaded to after block chain using data be can not be into Any change operation of row, including delete operation.And in this application, it can be by deleting some effective time in key file The other all the elements of some tag class are realized in section, as long as losing data directory and encryption key, then will be unable to according to data It indexes to data storage network request data, namely is unable to get encryption and is at this time it is even more impossible to which it is decrypted using data It is equivalent to and deletes the application data of user.
As a kind of preferred embodiment, which can also include:
When needing to obtain intended application data, the corresponding target data rope of intended application data is obtained in key file Draw and corresponding target encryption key;Target data index is sent to data storage network, corresponding target encryption is obtained and answers Use data;Target is encrypted using target encryption key and is decrypted using data, intended application data are obtained.
Specifically, referring to FIG. 3, Fig. 3 is a kind of data acquisition schematic diagram provided herein, when user needs to obtain When its personal data namely when intended application data, first, user can exist according to the tag along sort and effective time of intended application This tag class other data directory indexID and encryption key key, i.e. target data rope in this time are inquired in key file Draw and target encryption key;Then it is indexed to the corresponding target encryption of data storage network request acquisition and is answered according to the target data With data, and it is stored in local storage space, further it is decrypted using target encryption key and obtains final target Using data.
Further, date storage method provided herein, it may also be used for realize data sharing, i.e., when user wish by When data sharing is to third party, with above-mentioned data acquisition, first, user can be according to the tag along sort for the application for wanting to share The other data directory indexID and encryption key key of this tag class in this time is inquired in key file with effective time, And it is shared with third party, third party can obtain data according to data directory indexID and encryption key key and store net The encryption application data of network are simultaneously decrypted, and it is corresponding using data to obtain its.
To solve the above problems, referring to FIG. 4, Fig. 4 be a kind of data storage device provided herein schematic diagram, The device may include:
Catalogue setting unit 10, the application data for being generated for application are arranged label file, obtain and apply data type Catalogue;
Catalogue division unit 20 is divided for application data type of directory, is obtained and is applied data mode subdirectory; Wherein, include that data subdirectory is applied in current application data subdirectory and encryption using data mode subdirectory;
Data adding device 30, for current application data to be added to current application data subdirectory;
DEU data encryption unit 40 obtains encryption and is applied using data and encryption for current application data to be encrypted The corresponding encryption key of data, and encryption is added to encryption using data subdirectory using data, by encryption key preserve to Key file;
Data uploading unit 50 is uploaded to data storage network for that will encrypt using data, obtains encryption and applies data Corresponding data directory;
Data saving unit 60, for preserving data directory to key file.
As a kind of preferred embodiment, above-mentioned DEU data encryption unit 40 may include:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
As a kind of preferred embodiment, above-mentioned data storage device can also include:
Data deleting unit, for deleting encryption to schedule using the encryption application data in data subdirectory.
As a kind of preferred embodiment, above-mentioned data storage device can also include:
Data query unit, for when needing to obtain intended application data, intended application number to be inquired in key file According to corresponding target data index and corresponding target encryption key;
Data download unit obtains corresponding target encryption for target data index to be sent to data storage network Using data;
Data decryption unit is decrypted using data for being encrypted to target using target encryption key, obtains target Using data.
Above method embodiment is please referred to for the introduction of data storage device provided by the present application, the application is not done herein It repeats.
To solve the above problems, referring to FIG. 5, Fig. 5 be a kind of data-storage system provided herein schematic diagram, The system may include:
Memory 1, for storing computer program;
Processor 2 can realize following steps when for executing computer program:
Label file is set for the application data that application generates, obtains and applies data type catalogue;Application data type Catalogue is divided, and is obtained and is applied data mode subdirectory;Wherein, include current application data using data mode subdirectory Data subdirectory is applied in catalogue and encryption;Current application data is added to current application data subdirectory;To current application number According to being encrypted, obtain encryption using data and encryption using the corresponding encryption key of data, and will encryption using data addition Data subdirectory is applied to encryption, encryption key is preserved to key file;Encryption is uploaded to data using data and stores net Network obtains encryption and applies the corresponding data directory of data;Data directory is preserved to key file.
Above method embodiment is please referred to for the introduction of data-storage system provided by the present application, the application is not done herein It repeats.
To solve the above problems, present invention also provides a kind of computer readable storage medium, the computer-readable storage It is stored with computer program on medium, following steps can be realized when computer program is executed by processor:
Label file is set for the application data that application generates, obtains and applies data type catalogue;Application data type Catalogue is divided, and is obtained and is applied data mode subdirectory;Wherein, include current application data using data mode subdirectory Data subdirectory is applied in catalogue and encryption;Current application data is added to current application data subdirectory;To current application number According to being encrypted, obtain encryption using data and encryption using the corresponding encryption key of data, and will encryption using data addition Data subdirectory is applied to encryption, encryption key is preserved to key file;Encryption is uploaded to data using data and stores net Network obtains encryption and applies the corresponding data directory of data;Data directory is preserved to key file.
Above method embodiment is please referred to for the introduction of data storage device provided by the present application, the application is not done herein It repeats.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is referring to method part illustration .
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Date storage method provided herein, device, system and computer readable storage medium are carried out above It is discussed in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above example Illustrate to be merely used to help understand the present processes and its core concept.It should be pointed out that for the common skill of the art For art personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these change The application scope of the claims element is also fallen into modification.

Claims (10)

1. a kind of date storage method, which is characterized in that including:
Label file is set for the application data that application generates, obtains and applies data type catalogue;
The application data type catalogue is divided, obtains and applies data mode subdirectory;Wherein, the application data shape State subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Current application data is added to the current application data subdirectory;
The current application data is encrypted, it is close using the corresponding encryption of data using data and the encryption to obtain encryption Key, and the encryption is added to the encryption using data and applies data subdirectory, the encryption key is preserved to key File;
The encryption is uploaded to data storage network using data, the encryption is obtained and applies the corresponding data directory of data;
The data directory is preserved to the key file.
2. date storage method as described in claim 1, which is characterized in that described to add to the current application data It is close, including:
The current application data is encrypted using symmetric encipherment algorithm.
3. date storage method as claimed in claim 2, which is characterized in that further include:
The encryption is deleted to schedule using the encryption application data in data subdirectory.
4. the date storage method as described in claims 1 to 3 any one, which is characterized in that further include:
When needing to obtain intended application data, the corresponding number of targets of the intended application data is obtained in the key file According to index and corresponding target encryption key;
Target data index is sent to the data storage network, corresponding target encryption is obtained and applies data;
The target is encrypted using the target encryption key and is decrypted using data, the intended application data are obtained.
5. a kind of data storage device, which is characterized in that including:
Catalogue setting unit, the application data for being generated for application are arranged label file, obtain and apply data type catalogue;
Catalogue division unit obtains for being divided to the application data type catalogue and applies data mode subdirectory;Its In, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Data adding device, for current application data to be added to the current application data subdirectory;
DEU data encryption unit obtains encryption and is answered using data and the encryption for the current application data to be encrypted With the corresponding encryption key of data, and the encryption is added to the encryption using data and applies data subdirectory, will described in Encryption key is preserved to key file;
Data uploading unit obtains the encryption and applies number for the encryption to be uploaded to data storage network using data According to corresponding data directory;
Data saving unit, for preserving the data directory to the key file.
6. data storage device as claimed in claim 5, which is characterized in that the DEU data encryption unit includes:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
7. data processing equipment as claimed in claim 6, which is characterized in that further include:
Data deleting unit, for deleting the encryption to schedule using the encryption application number in data subdirectory According to.
8. the data processing equipment as described in claim 5 to 7 any one, which is characterized in that further include:
Data query unit, for when needing to obtain intended application data, the target being inquired in the key file and is answered With the corresponding target data index of data and corresponding target encryption key;
Data download unit obtains corresponding target for target data index to be sent to the data storage network Data are applied in encryption;
Data decryption unit is decrypted using data for being encrypted to the target using the target encryption key, is obtained The intended application data.
9. a kind of data-storage system, which is characterized in that including:
Memory, for storing computer program;
Processor realizes the data storage side as described in Claims 1-4 any one when for executing the computer program The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the date storage method as described in Claims 1-4 any one when the computer program is executed by processor The step of.
CN201810461230.6A 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium Active CN108694331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810461230.6A CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810461230.6A CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108694331A true CN108694331A (en) 2018-10-23
CN108694331B CN108694331B (en) 2022-01-11

Family

ID=63846260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810461230.6A Active CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108694331B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493017A (en) * 2018-11-05 2019-03-19 江苏大学 Credible outsourcing storage method based on block chain
WO2020133346A1 (en) * 2018-12-29 2020-07-02 Nokia Shanghai Bell Co., Ltd. Data sharing
CN111404662A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device
CN111404863A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device
CN112464255A (en) * 2020-10-21 2021-03-09 北京锐安科技有限公司 Data processing method and device, storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050071345A1 (en) * 2003-09-30 2005-03-31 Oracle International Corporation Attribute partitioning for user extensibility
CN103376976A (en) * 2012-04-25 2013-10-30 纬创资通股份有限公司 Method for presenting application program menu, electronic device and computer readable medium
CN105373595A (en) * 2015-10-22 2016-03-02 广东欧珀移动通信有限公司 Data automatic sorting storage method and terminal
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN107122429A (en) * 2017-04-13 2017-09-01 北京安云世纪科技有限公司 The method and apparatus and mobile terminal of a kind of file management
CN107423410A (en) * 2017-07-28 2017-12-01 福建中金在线信息科技有限公司 A kind of data managing method, device and mobile terminal
CN107765945A (en) * 2017-10-17 2018-03-06 广东欧珀移动通信有限公司 A kind of file management method, device, terminal and computer-readable recording medium
CN107844530A (en) * 2017-10-17 2018-03-27 广东欧珀移动通信有限公司 A kind of data processing method, device, server and computer-readable recording medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050071345A1 (en) * 2003-09-30 2005-03-31 Oracle International Corporation Attribute partitioning for user extensibility
CN103376976A (en) * 2012-04-25 2013-10-30 纬创资通股份有限公司 Method for presenting application program menu, electronic device and computer readable medium
CN105373595A (en) * 2015-10-22 2016-03-02 广东欧珀移动通信有限公司 Data automatic sorting storage method and terminal
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN107122429A (en) * 2017-04-13 2017-09-01 北京安云世纪科技有限公司 The method and apparatus and mobile terminal of a kind of file management
CN107423410A (en) * 2017-07-28 2017-12-01 福建中金在线信息科技有限公司 A kind of data managing method, device and mobile terminal
CN107765945A (en) * 2017-10-17 2018-03-06 广东欧珀移动通信有限公司 A kind of file management method, device, terminal and computer-readable recording medium
CN107844530A (en) * 2017-10-17 2018-03-27 广东欧珀移动通信有限公司 A kind of data processing method, device, server and computer-readable recording medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
佚名: "Android应用程序的数据存放目录解说", 《HTTP://WWW.VOIDCN.COM/ARTICLE/P-AYNKSHGF-XY.HTML》 *
黎计仲: "终端文档安全保护系统的研究与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493017A (en) * 2018-11-05 2019-03-19 江苏大学 Credible outsourcing storage method based on block chain
CN109493017B (en) * 2018-11-05 2021-11-23 江苏大学 Trusted outsourcing storage method based on block chain
WO2020133346A1 (en) * 2018-12-29 2020-07-02 Nokia Shanghai Bell Co., Ltd. Data sharing
CN113228011A (en) * 2018-12-29 2021-08-06 上海诺基亚贝尔股份有限公司 Data sharing
CN111404662A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device
CN111404863A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device
CN111404662B (en) * 2019-01-02 2023-04-07 中国移动通信有限公司研究院 Data processing method and device
CN112464255A (en) * 2020-10-21 2021-03-09 北京锐安科技有限公司 Data processing method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN108694331B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
CN108694331A (en) A kind of date storage method, device, system and computer readable storage medium
CN105760781B (en) The storage method, restoration methods and operating method of large data files can be deduced in order
US9767299B2 (en) Secure cloud data sharing
US9749132B1 (en) System and method for secure deletion of data
CN109241181A (en) Database operation method and device
CN104978239A (en) Method, device and system for realizing multi-backup-data dynamic updating
CN104836656B (en) A kind of storage of video file and transmission method
Dowsley et al. A survey on design and implementation of protected searchable data in the cloud
CN111090385A (en) Data management method and device based on block chain
Moataz et al. Resizable tree-based oblivious RAM
KR20110028968A (en) Method for verifying the integrity of a user's data in remote computing and system thereof
CN109451004A (en) Cloud storage system and method based on cloud bridge
CN107094075A (en) A kind of data block dynamic operation method based on convergent encryption
CN104182418A (en) Method and device for obtaining node metadata
CN110008725B (en) User structured data processing system
CN112272155A (en) E-mail receiving and sending method based on block chain
CN104753870A (en) Data transmission method and system
CN104794243B (en) Third party's cipher text retrieval method based on filename
KR20150055776A (en) Personal cloud storage chain service method and system
US20230315897A1 (en) Systems and methods for end-to end-encryption with encrypted multi-maps
US20230325524A1 (en) Systems and methods for end-to end-encryption with encrypted multi-maps
US20230315896A1 (en) Systems and methods for end-to end-encryption with encrypted multi-maps
Chen et al. Adjacency‐Hash‐Table Based Public Auditing for Data Integrity in Mobile Cloud Computing
JP2009065574A5 (en)
CN102624732A (en) Network storage system based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230908

Address after: 510000 rooms 704 and 705, building 3, No. 18, Shenzhou Road, Huangpu District, Guangzhou, Guangdong Province

Patentee after: Guangzhou longjianda Electronics Co.,Ltd.

Address before: No.729, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province 510060

Patentee before: GUANGDONG University OF TECHNOLOGY

TR01 Transfer of patent right