CN108694331A - A kind of date storage method, device, system and computer readable storage medium - Google Patents
A kind of date storage method, device, system and computer readable storage medium Download PDFInfo
- Publication number
- CN108694331A CN108694331A CN201810461230.6A CN201810461230A CN108694331A CN 108694331 A CN108694331 A CN 108694331A CN 201810461230 A CN201810461230 A CN 201810461230A CN 108694331 A CN108694331 A CN 108694331A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- subdirectory
- application
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
This application discloses a kind of date storage methods, including are to obtain to apply data type catalogue using data setting label file;Application data type of directory, which divides to obtain, applies data mode subdirectory;Include that data subdirectory is applied in current application data subdirectory and encryption using data mode subdirectory;Current application data is added to current application data subdirectory;It encrypts current application data and obtains encryption using data and encryption key, encryption is added to encryption using data and applies data subdirectory, encryption key is preserved to key file;Encryption is uploaded to data storage network using data and obtains data directory;Data directory is preserved to key file.This method will be standardized using data to be classified and stores to data storage network, personal data source is correctly identified convenient for user, and ensure that the safety of users personal data.Disclosed herein as well is a kind of data storage device, system and computer readable storage mediums, it may have above-mentioned advantageous effect.
Description
Technical field
This application involves field of information security technology, more particularly to a kind of date storage method further relates to a kind of data and deposits
Storage device, system and computer readable storage medium.
Background technology
Maturation with big data technology and development, data are concerned in the application of every profession and trade, and the value of data obtains
Unprecedented attention and embodiment.User will produce various personal data during using application, dispersion
It is stored in memory space defined in each application, on the one hand these personal data are related to the individual privacy of user, another
Aspect contain it is huge can tap value.Therefore, user needs to carry out personal data into the storage of rational classification and safety,
Data can be easily managed while ensureing that individual privacy is safe, to play the value of data.
However, each application has respective data mode classification, user a when using different application programs at present
Personal data, which is that mode is scattered in different categories, to be stored in corresponding memory space, thus causes user to be difficult to bright
Which personal data the application really oneself used produces;Meanwhile independent mode classification be unfavorable for user to personal data into
Row management, the storage mode of dispersion do not store personal data remotely using user.
Storage mode commonly used in the prior art is cloud storage, and common cloud storage system consists of two parts:It operates in
The long-range centralization Cloud Server controlled by service provider, and operate in the execution data upload of user terminal and download work(
The cloud storage application of energy first, is swept in the work course by the file directory to each application in operating system
It retouches, obtains the data that all applications externally expose, name is expanded according to the file of these data files and is simply classified, is such as schemed
Piece png, document doc etc., then category file that the data classified are uploaded to Cloud Server after being locally encrypted press from both sides
In.
However, since aforesaid way is to be used uniformly simple file to personal data to expand name sorting technique, have ignored
Data characteristics between different application, therefore the normal data classification demand of user is cannot be satisfied, as user can not know that some is answered
With which personal data stored;It, will be similar but from different application meanwhile after expanding name classification by simple file
Personal data Hybrid Encryption stores, and cannot be satisfied the data management demand of user's fine granularity, can not individually obtain such as user or
Share the part personal data of some application;Further, since being stored using the centralization Cloud Server of service provider's control
The personal data of the data of user, user can be controlled by the service provider, therefore there is huge for the personal information of user
Security risk.
Therefore, how the personal data generated to application are standardized classification, to help user accurately to identify individual
The source of data further effectively manages personal data convenient for user, while can ensure that users personal data is believed again
The safety of breath is those skilled in the art's urgent problem to be solved.
Invention content
The purpose of the application is to provide a kind of date storage method, and this method can be to applying the personal data generated into rower
Standardization is classified, and is helped user accurately to identify the source of personal data, is easily facilitated user and effectively managed personal data,
The safety of users personal data information is in turn ensured simultaneously;The another object of the application be to provide a kind of data storage device,
System and computer readable storage medium, it may have above-mentioned advantageous effect.
In order to solve the above technical problems, this application provides a kind of date storage method, the method includes:
Label file is set for the application data that application generates, obtains and applies data type catalogue;
The application data type catalogue is divided, obtains and applies data mode subdirectory;Wherein, the application number
Include that data subdirectory is applied in current application data subdirectory and encryption according to state subdirectory;
Current application data is added to the current application data subdirectory;
The current application data is encrypted, acquisition encryption adds using data and the encryption using data are corresponding
Key, and the encryption is added to the encryption using data subdirectory using data, by the encryption key preserve to
Key file;
The encryption is uploaded to data storage network using data, the encryption is obtained and applies the corresponding data rope of data
Draw;
The data directory is preserved to the key file.
Preferably, described that the current application data is encrypted, including:
The current application data is encrypted using symmetric encipherment algorithm.
Preferably, the date storage method further includes:
The encryption is deleted to schedule using the encryption application data in data subdirectory.
Preferably, the date storage method further includes:
When needing to obtain intended application data, the corresponding mesh of the intended application data is obtained in the key file
Mark data directory and corresponding target encryption key;
Target data index is sent to the data storage network, corresponding target encryption is obtained and applies data;
The target is encrypted using the target encryption key and is decrypted using data, the intended application number is obtained
According to.
In order to solve the above technical problems, this application provides a kind of data storage device, described device includes:
Catalogue setting unit, the application data for being generated for application are arranged label file, obtain and apply data type mesh
Record;
Catalogue division unit obtains for being divided to the application data type catalogue and applies data mode specific item
Record;Wherein, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Data adding device, for current application data to be added to the current application data subdirectory;
DEU data encryption unit, for the current application data to be encrypted, obtain encryption using data and it is described plus
The corresponding encryption key of close application data, and the encryption is added to the encryption using data and applies data subdirectory, general
The encryption key is preserved to key file;
Data uploading unit obtains the encryption and answers for the encryption to be uploaded to data storage network using data
With the corresponding data directory of data;
Data saving unit, for preserving the data directory to the key file.
Preferably, the DEU data encryption unit includes:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
Preferably, the data storage device further includes:
Data deleting unit is answered for deleting the encryption to schedule using the encryption in data subdirectory
Use data.
Preferably, the data storage device further includes:
Data query unit, for when needing to obtain intended application data, the mesh to be inquired in the key file
Mark is using the corresponding target data index of data and corresponding target encryption key;
Data download unit obtains corresponding for target data index to be sent to the data storage network
Data are applied in target encryption;
Data decryption unit is decrypted for being encrypted to the target using the target encryption key using data,
Obtain the intended application data.
In order to solve the above technical problems, this application provides a kind of data-storage system, the system comprises:
Memory, for storing computer program;
Processor realizes the step of the date storage method described in above-mentioned any one when for executing the computer program
Suddenly.
In order to solve the above technical problems, this application provides a kind of computer readable storage medium, it is described computer-readable
Computer program is stored on storage medium, the computer program is realized when being executed by processor described in above-mentioned any one
The step of date storage method.
A kind of date storage method provided herein includes that label file is arranged in the application data generated for application,
It obtains and applies data type catalogue;The application data type catalogue is divided, obtains and applies data mode subdirectory;Its
In, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;It will currently answer
It is added to the current application data subdirectory with data;The current application data is encrypted, encryption is obtained and applies number
The encryption is added to using data using data using the corresponding encryption key of data, and by the encryption according to the encryption
Subdirectory preserves the encryption key to key file;The encryption is uploaded to data storage network using data, is obtained
The corresponding data directory of data is applied in the encryption;The data directory is preserved to the key file.
As it can be seen that date storage method provided herein, is that each of platform applies journey by the way that label file is arranged
Sequence provides standardization, the classification of standardization and storage mode, has helped user that can correctly identify the source of personal data, i.e.,
The data which function from which application generates, such as wechat the data that generate of circle of friends;Further, by of user
Personal data is uploaded to data storage network, and data storage network is the block chain network being made of memory node, has and goes to center
Change, data can not distort and the characteristics of persistences, and data storage network replaces the centralization cloud service of service provider's control
Device remotely stores personal data with the storage mode of decentralization, the safety of users personal data has been effectively ensured.
A kind of data storage device, system and computer readable storage medium provided herein, it may have above-mentioned to have
Beneficial effect, details are not described herein.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of date storage method provided herein;
Fig. 2 is that a kind of data provided herein store schematic diagram;
Fig. 3 is a kind of data acquisition schematic diagram provided herein;
Fig. 4 is a kind of schematic diagram of data storage device provided herein;
Fig. 5 is a kind of schematic diagram of data-storage system provided herein.
Specific implementation mode
The core of the application is to provide a kind of date storage method, and this method can be to applying the personal data generated into rower
Standardization is classified, and is helped user accurately to identify the source of personal data, is easily facilitated user and effectively managed personal data,
The safety of users personal data information is in turn ensured simultaneously;Another core of the application be to provide a kind of data storage device,
System and computer readable storage medium, it may have above-mentioned advantageous effect.
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
The all other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of date storage method provided herein, this method can be with
Including:
S101:Label file is set for the application data that application generates, obtains and applies data type catalogue;
Specifically, using referring to the executable application programs for having specific function, system can be that phase is arranged in each application
The label file answered is established in a manner of describing to classify using data caused by corresponding application for the personal data of application
Local storage space, specifically can by the label file come state this apply data classification type, as wechat generate picture,
Audio, document etc. apply data type catalogue to obtain.For example, the mode classification using data can be as follows:
Wherein, above-mentioned tagList is label file, and it is Json data formats which, which uses, will apply number
Classify according to according to label tag.After application platform load is using APP, you can read and parse label file, and record
The quantity N of tag keys, the corresponding value of record tag keys arrive temp arrays.Further, you can generate N number of subdirectory, that is, apply data
Type of directory, by each element being named as using data type catalogue in temp arrays, i.e., the corresponding value of each tag keys.
S102:Application data type of directory is divided, and is obtained and is applied data mode subdirectory;Wherein, using data
State subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Specifically, after obtaining using data type catalogue, you can divided again to it, data type mesh will be applied
Record is divided into using data mode subdirectory, this may include current application data subdirectory using data mode subdirectory and adds
Close application data subdirectory.Such as:
As it appears from the above, renewable at current subdirectories and encryption application data modes under each tag subdirectories
Subdirectory, wherein current subdirectories are above-mentioned current application data subdirectory, can be used for storing and apply current slot
The personal data of generation, i.e. current application data;Encryption application data mode subdirectories are above-mentioned encryption application number
According to subdirectory, it can be used for storing and encrypted personal data to be uploaded, is i.e. data are applied in encryption.
S103:Current application data is added to current application data subdirectory;
S104:Current application data is encrypted, encryption is obtained and applies the corresponding encryption of data using data and encryption
Key, and encryption is added to encryption using data and applies data subdirectory, encryption key is preserved to key file;
Specifically, for using the data currently generated, i.e. current application data, current application data can be saved to
Subdirectory can further be encrypted the current application data in current application data subdirectory, obtain encryption and apply data
And its corresponding encryption key, and encryption is preserved to encryption using data using data subdirectory, by encryption key preserve to
Key file.
Preferably, above-mentioned current application data is encrypted may include utilizing symmetric encipherment algorithm to current application number
According to being encrypted.
Specifically, being encrypted using the current application data that symmetric encipherment algorithm generates application, i.e., to each
Individually being encrypted per a kind of personal data in is applied data and its corresponding encryption key to obtain encryption, is led to
Cross such fine granularity encryption storage mode can significantly more efficient assistance user personal data are managed.Wherein, above-mentioned
Symmetric encipherment algorithm is to develop a kind of data encryption algorithm more mature compared with early, technology, and algorithm discloses, calculation amount is smaller,
Enciphering rate is very fast and encryption efficiency is higher.Certainly, which is only a kind of embodiment provided herein, not
Uniquely, such as current application data can also be encrypted using rivest, shamir, adelman, further to improve user
The safety of personal data information.
In addition, above-mentioned key file is generated by platform, it can be used for storing encryption and apply the corresponding encryption key of data, and
Data directory described hereinafter.In the starting stage, i.e. initial key file is used for the encryption that storage platform is used in effective time
Key and data directory, as follows:
Wherein, startTime is the initial time using encryption key, and endTime is the end time, and tag is contingency table
Label, key is encryption key, and indexID is data directory.
S105:Encryption is uploaded to data storage network using data, encryption is obtained and applies the corresponding data directory of data;
S106:Data directory is preserved to key file.
Specifically, for the key file of above-mentioned starting stage, at the end of the effective time of encryption key, platform
One group of random encryption key is generated according to the temporal information, current application data is encrypted using the encryption key and is added
After close application data, then encryption can be uploaded to data storage network using data, be its generation correspondence by data storage network
Data directory, and encryption key and data directory are filled into key file, shown in filling key file is specific as follows:
In this application, identical as label file, the format of key file is using Json data formats, json data
Format is a kind of data interchange format of lightweight, is a subset based on JavaScript, and json is easy to developer's reading
With write, while be also easy to machine parsing and generate.Certainly, the selection of above-mentioned format is a kind of embodiment party provided herein
Formula uniquely can also be not XML format etc., the application is not specifically limited this.
In addition, above-mentioned data storage network (Data Storage Network, DSN) is the block being made of memory node
Chain network, based on the data storage service that block chain technology provides, block chain technology is a kind of distributed peace of decentralization
Full verification, memory technology, have higher security reliability.
Further, referring to FIG. 2, Fig. 2, which is a kind of data provided herein, stores schematic diagram, platform load application
Afterwards, you can parsing label file and establishes local storage space, after generating key file, you can at that time using data into
Row encryption obtains encryption and applies data, further upload to data storage network, and receives the data of data storage network return
Index.
Date storage method provided herein is provided by the way that label file is arranged for each application program in platform
Standardization, the classification of standardization and storage mode have helped user that can correctly identify the sources of personal data, that is, which come from
The data which function of applying a bit generates, such as wechat the data that generate of circle of friends;Further, by the personal data of user
It is uploaded to data storage network, data storage network is the block chain network being made of memory node, has decentralization, data
The centralization Cloud Server controlled by feature, data storage network substitution service provider that can not be distorted and preserve forever, to go
The storage mode of centralization remotely stores personal data, and the safety of users personal data has been effectively ensured.
On the basis of the above embodiments:
As a kind of preferred embodiment, which can also include deleting encryption to schedule to apply number
According to the encryption application data in subdirectory.
Specifically, since local storage space is limited, after encryption is uploaded to data storage network using data, locally deposit
The encryption application data in space are stored up without retaining, you can be deleted, can specifically be realized by setting interval, i.e., every pre-
Fix time delete a local storage space encryption application data, with ensure local storage space can real-time update its preservation
Data are applied in encryption.
In addition, date storage method provided herein, under the premise of ensureing that users personal data does not leak safely,
Can also be achieved the deletion using data, specifically, the characteristic based on block chain, be uploaded to after block chain using data be can not be into
Any change operation of row, including delete operation.And in this application, it can be by deleting some effective time in key file
The other all the elements of some tag class are realized in section, as long as losing data directory and encryption key, then will be unable to according to data
It indexes to data storage network request data, namely is unable to get encryption and is at this time it is even more impossible to which it is decrypted using data
It is equivalent to and deletes the application data of user.
As a kind of preferred embodiment, which can also include:
When needing to obtain intended application data, the corresponding target data rope of intended application data is obtained in key file
Draw and corresponding target encryption key;Target data index is sent to data storage network, corresponding target encryption is obtained and answers
Use data;Target is encrypted using target encryption key and is decrypted using data, intended application data are obtained.
Specifically, referring to FIG. 3, Fig. 3 is a kind of data acquisition schematic diagram provided herein, when user needs to obtain
When its personal data namely when intended application data, first, user can exist according to the tag along sort and effective time of intended application
This tag class other data directory indexID and encryption key key, i.e. target data rope in this time are inquired in key file
Draw and target encryption key;Then it is indexed to the corresponding target encryption of data storage network request acquisition and is answered according to the target data
With data, and it is stored in local storage space, further it is decrypted using target encryption key and obtains final target
Using data.
Further, date storage method provided herein, it may also be used for realize data sharing, i.e., when user wish by
When data sharing is to third party, with above-mentioned data acquisition, first, user can be according to the tag along sort for the application for wanting to share
The other data directory indexID and encryption key key of this tag class in this time is inquired in key file with effective time,
And it is shared with third party, third party can obtain data according to data directory indexID and encryption key key and store net
The encryption application data of network are simultaneously decrypted, and it is corresponding using data to obtain its.
To solve the above problems, referring to FIG. 4, Fig. 4 be a kind of data storage device provided herein schematic diagram,
The device may include:
Catalogue setting unit 10, the application data for being generated for application are arranged label file, obtain and apply data type
Catalogue;
Catalogue division unit 20 is divided for application data type of directory, is obtained and is applied data mode subdirectory;
Wherein, include that data subdirectory is applied in current application data subdirectory and encryption using data mode subdirectory;
Data adding device 30, for current application data to be added to current application data subdirectory;
DEU data encryption unit 40 obtains encryption and is applied using data and encryption for current application data to be encrypted
The corresponding encryption key of data, and encryption is added to encryption using data subdirectory using data, by encryption key preserve to
Key file;
Data uploading unit 50 is uploaded to data storage network for that will encrypt using data, obtains encryption and applies data
Corresponding data directory;
Data saving unit 60, for preserving data directory to key file.
As a kind of preferred embodiment, above-mentioned DEU data encryption unit 40 may include:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
As a kind of preferred embodiment, above-mentioned data storage device can also include:
Data deleting unit, for deleting encryption to schedule using the encryption application data in data subdirectory.
As a kind of preferred embodiment, above-mentioned data storage device can also include:
Data query unit, for when needing to obtain intended application data, intended application number to be inquired in key file
According to corresponding target data index and corresponding target encryption key;
Data download unit obtains corresponding target encryption for target data index to be sent to data storage network
Using data;
Data decryption unit is decrypted using data for being encrypted to target using target encryption key, obtains target
Using data.
Above method embodiment is please referred to for the introduction of data storage device provided by the present application, the application is not done herein
It repeats.
To solve the above problems, referring to FIG. 5, Fig. 5 be a kind of data-storage system provided herein schematic diagram,
The system may include:
Memory 1, for storing computer program;
Processor 2 can realize following steps when for executing computer program:
Label file is set for the application data that application generates, obtains and applies data type catalogue;Application data type
Catalogue is divided, and is obtained and is applied data mode subdirectory;Wherein, include current application data using data mode subdirectory
Data subdirectory is applied in catalogue and encryption;Current application data is added to current application data subdirectory;To current application number
According to being encrypted, obtain encryption using data and encryption using the corresponding encryption key of data, and will encryption using data addition
Data subdirectory is applied to encryption, encryption key is preserved to key file;Encryption is uploaded to data using data and stores net
Network obtains encryption and applies the corresponding data directory of data;Data directory is preserved to key file.
Above method embodiment is please referred to for the introduction of data-storage system provided by the present application, the application is not done herein
It repeats.
To solve the above problems, present invention also provides a kind of computer readable storage medium, the computer-readable storage
It is stored with computer program on medium, following steps can be realized when computer program is executed by processor:
Label file is set for the application data that application generates, obtains and applies data type catalogue;Application data type
Catalogue is divided, and is obtained and is applied data mode subdirectory;Wherein, include current application data using data mode subdirectory
Data subdirectory is applied in catalogue and encryption;Current application data is added to current application data subdirectory;To current application number
According to being encrypted, obtain encryption using data and encryption using the corresponding encryption key of data, and will encryption using data addition
Data subdirectory is applied to encryption, encryption key is preserved to key file;Encryption is uploaded to data using data and stores net
Network obtains encryption and applies the corresponding data directory of data;Data directory is preserved to key file.
Above method embodiment is please referred to for the introduction of data storage device provided by the present application, the application is not done herein
It repeats.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities
Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is referring to method part illustration
.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Date storage method provided herein, device, system and computer readable storage medium are carried out above
It is discussed in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above example
Illustrate to be merely used to help understand the present processes and its core concept.It should be pointed out that for the common skill of the art
For art personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these change
The application scope of the claims element is also fallen into modification.
Claims (10)
1. a kind of date storage method, which is characterized in that including:
Label file is set for the application data that application generates, obtains and applies data type catalogue;
The application data type catalogue is divided, obtains and applies data mode subdirectory;Wherein, the application data shape
State subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Current application data is added to the current application data subdirectory;
The current application data is encrypted, it is close using the corresponding encryption of data using data and the encryption to obtain encryption
Key, and the encryption is added to the encryption using data and applies data subdirectory, the encryption key is preserved to key
File;
The encryption is uploaded to data storage network using data, the encryption is obtained and applies the corresponding data directory of data;
The data directory is preserved to the key file.
2. date storage method as described in claim 1, which is characterized in that described to add to the current application data
It is close, including:
The current application data is encrypted using symmetric encipherment algorithm.
3. date storage method as claimed in claim 2, which is characterized in that further include:
The encryption is deleted to schedule using the encryption application data in data subdirectory.
4. the date storage method as described in claims 1 to 3 any one, which is characterized in that further include:
When needing to obtain intended application data, the corresponding number of targets of the intended application data is obtained in the key file
According to index and corresponding target encryption key;
Target data index is sent to the data storage network, corresponding target encryption is obtained and applies data;
The target is encrypted using the target encryption key and is decrypted using data, the intended application data are obtained.
5. a kind of data storage device, which is characterized in that including:
Catalogue setting unit, the application data for being generated for application are arranged label file, obtain and apply data type catalogue;
Catalogue division unit obtains for being divided to the application data type catalogue and applies data mode subdirectory;Its
In, the application data mode subdirectory includes that data subdirectory is applied in current application data subdirectory and encryption;
Data adding device, for current application data to be added to the current application data subdirectory;
DEU data encryption unit obtains encryption and is answered using data and the encryption for the current application data to be encrypted
With the corresponding encryption key of data, and the encryption is added to the encryption using data and applies data subdirectory, will described in
Encryption key is preserved to key file;
Data uploading unit obtains the encryption and applies number for the encryption to be uploaded to data storage network using data
According to corresponding data directory;
Data saving unit, for preserving the data directory to the key file.
6. data storage device as claimed in claim 5, which is characterized in that the DEU data encryption unit includes:
Encryption sub-unit operable, for the current application data to be encrypted using symmetric encipherment algorithm.
7. data processing equipment as claimed in claim 6, which is characterized in that further include:
Data deleting unit, for deleting the encryption to schedule using the encryption application number in data subdirectory
According to.
8. the data processing equipment as described in claim 5 to 7 any one, which is characterized in that further include:
Data query unit, for when needing to obtain intended application data, the target being inquired in the key file and is answered
With the corresponding target data index of data and corresponding target encryption key;
Data download unit obtains corresponding target for target data index to be sent to the data storage network
Data are applied in encryption;
Data decryption unit is decrypted using data for being encrypted to the target using the target encryption key, is obtained
The intended application data.
9. a kind of data-storage system, which is characterized in that including:
Memory, for storing computer program;
Processor realizes the data storage side as described in Claims 1-4 any one when for executing the computer program
The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the date storage method as described in Claims 1-4 any one when the computer program is executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810461230.6A CN108694331B (en) | 2018-05-15 | 2018-05-15 | Data storage method, device and system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810461230.6A CN108694331B (en) | 2018-05-15 | 2018-05-15 | Data storage method, device and system and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108694331A true CN108694331A (en) | 2018-10-23 |
CN108694331B CN108694331B (en) | 2022-01-11 |
Family
ID=63846260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810461230.6A Active CN108694331B (en) | 2018-05-15 | 2018-05-15 | Data storage method, device and system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108694331B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493017A (en) * | 2018-11-05 | 2019-03-19 | 江苏大学 | Credible outsourcing storage method based on block chain |
WO2020133346A1 (en) * | 2018-12-29 | 2020-07-02 | Nokia Shanghai Bell Co., Ltd. | Data sharing |
CN111404662A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Data processing method and device |
CN111404863A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Data processing method and device |
CN112464255A (en) * | 2020-10-21 | 2021-03-09 | 北京锐安科技有限公司 | Data processing method and device, storage medium and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050071345A1 (en) * | 2003-09-30 | 2005-03-31 | Oracle International Corporation | Attribute partitioning for user extensibility |
CN103376976A (en) * | 2012-04-25 | 2013-10-30 | 纬创资通股份有限公司 | Method for presenting application program menu, electronic device and computer readable medium |
CN105373595A (en) * | 2015-10-22 | 2016-03-02 | 广东欧珀移动通信有限公司 | Data automatic sorting storage method and terminal |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN107122429A (en) * | 2017-04-13 | 2017-09-01 | 北京安云世纪科技有限公司 | The method and apparatus and mobile terminal of a kind of file management |
CN107423410A (en) * | 2017-07-28 | 2017-12-01 | 福建中金在线信息科技有限公司 | A kind of data managing method, device and mobile terminal |
CN107765945A (en) * | 2017-10-17 | 2018-03-06 | 广东欧珀移动通信有限公司 | A kind of file management method, device, terminal and computer-readable recording medium |
CN107844530A (en) * | 2017-10-17 | 2018-03-27 | 广东欧珀移动通信有限公司 | A kind of data processing method, device, server and computer-readable recording medium |
-
2018
- 2018-05-15 CN CN201810461230.6A patent/CN108694331B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050071345A1 (en) * | 2003-09-30 | 2005-03-31 | Oracle International Corporation | Attribute partitioning for user extensibility |
CN103376976A (en) * | 2012-04-25 | 2013-10-30 | 纬创资通股份有限公司 | Method for presenting application program menu, electronic device and computer readable medium |
CN105373595A (en) * | 2015-10-22 | 2016-03-02 | 广东欧珀移动通信有限公司 | Data automatic sorting storage method and terminal |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN107122429A (en) * | 2017-04-13 | 2017-09-01 | 北京安云世纪科技有限公司 | The method and apparatus and mobile terminal of a kind of file management |
CN107423410A (en) * | 2017-07-28 | 2017-12-01 | 福建中金在线信息科技有限公司 | A kind of data managing method, device and mobile terminal |
CN107765945A (en) * | 2017-10-17 | 2018-03-06 | 广东欧珀移动通信有限公司 | A kind of file management method, device, terminal and computer-readable recording medium |
CN107844530A (en) * | 2017-10-17 | 2018-03-27 | 广东欧珀移动通信有限公司 | A kind of data processing method, device, server and computer-readable recording medium |
Non-Patent Citations (2)
Title |
---|
佚名: "Android应用程序的数据存放目录解说", 《HTTP://WWW.VOIDCN.COM/ARTICLE/P-AYNKSHGF-XY.HTML》 * |
黎计仲: "终端文档安全保护系统的研究与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493017A (en) * | 2018-11-05 | 2019-03-19 | 江苏大学 | Credible outsourcing storage method based on block chain |
CN109493017B (en) * | 2018-11-05 | 2021-11-23 | 江苏大学 | Trusted outsourcing storage method based on block chain |
WO2020133346A1 (en) * | 2018-12-29 | 2020-07-02 | Nokia Shanghai Bell Co., Ltd. | Data sharing |
CN113228011A (en) * | 2018-12-29 | 2021-08-06 | 上海诺基亚贝尔股份有限公司 | Data sharing |
CN111404662A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Data processing method and device |
CN111404863A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Data processing method and device |
CN111404662B (en) * | 2019-01-02 | 2023-04-07 | 中国移动通信有限公司研究院 | Data processing method and device |
CN112464255A (en) * | 2020-10-21 | 2021-03-09 | 北京锐安科技有限公司 | Data processing method and device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108694331B (en) | 2022-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108694331A (en) | A kind of date storage method, device, system and computer readable storage medium | |
CN105760781B (en) | The storage method, restoration methods and operating method of large data files can be deduced in order | |
US9767299B2 (en) | Secure cloud data sharing | |
US9749132B1 (en) | System and method for secure deletion of data | |
CN109241181A (en) | Database operation method and device | |
CN104978239A (en) | Method, device and system for realizing multi-backup-data dynamic updating | |
CN104836656B (en) | A kind of storage of video file and transmission method | |
Dowsley et al. | A survey on design and implementation of protected searchable data in the cloud | |
CN111090385A (en) | Data management method and device based on block chain | |
Moataz et al. | Resizable tree-based oblivious RAM | |
KR20110028968A (en) | Method for verifying the integrity of a user's data in remote computing and system thereof | |
CN109451004A (en) | Cloud storage system and method based on cloud bridge | |
CN107094075A (en) | A kind of data block dynamic operation method based on convergent encryption | |
CN104182418A (en) | Method and device for obtaining node metadata | |
CN110008725B (en) | User structured data processing system | |
CN112272155A (en) | E-mail receiving and sending method based on block chain | |
CN104753870A (en) | Data transmission method and system | |
CN104794243B (en) | Third party's cipher text retrieval method based on filename | |
KR20150055776A (en) | Personal cloud storage chain service method and system | |
US20230315897A1 (en) | Systems and methods for end-to end-encryption with encrypted multi-maps | |
US20230325524A1 (en) | Systems and methods for end-to end-encryption with encrypted multi-maps | |
US20230315896A1 (en) | Systems and methods for end-to end-encryption with encrypted multi-maps | |
Chen et al. | Adjacency‐Hash‐Table Based Public Auditing for Data Integrity in Mobile Cloud Computing | |
JP2009065574A5 (en) | ||
CN102624732A (en) | Network storage system based on cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230908 Address after: 510000 rooms 704 and 705, building 3, No. 18, Shenzhou Road, Huangpu District, Guangzhou, Guangdong Province Patentee after: Guangzhou longjianda Electronics Co.,Ltd. Address before: No.729, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province 510060 Patentee before: GUANGDONG University OF TECHNOLOGY |
|
TR01 | Transfer of patent right |