CN108694331B - Data storage method, device and system and computer readable storage medium - Google Patents

Data storage method, device and system and computer readable storage medium Download PDF

Info

Publication number
CN108694331B
CN108694331B CN201810461230.6A CN201810461230A CN108694331B CN 108694331 B CN108694331 B CN 108694331B CN 201810461230 A CN201810461230 A CN 201810461230A CN 108694331 B CN108694331 B CN 108694331B
Authority
CN
China
Prior art keywords
data
application data
subdirectory
encrypted
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810461230.6A
Other languages
Chinese (zh)
Other versions
CN108694331A (en
Inventor
张浩川
张泽航
余荣
缪志鹏
朱杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Longjianda Electronics Co ltd
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201810461230.6A priority Critical patent/CN108694331B/en
Publication of CN108694331A publication Critical patent/CN108694331A/en
Application granted granted Critical
Publication of CN108694331B publication Critical patent/CN108694331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The application discloses a data storage method, which comprises the steps of setting a tag file for application data to obtain an application data type directory; dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory; adding the current application data to the current application data subdirectory; encrypting the current application data to obtain encrypted application data and an encryption key, adding the encrypted application data to an encrypted application data subdirectory, and storing the encryption key to a key file; uploading the encrypted application data to a data storage network to obtain a data index; the data index is saved to the key file. The method carries out standardized classification on the application data and stores the application data in the data storage network, so that a user can correctly identify the source of personal data conveniently, and the safety of the personal data of the user is ensured. The application also discloses a data storage device, a system and a computer readable storage medium, which also have the beneficial effects.

Description

Data storage method, device and system and computer readable storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a data storage method, a data storage device, a data storage system, and a computer-readable storage medium.
Background
With the maturity and development of big data technology, the application of data in various industries is concerned, and the value of data is paid attention and embodied unprecedentedly. When a user uses an application, various personal data are generated and are stored in a storage space defined by each application in a scattered manner, and the personal data are related to the personal privacy of the user on one hand and contain huge mineable value on the other hand. Therefore, users need to classify and store personal data securely, and manage data conveniently while ensuring personal privacy security, so as to exert the value of data.
However, each application has a data classification mode, and when a user uses different application programs, personal data are stored in respective corresponding storage spaces in a manner of being dispersed in different classification modes, so that it is difficult for the user to determine which personal data are generated by the application used by the user; meanwhile, the independent classification mode is not beneficial to the management of the personal data by the user, and the dispersed storage mode is not beneficial to the remote storage of the personal data by the user.
A common storage method in the prior art is cloud storage, and a common cloud storage system is composed of two parts: during the working process of the cloud storage application, firstly, file directories of all applications in an operating system are scanned to obtain data exposed to the outside, simple classification is carried out according to file extensions of the data files, such as pictures png, documents doc and the like, and then the classified data are locally encrypted and uploaded to a class folder of the cloud server.
However, in the above manner, a simple file extension classification method is uniformly adopted for personal data, and data characteristics between different applications are ignored, so that normal data classification requirements of users cannot be met, for example, a user cannot know which personal data are stored in a certain application; meanwhile, after simple file extension name classification, personal data of the same type but from different applications are mixed, encrypted and stored, and the data management requirements of users on fine granularity cannot be met, for example, users cannot independently obtain or share part of personal data of one application; in addition, since the centralized cloud server controlled by the service provider is used for storing the data of the user, the personal data of the user is controlled by the service provider, and therefore, the personal information of the user has a huge security risk.
Therefore, how to perform standardized classification on personal data generated by an application to help a user accurately identify the source of the personal data is a problem to be solved by those skilled in the art.
Disclosure of Invention
The method can be used for carrying out standardized classification on personal data generated by application, helping a user accurately identify the source of the personal data, facilitating the effective management of the personal data by the user and ensuring the safety of personal data information of the user; it is another object of the present application to provide a data storage device, system and computer readable storage medium having the above-mentioned advantages.
In order to solve the above technical problem, the present application provides a data storage method, where the method includes:
setting a tag file for application data generated by application to obtain an application data type directory;
dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
adding current application data to the current application data subdirectory;
encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to the encrypted application data subdirectory, and storing the encryption key to a key file;
uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data;
and saving the data index to the key file.
Preferably, the encrypting the current application data includes:
encrypting the current application data using a symmetric encryption algorithm.
Preferably, the data storage method further comprises:
and deleting the encrypted application data in the encrypted application data subdirectory according to preset time.
Preferably, the data storage method further comprises:
when target application data need to be obtained, obtaining a target data index corresponding to the target application data and a corresponding target encryption key in the key file;
sending the target data index to the data storage network to obtain corresponding target encryption application data;
and decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
To solve the above technical problem, the present application provides a data storage device, comprising:
the catalog setting unit is used for setting a label file for application data generated by application to obtain an application data type catalog;
the directory dividing unit is used for dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
the data adding unit is used for adding the current application data to the current application data subdirectory;
the data encryption unit is used for encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to the encrypted application data subdirectory, and storing the encryption key to a key file;
the data uploading unit is used for uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data;
and the data storage unit is used for storing the data index to the key file.
Preferably, the data encryption unit includes:
and the encryption subunit is used for encrypting the current application data by using a symmetric encryption algorithm.
Preferably, the data storage device further comprises:
and the data deleting unit is used for deleting the encrypted application data in the encrypted application data subdirectory according to preset time.
Preferably, the data storage device further comprises:
the data query unit is used for querying a target data index corresponding to the target application data and a corresponding target encryption key in the key file when the target application data needs to be acquired;
the data downloading unit is used for sending the target data index to the data storage network to obtain corresponding target encryption application data;
and the data decryption unit is used for decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
In order to solve the above technical problem, the present application provides a data storage system, including:
a memory for storing a computer program;
a processor for implementing the steps of the data storage method of any one of the above when executing the computer program.
In order to solve the above technical problem, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the data storage method according to any one of the above.
The data storage method comprises the steps of setting a tag file for application data generated by an application to obtain an application data type directory; dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory; adding current application data to the current application data subdirectory; encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to the encrypted application data subdirectory, and storing the encryption key to a key file; uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data; and saving the data index to the key file.
Therefore, the data storage method provided by the application provides a standardized and normalized classification and storage mode for each application program in the platform by setting the label file, and helps a user to correctly identify the source of personal data, namely, data generated by functions of applications, such as data generated by a friend circle of WeChat, and the like; further, personal data of the user are uploaded to a data storage network, the data storage network is a block chain network formed by storage nodes and has the characteristics of decentralization, incapability of tampering and permanent storage of the data, the data storage network replaces a centralized cloud server controlled by a service provider, the personal data are stored remotely in a decentralization storage mode, and the safety of the personal data of the user is effectively guaranteed.
The data storage device, the system and the computer readable storage medium provided by the present application also have the above beneficial effects, which are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data storage method provided in the present application;
FIG. 2 is a schematic diagram of a data storage provided herein;
FIG. 3 is a schematic diagram of data acquisition according to the present application;
FIG. 4 is a schematic diagram of a data storage device provided herein;
fig. 5 is a schematic diagram of a data storage system provided in the present application.
Detailed Description
The core of the application is to provide a data storage method, which can carry out standardized classification on personal data generated by application, help a user accurately identify the source of the personal data, facilitate the user to effectively manage the personal data and ensure the safety of personal data information of the user; at the other core of the present application, a data storage device, a system and a computer readable storage medium are provided, which also have the above beneficial effects.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic flow chart of a data storage method provided in the present application, where the method may include:
s101: setting a tag file for application data generated by application to obtain an application data type directory;
specifically, the application refers to an executable application program with a specific function, the system may set a corresponding tag file for each application, establish a local storage space for personal data of the application in a manner of describing a classification of application data generated by the corresponding application, and specifically declare a classification type of the application data through the tag file, such as a picture, audio, document, and the like generated by WeChat, so as to obtain an application data type directory. For example, the classification of the application data may be as follows:
Figure BDA0001660957290000061
the tagList is a tag file, the tag file adopts a Json data format, and the application data is classified according to tag. After the application APP is loaded on the application platform, the tag file can be read and analyzed, the number N of tag keys is recorded, and the value corresponding to the tag keys is recorded to the temp array. Further, N sub-directories, that is, application data type directories, may be generated, and each application data type directory is named as an element in the temp array, that is, a value corresponding to each tag key.
S102: dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
specifically, after the application data type directory is obtained, the application data type directory may be divided again, and the application data type directory is divided into application data state subdirectories, which may include a current application data subdirectory and an encrypted application data subdirectory. For example:
Figure BDA0001660957290000062
Figure BDA0001660957290000071
as shown above, a current subdirectory and an encryption application data state subdirectory can be regenerated under each tag subdirectory, wherein the current subdirectory is the current application data subdirectory and can be used for storing personal data generated in the current time period of application, namely current application data; the encryption application data state subdirectory is the encryption application data subdirectory and can be used for storing encrypted personal data to be uploaded, namely encryption application data.
S103: adding the current application data to the current application data subdirectory;
s104: encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to an encrypted application data subdirectory, and storing the encryption key to a key file;
specifically, the data currently generated by the application, that is, the current application data, may be stored in the current application data subdirectory, and further, the current application data in the current application data subdirectory may be encrypted to obtain the encrypted application data and the encryption key corresponding thereto, and the encrypted application data is stored in the encrypted application data subdirectory, and the encryption key is stored in the key file.
Preferably, the encrypting the current application data may include encrypting the current application data by using a symmetric encryption algorithm.
Specifically, the current application data generated by the application can be encrypted by using a symmetric encryption algorithm, that is, each type of personal data in each application is encrypted individually to obtain encrypted application data and a corresponding encryption key thereof, and the user can be more effectively assisted in managing the personal data through the fine-granularity encryption storage mode. The symmetric encryption algorithm is a data encryption algorithm which is developed earlier and has mature technology, is disclosed, and has small calculated amount, high encryption speed and high encryption efficiency. Of course, the encryption method is only one embodiment provided in the present application, and is not unique, and for example, the current application data may be encrypted by using an asymmetric encryption algorithm, so as to further improve the security of the user personal data information.
In addition, the key file is generated by the platform and can be used for storing an encryption key corresponding to the encrypted application data and a data index described later. In the initial stage, that is, the initial key file is used to store the encryption key and the data index used by the platform in the valid time, as follows:
Figure BDA0001660957290000081
where startTime is the initial time of using the encryption key, endTime is the end time, tag is the classification tag, key is the encryption key, and indexID is the data index.
S105: uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data;
s106: the data index is saved to the key file.
Specifically, for the key file in the initial stage, when the valid time of the encryption key is over, the platform may generate a group of random encryption keys according to the time information, encrypt the current application data by using the encryption key to obtain encrypted application data, upload the encrypted application data to the data storage network, generate a corresponding data index for the data storage network, and fill the encryption key and the data index into the key file, where filling the key file is specifically as follows:
Figure BDA0001660957290000091
in the application, the same as the label file, the key file adopts a Json data format, the Json data format is a lightweight data exchange format and is a subset based on JavaScript, and Json is easy for developers to read and write and is also easy for machine analysis and generation. Of course, the above format is selected as an implementation manner provided by the present application, and is not limited to the only one, and may also be an XML format, etc., which is not specifically limited by the present application.
In addition, the Data Storage Network (DSN) is a blockchain Network composed of Storage nodes, and is based on a Data Storage service provided by a blockchain technology, and the blockchain technology is a decentralized distributed security verification and Storage technology, and has high security and reliability.
Further, referring to fig. 2, fig. 2 is a schematic diagram of data storage provided in the present application, after the platform loads an application, the tag file may be parsed, a local storage space may be established, and after a key file is generated, the current application data may be encrypted to obtain encrypted application data, which is further uploaded to a data storage network, and a data index returned by the data storage network is received.
According to the data storage method provided by the application, a standardized and normalized classification and storage mode is provided for each application program in the platform by setting the label file, so that a user can be helped to correctly identify the source of personal data, namely data generated by functions of applications, such as data generated by a friend circle of WeChat; further, personal data of the user are uploaded to a data storage network, the data storage network is a block chain network formed by storage nodes and has the characteristics of decentralization, incapability of tampering and permanent storage of the data, the data storage network replaces a centralized cloud server controlled by a service provider, the personal data are stored remotely in a decentralization storage mode, and the safety of the personal data of the user is effectively guaranteed.
On the basis of the above-described embodiment:
as a preferred embodiment, the data storage method may further include deleting the encrypted application data in the encrypted application data subdirectory at a predetermined time.
Specifically, since the local storage space is limited, after the encrypted application data is uploaded to the data storage network, the encrypted application data in the local storage space can be deleted without being retained, and specifically, the encrypted application data in the local storage space can be deleted once every predetermined time by setting a time interval, so that the encrypted application data stored in the local storage space can be updated in real time in the local storage space.
In addition, the data storage method provided by the application can also realize the deletion of the application data on the premise of ensuring the safety of the personal data of the user without leakage, and specifically, based on the characteristics of the block chain, the application data cannot be subjected to any change operation after being uploaded to the block chain, including the deletion operation. In the application, all the contents of a certain tag category in a certain valid time period can be deleted from the key file, and as long as the data index and the encryption key are lost, the data cannot be requested from the data storage network according to the data index, that is, the encrypted application data cannot be obtained, and the encrypted application data cannot be decrypted, which is equivalent to deleting the application data of the user.
As a preferred embodiment, the data storage method may further include:
when target application data need to be obtained, obtaining a target data index corresponding to the target application data and a corresponding target encryption key in a key file; sending the target data index to a data storage network to obtain corresponding target encryption application data; and decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
Specifically, referring to fig. 3, fig. 3 is a schematic diagram of data acquisition provided by the present application, when a user needs to acquire personal data of the user, that is, target application data, first, the user may query, according to a classification tag of the target application and valid time, a data index indexID and an encryption key of a tag class in a key file within the period of time, that is, a target data index and a target encryption key; and then requesting a data storage network to obtain corresponding target encryption application data according to the target data index, storing the target encryption application data in a local storage space, and further decrypting the target encryption application data by using a target encryption key to obtain final target application data.
Further, the data storage method provided by the application can also be used for realizing data sharing, namely when a user wants to share data to a third party, in the same way as the data acquisition process, firstly, the user can inquire the data index indexID and the encryption key of the label category in the key file according to the classification label and the valid time of the application which the user wants to share, and share the data index indexID and the encryption key to the third party, and the third party can acquire and decrypt the encrypted application data of the data storage network according to the data index indexID and the encryption key to obtain the corresponding application data.
To solve the above problem, please refer to fig. 4, fig. 4 is a schematic diagram of a data storage device provided in the present application, the device may include:
a directory setting unit 10, configured to set a tag file for application data generated by an application, and obtain an application data type directory;
the directory dividing unit 20 is configured to divide the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
a data adding unit 30, configured to add the current application data to the current application data subdirectory;
the data encryption unit 40 is configured to encrypt the current application data, obtain encrypted application data and an encryption key corresponding to the encrypted application data, add the encrypted application data to the encrypted application data subdirectory, and store the encryption key in a key file;
a data uploading unit 50, configured to upload the encrypted application data to a data storage network, and obtain a data index corresponding to the encrypted application data;
a data saving unit 60 for saving the data index to the key file.
As a preferred embodiment, the data encryption unit 40 may include:
and the encryption subunit is used for encrypting the current application data by using a symmetric encryption algorithm.
As a preferred embodiment, the data storage device may further include:
and the data deleting unit is used for deleting the encrypted application data in the encrypted application data subdirectory according to preset time.
As a preferred embodiment, the data storage device may further include:
the data query unit is used for querying a target data index corresponding to the target application data and a corresponding target encryption key in the key file when the target application data needs to be acquired;
the data downloading unit is used for sending the target data index to a data storage network to obtain corresponding target encryption application data;
and the data decryption unit is used for decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
For the introduction of the data storage device provided in the present application, please refer to the above method embodiments, which are not described herein again.
To solve the above problem, please refer to fig. 5, fig. 5 is a schematic diagram of a data storage system provided in the present application, the system may include:
a memory 1 for storing a computer program;
the processor 2, when executing the computer program, may implement the following steps:
setting a tag file for application data generated by application to obtain an application data type directory; dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory; adding the current application data to the current application data subdirectory; encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to an encrypted application data subdirectory, and storing the encryption key to a key file; uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data; the data index is saved to the key file.
For the introduction of the data storage system provided in the present application, please refer to the above method embodiments, which are not described herein again.
To solve the above problem, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, can implement the following steps:
setting a tag file for application data generated by application to obtain an application data type directory; dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory; adding the current application data to the current application data subdirectory; encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to an encrypted application data subdirectory, and storing the encryption key to a key file; uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data; the data index is saved to the key file.
For the introduction of the data storage device provided in the present application, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The data storage method, apparatus, system and computer readable storage medium provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and these improvements and modifications also fall into the elements of the protection scope of the claims of the present application.

Claims (10)

1. A method of storing data, comprising:
setting a tag file for application data generated by an application; wherein the tag file includes a tag for representing the application data category;
generating an application data type directory according to each label in the label file;
dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
adding current application data to the current application data subdirectory;
encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to the encrypted application data subdirectory, and storing the encryption key to a key file;
uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data;
and saving the data index to the key file.
2. The data storage method of claim 1, wherein said encrypting said current application data comprises:
encrypting the current application data using a symmetric encryption algorithm.
3. The data storage method of claim 2, further comprising:
and deleting the encrypted application data in the encrypted application data subdirectory according to preset time.
4. A data storage method according to any one of claims 1 to 3, further comprising:
when target application data need to be obtained, obtaining a target data index corresponding to the target application data and a corresponding target encryption key in the key file;
sending the target data index to the data storage network to obtain corresponding target encryption application data;
and decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
5. A data storage device, comprising:
a directory setting unit for setting a tag file for application data generated by an application; wherein the tag file includes a tag for representing the application data category; generating an application data type directory according to each label in the label file;
the directory dividing unit is used for dividing the application data type directory to obtain an application data state subdirectory; the application data state subdirectory comprises a current application data subdirectory and an encrypted application data subdirectory;
the data adding unit is used for adding the current application data to the current application data subdirectory;
the data encryption unit is used for encrypting the current application data to obtain encrypted application data and an encryption key corresponding to the encrypted application data, adding the encrypted application data to the encrypted application data subdirectory, and storing the encryption key to a key file;
the data uploading unit is used for uploading the encrypted application data to a data storage network to obtain a data index corresponding to the encrypted application data;
and the data storage unit is used for storing the data index to the key file.
6. The data storage device of claim 5, wherein the data encryption unit comprises:
and the encryption subunit is used for encrypting the current application data by using a symmetric encryption algorithm.
7. The data storage device of claim 6, further comprising:
and the data deleting unit is used for deleting the encrypted application data in the encrypted application data subdirectory according to preset time.
8. The data storage device of any of claims 5 to 7, further comprising:
the data query unit is used for querying a target data index corresponding to the target application data and a corresponding target encryption key in the key file when the target application data needs to be acquired;
the data downloading unit is used for sending the target data index to the data storage network to obtain corresponding target encryption application data;
and the data decryption unit is used for decrypting the target encrypted application data by using the target encryption key to obtain the target application data.
9. A data storage system, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data storage method of any one of claims 1 to 4 when executing said computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the data storage method according to any one of claims 1 to 4.
CN201810461230.6A 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium Active CN108694331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810461230.6A CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810461230.6A CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108694331A CN108694331A (en) 2018-10-23
CN108694331B true CN108694331B (en) 2022-01-11

Family

ID=63846260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810461230.6A Active CN108694331B (en) 2018-05-15 2018-05-15 Data storage method, device and system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108694331B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493017B (en) * 2018-11-05 2021-11-23 江苏大学 Trusted outsourcing storage method based on block chain
CN113228011A (en) * 2018-12-29 2021-08-06 上海诺基亚贝尔股份有限公司 Data sharing
CN111404863A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device
CN111404662B (en) * 2019-01-02 2023-04-07 中国移动通信有限公司研究院 Data processing method and device
CN112464255A (en) * 2020-10-21 2021-03-09 北京锐安科技有限公司 Data processing method and device, storage medium and electronic equipment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313572B2 (en) * 2003-09-30 2007-12-25 Oracle International Corporation Attribute partitioning for user extensibility
TWI585670B (en) * 2012-04-25 2017-06-01 緯創資通股份有限公司 Method for presenting application lists, electronic device using the same, and computer-readable recording medium
CN105373595B (en) * 2015-10-22 2020-01-31 Oppo广东移动通信有限公司 data self-classification storage method and terminal
CN106384060B (en) * 2016-09-23 2019-11-15 维沃移动通信有限公司 A kind of mobile terminal data encryption method and mobile terminal
CN107122429A (en) * 2017-04-13 2017-09-01 北京安云世纪科技有限公司 The method and apparatus and mobile terminal of a kind of file management
CN107423410A (en) * 2017-07-28 2017-12-01 福建中金在线信息科技有限公司 A kind of data managing method, device and mobile terminal
CN107844530B (en) * 2017-10-17 2021-11-05 Oppo广东移动通信有限公司 Data processing method and device, server and computer readable storage medium
CN107765945A (en) * 2017-10-17 2018-03-06 广东欧珀移动通信有限公司 A kind of file management method, device, terminal and computer-readable recording medium

Also Published As

Publication number Publication date
CN108694331A (en) 2018-10-23

Similar Documents

Publication Publication Date Title
CN108694331B (en) Data storage method, device and system and computer readable storage medium
WO2021088278A1 (en) File storage method, terminal, and storage medium
CN102170440B (en) Method suitable for safely migrating data between storage clouds
US20160011990A1 (en) System and Method for Conflict-Free Cloud Storage Encryption
US20170371625A1 (en) Content delivery method
CN113157648A (en) Block chain based distributed data storage method, device, node and system
CN106462671B (en) Compound document quotes resource
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
CN110798714B (en) HLS-based local video playing system and playing method
JP2017524188A (en) Collection folders in content management systems
WO2018001065A1 (en) Method, device and system for managing application
CN104753870A (en) Data transmission method and system
CN112788151B (en) Method, device and system for data synchronization
US9665732B2 (en) Secure Download from internet marketplace
CN108900510A (en) Off-line data storage method, device, computer equipment and storage medium
TW201317823A (en) Cloud secured storage system
CN112783847A (en) Data sharing method and device
CN112100689A (en) Trusted data processing method, device and equipment
CN111444542A (en) Data processing method, device and storage medium for copyright file
CN115408590B (en) Document tracking and tracing method, device and system
CN111565144A (en) Data layered storage management method for instant communication tool
JP6755539B2 (en) Methods and equipment for publishing copyrighted works on networks
CN115694878A (en) Data transmission method, equipment and storage medium
CN109754251B (en) Data processing method and device, medium and terminal thereof
JP6778033B2 (en) Take-out file simple encryption system and take-out file simple encryption program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230908

Address after: 510000 rooms 704 and 705, building 3, No. 18, Shenzhou Road, Huangpu District, Guangzhou, Guangdong Province

Patentee after: Guangzhou longjianda Electronics Co.,Ltd.

Address before: No.729, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province 510060

Patentee before: GUANGDONG University OF TECHNOLOGY

TR01 Transfer of patent right