CN108718315A - A kind of cloud platform method for secret protection of fragmentation encryption user information - Google Patents
A kind of cloud platform method for secret protection of fragmentation encryption user information Download PDFInfo
- Publication number
- CN108718315A CN108718315A CN201810572003.0A CN201810572003A CN108718315A CN 108718315 A CN108718315 A CN 108718315A CN 201810572003 A CN201810572003 A CN 201810572003A CN 108718315 A CN108718315 A CN 108718315A
- Authority
- CN
- China
- Prior art keywords
- encryption
- user information
- information
- fragmentation
- character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses the cloud platform method for secret protection that a kind of fragmentation encrypts user information, method is combined to protect user information by the cloudy storage of simple encryption and encryption information fragmentation.User kernel privacy information content is often extremely important and a small amount of; a simple encryption is carried out by the way that user information is converted into Unicode codings, then protects user privacy information by handling user information fragmentation and being distributed on different Cloud Servers to be preserved.This method is combined using the cloudy storage of encryption method and fragmentation information, substantially increases the safety of user kernel information, is very helpful for protection user privacy information tool.
Description
Technical field
The invention belongs to field of cloud calculation, more particularly to a kind of cloud synchronous method of privacy fragment file.
Background technology
User information store method in the prior art is to take file to a network by transmission of network from client
Business device, corresponding user information can then be downloaded by logging in the network server from the arbitrary node of network.However, hacker is by stealing
The server info can steal the user information, invade privacy of user.Also there is the cloudy storage of fragmentation in the prior art simultaneously
Method, but this method is to user information there is no the processing such as being encrypted, also according to matrix column progress user's letter
Cease the method for fragmentation.This method encrypts the combination of the cooperation cloudy storage method of fragmentation by first time, is protected to privacy of user
Shield is more significant.
Invention content
The purpose of the present invention is to provide the cloud platform method for secret protection that a kind of fragmentation encrypts user information.
The present invention uses following technical scheme to achieve the goals above:
Fragmentation encrypts the cloud platform method for secret protection of user information, it is characterised in that includes the following steps:
Step 1:Unicode form coding conversions are carried out to core customer's information, are preserved into 16 system character shapes after conversion
Formula, such as " 9A62 ", " 5B3A ";
Step 2:Character style is converted into 5 characters, first ' 0 ' character of addition if only four, such as " 9A62 "
It is converted into " 09A62 ";
Step 3:Upset 5 characters and carry out simple encryption, selects encryption complexity x, x a value 1,2,3,4,5:
Step 3.1:The integer a in [1, a 5] range is generated at random, and position exchange processing, processing are carried out to 5 characters
Process is that a characters are transposed to first.
Step 3.2:Step 3.1 is repeated, until number of repetition is equal to encryption complexity x, the integer that will be generated at random every time
It is preserved in order, finally obtains x encryption:a1a2..., aiRepresent the integer that ith generates at random.
Step 4:Each user information of secret protection will be needed to carry out step 1,2,3 processing respectively, and protected using by row
It deposits, a user of behavior one, the form that preserved per a line is { five characters ... after five character _ conversions after encryption son _ conversion },
User information is referred to as encryption user information after the step;
Step 5:The Cloud Server quantity N of cloudy server is counted, and encryption user information is converted into matrix form, square
Each in battle array preserves a character of encryption user information;
Step 6:Matrix is subjected to cutting, the character data of different lines is saved in different Cloud Servers, specific rules are:
Cloud Server is encoded:Such as N0、N1、N2..., M is encoded according to column number respectively to matrix0、M1、M2..., specifically
Rule is preserved as according to MiSubscript i carries out data distribution:
T=i%N is calculated, it is N that the column data that result of calculation is T, which is saved in cloudy server number,TCloud Server
On, each columns is stated to be fragmentation encryption user information.The machine needs to preserve basic metadata information, metadata letter simultaneously
Breath is the holding time, and Cloud Server routing information of preservation etc. (can find crumb data) according to metadata.
Step 7:The storage information of cloudy server is obtained according to the metadata information of the machine, and finally realizes that fragmentation adds
Fragmentation encryption user information can be combined into encryption user's letter by the acquisition of close user information again according to metadata information
Breath.
Step 8:The decryption of user information is encrypted, 5 character informations are finally obtained:
Step 8.1:By the encryption user that format is { five characters ... after five character _ conversions after encryption son _ conversion }
Information is split, extraction encryption and five character strings.
Step 8.2:It is reversely decrypted according to encryption, selects last the sub- a of encryption every timei, by five characters
The first bit transition to aiPosition.
Step 9:5 character reverses are changed to correct Unicode format, are reduced to original user information.
In above-mentioned technical proposal, generated again by random digit generation method after user information is converted into 5 character styles
5 characters are encrypted in encryption.
In above-mentioned technical proposal, according to the Cloud Server quantity N of cloudy server, encryption user information is subjected to cutting simultaneously
It is synchronized on different Cloud Servers, is a kind of by information fragmentation and the method that is retained separately.
In above-mentioned technical proposal, it can lead to after fragmentation encryption user information is stored on the different server of cloud platform
The inverse process that metadata realizes fragmentation encryption user information is crossed, is finally converted to the user information of core again.
Because the present invention uses above technical scheme, has following advantageous effect:
The invention discloses the cloud platform method for secret protection that a kind of fragmentation encrypts user information, method is by simply adding
The cloudy storage of close and encryption information fragmentation is combined to protect user information.User kernel privacy information content is often very heavy
It wants and on a small quantity, a simple encryption is carried out by the way that user information is converted into Unicode codings, then by user information
Fragmentation is handled and is distributed on different Cloud Servers and preserved to protect user privacy information.This method uses encryption side
Method and the cloudy storage of fragmentation information are combined, and substantially increase the safety of user kernel information, for protection privacy of user letter
Breath tool is very helpful.
Description of the drawings
Fig. 1:A kind of cloud platform method for secret protection of fragmentation encryption user information.
Claims (4)
1. a kind of cloud platform method for secret protection of fragmentation encryption user information, it is characterised in that include the following steps:
Step 1:Unicode form coding conversions are carried out to core customer's information, are preserved at 16 system character styles, such as after conversion
" 9A62 ", " 5B3A ";
Step 2:Character style is converted into 5 characters, first ' 0 ' character of addition if only four, such as " 9A62 " is converted
At " 09A62 ";
Step 3:Upset 5 characters and carry out simple encryption, selects encryption complexity x, x a value 1,2,3,4,5:
Step 3.1:The integer a in [1, a 5] range is generated at random, and position exchange processing, processing procedure are carried out to 5 characters
For a characters are transposed to first.
Step 3.2:Step 3.1 is repeated, complexity x is encrypted until number of repetition is equal to, by the integer generated at random every time by suitable
Sequence is preserved, and x encryption are finally obtained:a1a2..., aiRepresent the integer that ith generates at random.
Step 4:Each user information of secret protection will be needed to carry out step 1,2,3 processing respectively, and preserved using by row, one
One user of behavior, the form that preserved per a line are { five characters ... after five character _ conversions after encryption son _ conversion }, and claiming should
User information is encryption user information after step;
Step 5:It counts the Cloud Server quantity N of cloudy server, and encryption user information is converted into matrix form, in matrix
Each preserves a character of encryption user information;
Step 6:Matrix is subjected to cutting, the character data of different lines is saved in different Cloud Servers, specific rules are:To cloud
Server is encoded:Such as N0、N1、N2..., M is encoded according to column number respectively to matrix0、M1、M2..., it is specific to preserve rule
It is then according to MiSubscript i carries out data distribution:
T=i%N is calculated, it is N that the column data that result of calculation is T, which is saved in cloudy server number,TCloud Server on, often
One columns is stated to be fragmentation encryption user information.The machine needs to preserve basic metadata information simultaneously, and metadata information is
Holding time, Cloud Server routing information of preservation etc. (can find crumb data) according to metadata.
Step 7:The storage information of cloudy server is obtained according to the metadata information of the machine, and finally realizes that fragmentation encryption is used
Fragmentation encryption user information can be combined into encryption user information by the acquisition of family information again according to metadata information.
Step 8:The decryption of user information is encrypted, 5 character informations are finally obtained:
Step 8.1:By the encryption user information that format is { five characters ... after five character _ conversions after encryption son _ conversion }
It is split, extraction encryption and five character strings.
Step 8.2:It is reversely decrypted according to encryption, selects last the sub- a of encryption every timei, by the first of five characters
Bit transition is to aiPosition.
Step 9:5 character reverses are changed to correct Unicode format, are reduced to original user information.
2. a kind of cloud platform method for secret protection of fragmentation encryption user information according to claim 1, feature exist
In:User information is converted into after 5 character styles again adding 5 characters by random digit generation method generation encryption
It is close.
3. a kind of article signature generating method based on random number division and recursion according to claim 1, it is characterised in that:
According to the Cloud Server quantity N of cloudy server, encryption user information is subjected to cutting and is synchronized on different Cloud Servers,
It is a kind of by information fragmentation and the method that is retained separately.
4. a kind of article signature generating method based on random number division and recursion according to claim 1, it is characterised in that:
Fragmentation encryption can be realized by metadata after fragmentation encryption user information is stored on the different server of cloud platform
The inverse process of user information is finally converted to the user information of core again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810572003.0A CN108718315A (en) | 2018-06-01 | 2018-06-01 | A kind of cloud platform method for secret protection of fragmentation encryption user information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810572003.0A CN108718315A (en) | 2018-06-01 | 2018-06-01 | A kind of cloud platform method for secret protection of fragmentation encryption user information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108718315A true CN108718315A (en) | 2018-10-30 |
Family
ID=63911804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810572003.0A Pending CN108718315A (en) | 2018-06-01 | 2018-06-01 | A kind of cloud platform method for secret protection of fragmentation encryption user information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108718315A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871667A (en) * | 2019-02-18 | 2019-06-11 | 北京创鑫旅程网络技术有限公司 | Data content guard method, device, server and computer-readable medium |
CN112000525A (en) * | 2020-10-28 | 2020-11-27 | 北京东方通软件有限公司 | Method and device for storing and recovering target data and data storage node |
-
2018
- 2018-06-01 CN CN201810572003.0A patent/CN108718315A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871667A (en) * | 2019-02-18 | 2019-06-11 | 北京创鑫旅程网络技术有限公司 | Data content guard method, device, server and computer-readable medium |
CN112000525A (en) * | 2020-10-28 | 2020-11-27 | 北京东方通软件有限公司 | Method and device for storing and recovering target data and data storage node |
CN112000525B (en) * | 2020-10-28 | 2021-02-19 | 北京东方通软件有限公司 | Method and device for storing and recovering target data and data storage node |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3058678B1 (en) | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption | |
US8892881B2 (en) | Split key secure access system | |
CN113297606B (en) | Color quantum image encryption and decryption method based on multiple chaos and DNA operation | |
CN106610995B (en) | Method, device and system for creating ciphertext index | |
US20170033933A1 (en) | Redactable document signatures | |
WO2018122287A1 (en) | Method and system for search pattern oblivious dynamic symmetric searchable encryption | |
CN105468990A (en) | Sensitive information management control method and apparatus | |
CN104636462B (en) | A kind of rapidly searching ciphertext method and system that can resist Statistical Analysis Attacks | |
CN102170350A (en) | Multiple uncertainty encryption system with misleading function | |
CN105187389A (en) | Webpage access method and system based on digital mixed encryption | |
CN114285575B (en) | Image encryption and decryption method and device, storage medium and electronic device | |
Raikhlin et al. | Is it possible to reduce the sizes of stegomessages in associative steganography? | |
CN108595554B (en) | Multi-attribute range query method based on cloud environment | |
CN108718315A (en) | A kind of cloud platform method for secret protection of fragmentation encryption user information | |
CN110543778A (en) | linear random encryption and decryption algorithm for character data | |
CN110768797A (en) | Data desensitization method based on identity format reserved encryption | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
CN112333698A (en) | Encryption authentication method and device for mobile game terminal | |
CN106446697A (en) | Method and device for saving private data | |
CN107766739A (en) | Towards the phrase retrieval method and its device of cipher text data | |
CN112805704A (en) | Method and system for protecting data | |
CN110365468B (en) | Anonymization processing method, device, equipment and storage medium | |
CN107579985B (en) | Large file transmission protection method based on fragment encryption | |
KR100910303B1 (en) | Data encryption and decryption apparatus using variable code table and method thereof | |
EP3413509B1 (en) | Cmac computation using white-box implementations with external encodings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181030 |