CN108718315A - A kind of cloud platform method for secret protection of fragmentation encryption user information - Google Patents

A kind of cloud platform method for secret protection of fragmentation encryption user information Download PDF

Info

Publication number
CN108718315A
CN108718315A CN201810572003.0A CN201810572003A CN108718315A CN 108718315 A CN108718315 A CN 108718315A CN 201810572003 A CN201810572003 A CN 201810572003A CN 108718315 A CN108718315 A CN 108718315A
Authority
CN
China
Prior art keywords
encryption
user information
information
fragmentation
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810572003.0A
Other languages
Chinese (zh)
Inventor
陈坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Ke Ruida Electron Technology Co Ltd
Original Assignee
Sichuan Ke Ruida Electron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Ke Ruida Electron Technology Co Ltd filed Critical Sichuan Ke Ruida Electron Technology Co Ltd
Priority to CN201810572003.0A priority Critical patent/CN108718315A/en
Publication of CN108718315A publication Critical patent/CN108718315A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses the cloud platform method for secret protection that a kind of fragmentation encrypts user information, method is combined to protect user information by the cloudy storage of simple encryption and encryption information fragmentation.User kernel privacy information content is often extremely important and a small amount of; a simple encryption is carried out by the way that user information is converted into Unicode codings, then protects user privacy information by handling user information fragmentation and being distributed on different Cloud Servers to be preserved.This method is combined using the cloudy storage of encryption method and fragmentation information, substantially increases the safety of user kernel information, is very helpful for protection user privacy information tool.

Description

A kind of cloud platform method for secret protection of fragmentation encryption user information
Technical field
The invention belongs to field of cloud calculation, more particularly to a kind of cloud synchronous method of privacy fragment file.
Background technology
User information store method in the prior art is to take file to a network by transmission of network from client Business device, corresponding user information can then be downloaded by logging in the network server from the arbitrary node of network.However, hacker is by stealing The server info can steal the user information, invade privacy of user.Also there is the cloudy storage of fragmentation in the prior art simultaneously Method, but this method is to user information there is no the processing such as being encrypted, also according to matrix column progress user's letter Cease the method for fragmentation.This method encrypts the combination of the cooperation cloudy storage method of fragmentation by first time, is protected to privacy of user Shield is more significant.
Invention content
The purpose of the present invention is to provide the cloud platform method for secret protection that a kind of fragmentation encrypts user information.
The present invention uses following technical scheme to achieve the goals above:
Fragmentation encrypts the cloud platform method for secret protection of user information, it is characterised in that includes the following steps:
Step 1:Unicode form coding conversions are carried out to core customer's information, are preserved into 16 system character shapes after conversion Formula, such as " 9A62 ", " 5B3A ";
Step 2:Character style is converted into 5 characters, first ' 0 ' character of addition if only four, such as " 9A62 " It is converted into " 09A62 ";
Step 3:Upset 5 characters and carry out simple encryption, selects encryption complexity x, x a value 1,2,3,4,5:
Step 3.1:The integer a in [1, a 5] range is generated at random, and position exchange processing, processing are carried out to 5 characters Process is that a characters are transposed to first.
Step 3.2:Step 3.1 is repeated, until number of repetition is equal to encryption complexity x, the integer that will be generated at random every time It is preserved in order, finally obtains x encryption:a1a2..., aiRepresent the integer that ith generates at random.
Step 4:Each user information of secret protection will be needed to carry out step 1,2,3 processing respectively, and protected using by row It deposits, a user of behavior one, the form that preserved per a line is { five characters ... after five character _ conversions after encryption son _ conversion }, User information is referred to as encryption user information after the step;
Step 5:The Cloud Server quantity N of cloudy server is counted, and encryption user information is converted into matrix form, square Each in battle array preserves a character of encryption user information;
Step 6:Matrix is subjected to cutting, the character data of different lines is saved in different Cloud Servers, specific rules are: Cloud Server is encoded:Such as N0、N1、N2..., M is encoded according to column number respectively to matrix0、M1、M2..., specifically Rule is preserved as according to MiSubscript i carries out data distribution:
T=i%N is calculated, it is N that the column data that result of calculation is T, which is saved in cloudy server number,TCloud Server On, each columns is stated to be fragmentation encryption user information.The machine needs to preserve basic metadata information, metadata letter simultaneously Breath is the holding time, and Cloud Server routing information of preservation etc. (can find crumb data) according to metadata.
Step 7:The storage information of cloudy server is obtained according to the metadata information of the machine, and finally realizes that fragmentation adds Fragmentation encryption user information can be combined into encryption user's letter by the acquisition of close user information again according to metadata information Breath.
Step 8:The decryption of user information is encrypted, 5 character informations are finally obtained:
Step 8.1:By the encryption user that format is { five characters ... after five character _ conversions after encryption son _ conversion } Information is split, extraction encryption and five character strings.
Step 8.2:It is reversely decrypted according to encryption, selects last the sub- a of encryption every timei, by five characters The first bit transition to aiPosition.
Step 9:5 character reverses are changed to correct Unicode format, are reduced to original user information.
In above-mentioned technical proposal, generated again by random digit generation method after user information is converted into 5 character styles 5 characters are encrypted in encryption.
In above-mentioned technical proposal, according to the Cloud Server quantity N of cloudy server, encryption user information is subjected to cutting simultaneously It is synchronized on different Cloud Servers, is a kind of by information fragmentation and the method that is retained separately.
In above-mentioned technical proposal, it can lead to after fragmentation encryption user information is stored on the different server of cloud platform The inverse process that metadata realizes fragmentation encryption user information is crossed, is finally converted to the user information of core again.
Because the present invention uses above technical scheme, has following advantageous effect:
The invention discloses the cloud platform method for secret protection that a kind of fragmentation encrypts user information, method is by simply adding The cloudy storage of close and encryption information fragmentation is combined to protect user information.User kernel privacy information content is often very heavy It wants and on a small quantity, a simple encryption is carried out by the way that user information is converted into Unicode codings, then by user information Fragmentation is handled and is distributed on different Cloud Servers and preserved to protect user privacy information.This method uses encryption side Method and the cloudy storage of fragmentation information are combined, and substantially increase the safety of user kernel information, for protection privacy of user letter Breath tool is very helpful.
Description of the drawings
Fig. 1:A kind of cloud platform method for secret protection of fragmentation encryption user information.

Claims (4)

1. a kind of cloud platform method for secret protection of fragmentation encryption user information, it is characterised in that include the following steps:
Step 1:Unicode form coding conversions are carried out to core customer's information, are preserved at 16 system character styles, such as after conversion " 9A62 ", " 5B3A ";
Step 2:Character style is converted into 5 characters, first ' 0 ' character of addition if only four, such as " 9A62 " is converted At " 09A62 ";
Step 3:Upset 5 characters and carry out simple encryption, selects encryption complexity x, x a value 1,2,3,4,5:
Step 3.1:The integer a in [1, a 5] range is generated at random, and position exchange processing, processing procedure are carried out to 5 characters For a characters are transposed to first.
Step 3.2:Step 3.1 is repeated, complexity x is encrypted until number of repetition is equal to, by the integer generated at random every time by suitable Sequence is preserved, and x encryption are finally obtained:a1a2..., aiRepresent the integer that ith generates at random.
Step 4:Each user information of secret protection will be needed to carry out step 1,2,3 processing respectively, and preserved using by row, one One user of behavior, the form that preserved per a line are { five characters ... after five character _ conversions after encryption son _ conversion }, and claiming should User information is encryption user information after step;
Step 5:It counts the Cloud Server quantity N of cloudy server, and encryption user information is converted into matrix form, in matrix Each preserves a character of encryption user information;
Step 6:Matrix is subjected to cutting, the character data of different lines is saved in different Cloud Servers, specific rules are:To cloud Server is encoded:Such as N0、N1、N2..., M is encoded according to column number respectively to matrix0、M1、M2..., it is specific to preserve rule It is then according to MiSubscript i carries out data distribution:
T=i%N is calculated, it is N that the column data that result of calculation is T, which is saved in cloudy server number,TCloud Server on, often One columns is stated to be fragmentation encryption user information.The machine needs to preserve basic metadata information simultaneously, and metadata information is Holding time, Cloud Server routing information of preservation etc. (can find crumb data) according to metadata.
Step 7:The storage information of cloudy server is obtained according to the metadata information of the machine, and finally realizes that fragmentation encryption is used Fragmentation encryption user information can be combined into encryption user information by the acquisition of family information again according to metadata information.
Step 8:The decryption of user information is encrypted, 5 character informations are finally obtained:
Step 8.1:By the encryption user information that format is { five characters ... after five character _ conversions after encryption son _ conversion } It is split, extraction encryption and five character strings.
Step 8.2:It is reversely decrypted according to encryption, selects last the sub- a of encryption every timei, by the first of five characters Bit transition is to aiPosition.
Step 9:5 character reverses are changed to correct Unicode format, are reduced to original user information.
2. a kind of cloud platform method for secret protection of fragmentation encryption user information according to claim 1, feature exist In:User information is converted into after 5 character styles again adding 5 characters by random digit generation method generation encryption It is close.
3. a kind of article signature generating method based on random number division and recursion according to claim 1, it is characterised in that: According to the Cloud Server quantity N of cloudy server, encryption user information is subjected to cutting and is synchronized on different Cloud Servers, It is a kind of by information fragmentation and the method that is retained separately.
4. a kind of article signature generating method based on random number division and recursion according to claim 1, it is characterised in that: Fragmentation encryption can be realized by metadata after fragmentation encryption user information is stored on the different server of cloud platform The inverse process of user information is finally converted to the user information of core again.
CN201810572003.0A 2018-06-01 2018-06-01 A kind of cloud platform method for secret protection of fragmentation encryption user information Pending CN108718315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810572003.0A CN108718315A (en) 2018-06-01 2018-06-01 A kind of cloud platform method for secret protection of fragmentation encryption user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810572003.0A CN108718315A (en) 2018-06-01 2018-06-01 A kind of cloud platform method for secret protection of fragmentation encryption user information

Publications (1)

Publication Number Publication Date
CN108718315A true CN108718315A (en) 2018-10-30

Family

ID=63911804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810572003.0A Pending CN108718315A (en) 2018-06-01 2018-06-01 A kind of cloud platform method for secret protection of fragmentation encryption user information

Country Status (1)

Country Link
CN (1) CN108718315A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871667A (en) * 2019-02-18 2019-06-11 北京创鑫旅程网络技术有限公司 Data content guard method, device, server and computer-readable medium
CN112000525A (en) * 2020-10-28 2020-11-27 北京东方通软件有限公司 Method and device for storing and recovering target data and data storage node

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871667A (en) * 2019-02-18 2019-06-11 北京创鑫旅程网络技术有限公司 Data content guard method, device, server and computer-readable medium
CN112000525A (en) * 2020-10-28 2020-11-27 北京东方通软件有限公司 Method and device for storing and recovering target data and data storage node
CN112000525B (en) * 2020-10-28 2021-02-19 北京东方通软件有限公司 Method and device for storing and recovering target data and data storage node

Similar Documents

Publication Publication Date Title
EP3058678B1 (en) System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
US8892881B2 (en) Split key secure access system
CN113297606B (en) Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN106610995B (en) Method, device and system for creating ciphertext index
US20170033933A1 (en) Redactable document signatures
WO2018122287A1 (en) Method and system for search pattern oblivious dynamic symmetric searchable encryption
CN105468990A (en) Sensitive information management control method and apparatus
CN104636462B (en) A kind of rapidly searching ciphertext method and system that can resist Statistical Analysis Attacks
CN102170350A (en) Multiple uncertainty encryption system with misleading function
CN105187389A (en) Webpage access method and system based on digital mixed encryption
CN114285575B (en) Image encryption and decryption method and device, storage medium and electronic device
Raikhlin et al. Is it possible to reduce the sizes of stegomessages in associative steganography?
CN108595554B (en) Multi-attribute range query method based on cloud environment
CN108718315A (en) A kind of cloud platform method for secret protection of fragmentation encryption user information
CN110543778A (en) linear random encryption and decryption algorithm for character data
CN110768797A (en) Data desensitization method based on identity format reserved encryption
CN106357608A (en) Method for encrypting and decrypting private data for personal healthcare data
CN112333698A (en) Encryption authentication method and device for mobile game terminal
CN106446697A (en) Method and device for saving private data
CN107766739A (en) Towards the phrase retrieval method and its device of cipher text data
CN112805704A (en) Method and system for protecting data
CN110365468B (en) Anonymization processing method, device, equipment and storage medium
CN107579985B (en) Large file transmission protection method based on fragment encryption
KR100910303B1 (en) Data encryption and decryption apparatus using variable code table and method thereof
EP3413509B1 (en) Cmac computation using white-box implementations with external encodings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181030