CN109684874A - One kind being based on the self-destructed cloud storage data uploading method of data - Google Patents

One kind being based on the self-destructed cloud storage data uploading method of data Download PDF

Info

Publication number
CN109684874A
CN109684874A CN201811646451.7A CN201811646451A CN109684874A CN 109684874 A CN109684874 A CN 109684874A CN 201811646451 A CN201811646451 A CN 201811646451A CN 109684874 A CN109684874 A CN 109684874A
Authority
CN
China
Prior art keywords
data
storage
key
self
equal portions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811646451.7A
Other languages
Chinese (zh)
Inventor
曾秀芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Zhiben Information Technology Co Ltd
Original Assignee
Hubei Zhiben Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Zhiben Information Technology Co Ltd filed Critical Hubei Zhiben Information Technology Co Ltd
Priority to CN201811646451.7A priority Critical patent/CN109684874A/en
Publication of CN109684874A publication Critical patent/CN109684874A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses one kind, this method comprises: S1 is encrypted using the former data of given key pair storage to be uploaded, to obtain cryptograph files for data object to be uploaded to and is stored in data Cloud Server based on the self-destructed cloud storage data uploading method of data;S2 is split the key, generates n equal portions, wherein the value of n is specified by security strategy;S3 randomly selects k equal part composition data object M [1, k] from above-mentioned n equal portions, and wherein k is storage interstitial content, and establishes connection with each memory node respectively;S4 creates storage object in memory node, wherein including life span in the attribute of the storage object, wherein by the write-in of corresponding equal portions key data;S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload the encryption file that this has key metadata information if successful connection, complete to upload storage.

Description

One kind being based on the self-destructed cloud storage data uploading method of data
Technical field
The invention belongs to technical field of computer data storage, and in particular to one kind is based on the self-destructed cloud storage data of data Method for uploading.
Background technique
It includes following several types that traditional data, which destroys technology according to the different form of operating method: based on file system Data deletion, data cover and the other destruction of physical level.Wherein, the data based on file system are deleted according to operation granularity not It is deleted and device format with file is divided into.File deletion is that a kind of most direct data delete mode, it utilizes file system The method of offer explicitly deletes file or data, realizes that file deletion is all that only deletion file is corresponding in mainstream file system Index, without carrying out delete operation to the corresponding disk sector of file data;Device format is provided using file system Formatting Facility or third-party disk management tool disk partition is formatted, what is at this moment deleted is on entire subregion File, most of Formatting Facilities are all that entire subregion is made to become all available using the sector auxiliary information for rebuilding disk partition. Therefore this data based on file system are deleted there is no data are veritably deleted, can be by big portion by some technological means The corresponding data retrieving of single cent part, this is also a kind of means that data restore usually used.The other destruction of physical level is divided into again: (1) demagnetization method destroys the magnetic texure of magnetic storage device, so that magnetic storage be made to set by the magnetic field that Deperming Facility generates Achieve the purpose that destroy data for unavailable;(2) chemical corrosion method is internally integrated chemistry pin module in magnetic storage device, By certain technological means (such as GPS positioning) judge store equipment it is whether out of control, if it is out of control chemical destruction module from Dynamic release corrosivity medicament corrosion magnetic storage device keeps its unavailable;(3) physics damage, i.e., by direct physical means come Strength destroys storage equipment.
Data cover is using the storage reused data recording performance of equipment, and use is irregular, meaningless Sector where data cover file to be deleted or data, basic thought are the storage principles for magnetic medium, use random number According to the data originally stored on magnetic medium are covered repeatedly, achieve the purpose that clear data.So far, data erasing is most to pacify Entirely, the method for most economical destruction data.Data cover covers specified data field using meaningless information predetermined Domain legacy data, in order to evade magnetic signal leak data historical rudiment certain probability, behaviour can be write by multi-fold Make to reduce risk.
With the development of internet technology and mobile Internet it is universal, daily life more depends strongly on In computer technology and Internet technology, at the same time, the risk that the privacy of user is invaded is higher and higher.On the one hand, existing rank The computer system or network of section inevitably cache, replicate or file respective counts during processing, transmission, storing data It is inevitable intermediate product according to, these copies, but user is not intended to that there are these copies, because these intermediate products are unknowable Be also it is uncontrollable;On the other hand, user privacy information as the carelessness of service provider, the invasion of hacker or Some lawful means and be leaked.
Data self-destruction technology is a kind of safety and secret protection scheme for typically utilizing data cover principle, such as Vanish data destruct system, wherein encrypted data can be used in user, then stores data in cloud system, close Key can be automatically deleted according to the time, and data are accessible before deletion, but data can not just access after key deletion, thus Realize information content self-destruction system.But with the not only raising of security challenge, cryptographic key existence in Vanish data destruct system Time is uncontrollable so that this self-destruction scheme still has biggish deficiency.
Summary of the invention
For the disadvantages described above of the prior art, the present invention proposes a kind of based on data self-destructed cloud storage data upload side Method carries out the equal portions segmentation of data key, for so that key equal portions pair by uploading the crucial processing in storage to data The object answered is able to carry out self-destruction method, with the life spans of key equal portions is set by policy object to execute automatically with Associated self-destruction method, to realize highly effective and safe and stable data self-destruction.
To achieve the above object, the specific technical solution that the present invention uses is as follows:
One kind being based on the self-destructed cloud storage data uploading method of data, for uploading data object and being stored in data cloud Server, this method specifically comprise the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates N number of equal portions, and wherein the value of N is specified by security strategy;
S3 randomly selects K equal part composition data object M [1, k] from above-mentioned N number of equal portions, and wherein K is storage interstitial content, And connection is established with each memory node respectively;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be right The equal portions key data write-in answered is wherein;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload if successful connection This has the encryption file of key metadata information, completes to upload storage.
As a further improvement of the present invention, directly clear after establishing connection failure with data-storage system server in S6 Except the storage object of creation.
As a further improvement of the present invention, the key is split in S2 and is achieved by the steps of, comprising: is first First, it generates integer array a [k] and is used as coefficient, and enable the value of a [0] for the value of integer corresponding to original cipher key S;Secondly, generating k-1 There are in a [1 ... k] for random number;Then j=1 is taken, 2, n constructs n yj=f (j) equation;Finally, wherein (1 f (j) ≤ j≤n) be n equal portions after primary key segmentation integer value, times take wherein k equal portions can construct primary key S.
As a further improvement of the present invention, the life span attribute value of the storage object in the memory node passes through fixed When device timing update, and when value is 0, trigger data self-destruction is acted, that is, calls the pre-stored data erasing side being associated Method carries out data safety deletion.
As a further improvement of the present invention, the data self-destruction movement is specially to use data overwrite method safety deleting Corresponding data, specifically:
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random number According to;
4) storage object is removed by remove_object method.
It is of the invention based on the self-destructed cloud storage data uploading method of data, for security challenge existing for Vanish system And the uncontrollable drawback of key lifetime, make the corresponding object of key equal portions be able to carry out self-destruction side by method object Method, is arranged the life spans of key equal portions by policy object to execute self-destruction method associated with it automatically, the present invention Method can be realized data self-destruction in the case where generating little effect to system by test and comparison, data self-destruction process, And the life span of key is user controllable, to greatly solve defect existing for current Vanish system.
Detailed description of the invention
Fig. 1 is the data uploading method flow chart of the embodiment of the present invention;
Fig. 2 is the data handling procedure schematic diagram before cipher key destruction;
Fig. 3 is the block architecture diagram using the object-based storage system of the method for the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Firstly, it is of the invention for ease of understanding, first technical term involved in this programme is defined and is explained.
Object storage: object is the basic unit of object storage device (OSD) processing, by unique ID identifier come area Point.Each object is a series of set of orderly bytes, including data and attribute.Object in OSD is divided into root object (Root Object), zone object (Partition Object), collection object (Collection Object) and user object (User Object).Wherein, root object is corresponding with OSD, and each OSD only includes a root object, and is created in OSD initialization, The attribute description of root object global property relevant to storage equipment, including total capacity, maximum object count and with data complete Whole property related attribute (such as OSD is realized as RAID, and the rank of RAID is described).Zone object includes one group of user couple As these user objects possess common attribute, and the data field of zone object is containing only user object ID list, the category of zone object Property includes the user object number in subregion, user object the space occupied etc. in subregion.Collection object is for realizing user couple The quick-searching of elephant, a zone object may include zero or more collection object, and a user object may belong to zero Or multiple collection objects.The object that user object directly uses when accounting for the overwhelming majority and user in OSD using OSD, user Data storage and management is realized by user object.
Thus object memory interface used in object storage system overcomes the defect of block interface and file interface, makes Object storage system safety, data sharing, scalability and in terms of can The Gift of Being the Best You Can Be compromise.Object interface is visited The basic unit asked is object, and object also includes the attribute of energy description object feature other than comprising user data.By with Object properties information is transmitted between family and equipment, object interface has more abundant semantic meaning representation ability than other interfaces.
With the development of memory technology, the equipment stored in equipment has more and more processing capacities, upper layer application Partial function can move to equipment (i.e. " Initiative Inventory Management " --- by storage device processes upper-layer functionality).For traditional Initiative Inventory Management Relevant issues and object storage characteristic, propose object-based active in object storage and Initiative Inventory Management on the basis of Storage system (OBASS), object-based Initiative Inventory Management system enable Initiative Inventory Management special using the autonomous management object of OSD Property, realize complicated management function, object can be understood by attribute by moving to the functional module on OSD, it is not necessary to rely on extraneous Intervention, and OSD can realize autonomous object handles according to the attribute of object.By means of the powerful place integrated in OSD equipment Reason ability and its object interface for being rich in expressiveness having realize Initiative Inventory Management with can be convenient.
The embodiment of the present invention based on the self-destructed cloud storage data uploading method of data is used to that data object to be uploaded and be deposited It is stored in data Cloud Server, this method specifically comprises the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates N number of equal portions, and wherein the value of N is specified by security strategy;
S3 randomly selects K equal part composition data object M [1, k] from above-mentioned N number of equal portions, and wherein K is storage interstitial content, And connection is established with each memory node respectively;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be right The equal portions key data write-in answered wherein (just has the metamessage of the key equal portions data) at this time on meta data server;If having The ASO created is just removed in any one connection failure, and upload is marked to fail, and terminates upload procedure;If all connections are all It is successful then turn in next step;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload if successful connection This has the encryption file of key metadata information, completes to upload storage.It marks upload to fail if connection failure, terminates to upload Process.
Preferably, creation can directly be removed after establishing connection failure with data-storage system server in step S6 The storage object.
It is achieved by the steps of it is highly preferred that being split in S2 to the key, comprising: firstly, generating integer number Group a [k] is used as coefficient, and enables the value of a [0] for the value of integer corresponding to original cipher key S;Secondly, generating k-1 random number, there are a In [1 ... k];Then j=1 is taken, 2, n constructs n yj=f (j) equation;Finally, wherein f (j) (1≤j≤n) is The integer value of n equal portions after primary key segmentation, times take wherein k equal portions can construct primary key S.
Specifically, key is split can be realized by ShamirSecretSharing algorithm. ShamirSecretSharing algorithm is a kind of key distribution algorithm, specifically: assuming that using (k, n) threshold mechanism to divide Send out key S, that is, divide the key into n different equal portions, times take wherein k equal portions can recombinate to obtain key S.The coefficient number used Group is a [1 ... k].Known any k value can construct primary key S, it is known that when key equal portions are less than k, can not construct original Beginning key.The realization process of ShamirSecretSharing algorithm is: firstly, generating an integer array a [k] is used as coefficient. It enables the value of a [0] be the value of integer corresponding to original cipher key S, while generating k-1 random number there are in a [1 ... k];J=1 is taken, 2, n constructs n yj=f (j) equation.So f (j) (1≤j≤n) is n equal portions after primary key segmentation Integer value, appoint take wherein k equal portions can construct primary key S.
Further, in this embodiment the life span attribute value of the storage object in memory node passes through timer timing It updates, and when value is 0, trigger data self-destruction is acted, that is, the pre-stored data method for deleting being associated is called to be counted According to safety deleting.
On the whole, the present invention realizes the data based on Initiative Inventory Management framework by the application of following key technology Destruct system: 1) object memory mechanism and interface, and the method that Initiative Inventory Management technology is realized based on this;Pass through distributed objects Memory interface carrys out storage and management key equal portions, and the self-destroying function of key equal portions is realized by Initiative Inventory Management technology;2) data are wiped Except related algorithm, algorithm is wiped using relevant data to realize that the safety of key equal portions is destroyed;3) the related of key distribution is calculated Method distributes key into distributed objects storage system for client (user) using Shamir algorithm as core.
In order to cooperate the distribution of key with share, meta data server fulfiling management file metadata function except, need Carry out user management, rights management, server admin, session management etc..Storage object adds the lifetime with respect to user object Attribute (TimeToLive, TTL), the value of ordinary user's object attribute are default value --- " infinity ", i.e., no life Time limit system removes non-display execution delete operation, and otherwise the object will not be deleted;The lifetime attribute value of Initiative Inventory Management object is One finite value is used for the self-destructed movement of trigger data.
It include two core components:<key, value>storage subsystem 330 and ASO subsystem 320 in memory node.< Key, value > storage subsystem 330 are key with the ID of object, and the related data and attribute of object are as value.For pipe The data and attribute of reason and the object in maintenance memory node: query object, positioning object are written and read, position object category Property is written and read.ASO subsystem 320 is that the core of Initiative Inventory Management technology embodies, for handling user's Initiative Inventory Management service Request, including data self-destruction policy object and the management of data self-destruction method object and the execution of method object.
Data self-destruction policy object is that the set of a series of conditions can be with countermeasure similar to the conditional expression in C language Slightly object is judged, Boolean is returned.Data self-destruction policy object is the basis that data self-destruction method object executes automatically, can Think the one or more strategy associations of each method object association, but a policy object can only be related to a method object Connection.
Policy object is registered in OSD by OSD client by POLICY_REGISTE order, and OSD is by the strategy of creation The ID of object returns to client.OSD client needs to provide the ID of a method object in registration policy object, and OSD exists The mapping relations of meeting establishment strategy object and method object, OSD pass through referred to as strategy-method (Policy- when construction strategy object Method) mapping table PM safeguards the mapping relations between these policy objects ID and method object ID.System uses timer Method timing updates storage the ttl value of object, when ttl is kept to 0, i.e., triggering when expression formula (aso.getTTL ()==0) is true Data self-destruction movement.Storage system is real-time update and the ttl value for tracking Initiative Inventory Management object, is needed when system starts, note Volume starting timer approach (onTimer ()), this method can be executed periodically by the timer mechanism of system, should The Initiative Inventory Management object of all registrations can be all traversed when method executes every time, and by decTime method come corresponding object of successively decreasing Ttl value, when ttl value is kept to 0, the conditional expression return value of policy object is very to trigger data self-destruction method object Execution.The timeout value of timer approach can determine according to the strategy of the application scenarios demand locating for system, such as 1 Second or 1 minute.
Method treatment process in the present embodiment, in data self-destruction method object are as follows:
1) storage object (user object) is obtained according to given parameters
2) judge whether object obtained is active storage object, if not directly return.The data self-destruction method It is only applicable to Initiative Inventory Management object;
3) data overwrite method safety deleting corresponding data is used for Initiative Inventory Management object
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random number According to;
4) storage object is removed by remove_object method.
When client by meta data server upload key equal portions and encryption file arrive memory node when, encryption file meeting The form of view object uploads to some memory node, and key can be divided into K equal portions and be uploaded respectively in the form of Initiative Inventory Management object To K memory node, and there are also life span ttl attributes for each key equal portions Initiative Inventory Management object, with ttl attribute corresponding Memory node on create data self-destruction policy object, there are also data self-destruction method object, which is fixed.As ASO System detection then (i.e. timer time arrives), will call data associated therewith to key aliquot A SO life span Data method for deleting in self-destruction method object, then in<key, value>storage subsystem finds the object to be deleted, will be close Key equal portions object security complete deletion, that used due to this system is all hard disk (HDD), therefore calls the existing number for HDD According to erasing algorithm.

Claims (5)

1. one kind is based on the self-destructed cloud storage data uploading method of data, for data object to be uploaded to and is stored in data cloud clothes Business device, this method specifically comprise the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates n equal portions, wherein the value of n is specified by security strategy;
S3 randomly selects k equal part composition data object M [1, k] from above-mentioned n equal portions, and wherein k is storage interstitial content, and point Connection is not established with each memory node;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be corresponding Equal portions key data is written wherein;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload this band if successful connection There is the encryption file of key metadata information, completes to upload storage.
2. it is according to claim 1 be based on the self-destructed cloud storage data uploading method of data, wherein in step S6 with number The storage object of directly removing creation is established after connection failure according to storage system service device.
3. according to claim 1 or 2 be based on the self-destructed cloud storage data uploading method of data, wherein right in step S2 The key, which is split, to be achieved by the steps of, comprising:
Firstly, generating integer array a [k] is used as coefficient, and enable the value of a [0] for the value of integer corresponding to original cipher key S;
Secondly, generating k-1 random number, there are in a [1 ... k];
Then j=1 is taken, 2, n constructs n yj=f (j) equation, and j is equal portions serial number;
Finally, wherein f (j) (1≤j≤n) is the integer value of n equal portions after primary key segmentation, appoints and take wherein k equal portions Primary key S can be constructed.
4. according to any one of claim 1 to 3 be based on the self-destructed cloud storage data uploading method of data, wherein institute The life span attribute value for stating the storage object in memory node is updated by timer timing, and the trigger data when value is 0 Self-destruction movement calls the pre-stored data method for deleting being associated to carry out data safety deletion.
5. according to any one of claim 1 to 4 be based on the self-destructed cloud storage data uploading method of data, wherein institute Stating data self-destruction movement is specially to use data overwrite method safety deleting corresponding data, specifically:
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random data;
4) storage object is removed by remove_object method.
CN201811646451.7A 2018-12-30 2018-12-30 One kind being based on the self-destructed cloud storage data uploading method of data Pending CN109684874A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811646451.7A CN109684874A (en) 2018-12-30 2018-12-30 One kind being based on the self-destructed cloud storage data uploading method of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811646451.7A CN109684874A (en) 2018-12-30 2018-12-30 One kind being based on the self-destructed cloud storage data uploading method of data

Publications (1)

Publication Number Publication Date
CN109684874A true CN109684874A (en) 2019-04-26

Family

ID=66191501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811646451.7A Pending CN109684874A (en) 2018-12-30 2018-12-30 One kind being based on the self-destructed cloud storage data uploading method of data

Country Status (1)

Country Link
CN (1) CN109684874A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112206529A (en) * 2020-10-19 2021-01-12 珠海金山网络游戏科技有限公司 Data processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112206529A (en) * 2020-10-19 2021-01-12 珠海金山网络游戏科技有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
Liu et al. DivORAM: Towards a practical oblivious RAM with variable block size
US10129024B2 (en) Encrypted file storage
Stefanov et al. Multi-cloud oblivious storage
Williams et al. Single round access privacy on outsourced storage
JP6426174B2 (en) Data management of connected devices
EP2731046B1 (en) Client computer for querying a database stored on a server via a network
KR101589849B1 (en) Deletion of content in storage systems
US11271726B2 (en) Key encryption methods, apparatuses, and systems
US11489660B2 (en) Re-encrypting data on a hash chain
US7315859B2 (en) Method and apparatus for management of encrypted data through role separation
KR102202473B1 (en) Systems and methods for dynamic data storage
CN110413652B (en) Big data privacy retrieval method based on edge calculation
JP2008250369A (en) Management method of secrete data file, management system and proxy server therefor
US9262646B1 (en) Systems and methods for managing web browser histories
US11188668B2 (en) Method for accessing data in a secure manner
US20220374540A1 (en) Field level encryption searchable database system
Wang et al. Data Security Storage Model of the Internet of Things Based on Blockchain.
Ye et al. TamForen: A tamper‐proof cloud forensic framework
CN109726591A (en) One kind being based on the self-destructed cloud storage data system of data
WO2022010811A1 (en) Secure data storage for anonymized contact tracing
CN109684874A (en) One kind being based on the self-destructed cloud storage data uploading method of data
CN109726189A (en) One kind being based on the self-destructed cloud storage data processing method of data
CN109743317A (en) One kind being based on the self-destructed cloud storage data download method of data
US8966283B1 (en) Systems and methods for live migration of a data store to encrypted form
Omran et al. Facilitating secure query processing on encrypted databases on the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190426