CN109684874A - One kind being based on the self-destructed cloud storage data uploading method of data - Google Patents
One kind being based on the self-destructed cloud storage data uploading method of data Download PDFInfo
- Publication number
- CN109684874A CN109684874A CN201811646451.7A CN201811646451A CN109684874A CN 109684874 A CN109684874 A CN 109684874A CN 201811646451 A CN201811646451 A CN 201811646451A CN 109684874 A CN109684874 A CN 109684874A
- Authority
- CN
- China
- Prior art keywords
- data
- storage
- key
- self
- equal portions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses one kind, this method comprises: S1 is encrypted using the former data of given key pair storage to be uploaded, to obtain cryptograph files for data object to be uploaded to and is stored in data Cloud Server based on the self-destructed cloud storage data uploading method of data;S2 is split the key, generates n equal portions, wherein the value of n is specified by security strategy;S3 randomly selects k equal part composition data object M [1, k] from above-mentioned n equal portions, and wherein k is storage interstitial content, and establishes connection with each memory node respectively;S4 creates storage object in memory node, wherein including life span in the attribute of the storage object, wherein by the write-in of corresponding equal portions key data;S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload the encryption file that this has key metadata information if successful connection, complete to upload storage.
Description
Technical field
The invention belongs to technical field of computer data storage, and in particular to one kind is based on the self-destructed cloud storage data of data
Method for uploading.
Background technique
It includes following several types that traditional data, which destroys technology according to the different form of operating method: based on file system
Data deletion, data cover and the other destruction of physical level.Wherein, the data based on file system are deleted according to operation granularity not
It is deleted and device format with file is divided into.File deletion is that a kind of most direct data delete mode, it utilizes file system
The method of offer explicitly deletes file or data, realizes that file deletion is all that only deletion file is corresponding in mainstream file system
Index, without carrying out delete operation to the corresponding disk sector of file data;Device format is provided using file system
Formatting Facility or third-party disk management tool disk partition is formatted, what is at this moment deleted is on entire subregion
File, most of Formatting Facilities are all that entire subregion is made to become all available using the sector auxiliary information for rebuilding disk partition.
Therefore this data based on file system are deleted there is no data are veritably deleted, can be by big portion by some technological means
The corresponding data retrieving of single cent part, this is also a kind of means that data restore usually used.The other destruction of physical level is divided into again:
(1) demagnetization method destroys the magnetic texure of magnetic storage device, so that magnetic storage be made to set by the magnetic field that Deperming Facility generates
Achieve the purpose that destroy data for unavailable;(2) chemical corrosion method is internally integrated chemistry pin module in magnetic storage device,
By certain technological means (such as GPS positioning) judge store equipment it is whether out of control, if it is out of control chemical destruction module from
Dynamic release corrosivity medicament corrosion magnetic storage device keeps its unavailable;(3) physics damage, i.e., by direct physical means come
Strength destroys storage equipment.
Data cover is using the storage reused data recording performance of equipment, and use is irregular, meaningless
Sector where data cover file to be deleted or data, basic thought are the storage principles for magnetic medium, use random number
According to the data originally stored on magnetic medium are covered repeatedly, achieve the purpose that clear data.So far, data erasing is most to pacify
Entirely, the method for most economical destruction data.Data cover covers specified data field using meaningless information predetermined
Domain legacy data, in order to evade magnetic signal leak data historical rudiment certain probability, behaviour can be write by multi-fold
Make to reduce risk.
With the development of internet technology and mobile Internet it is universal, daily life more depends strongly on
In computer technology and Internet technology, at the same time, the risk that the privacy of user is invaded is higher and higher.On the one hand, existing rank
The computer system or network of section inevitably cache, replicate or file respective counts during processing, transmission, storing data
It is inevitable intermediate product according to, these copies, but user is not intended to that there are these copies, because these intermediate products are unknowable
Be also it is uncontrollable;On the other hand, user privacy information as the carelessness of service provider, the invasion of hacker or
Some lawful means and be leaked.
Data self-destruction technology is a kind of safety and secret protection scheme for typically utilizing data cover principle, such as
Vanish data destruct system, wherein encrypted data can be used in user, then stores data in cloud system, close
Key can be automatically deleted according to the time, and data are accessible before deletion, but data can not just access after key deletion, thus
Realize information content self-destruction system.But with the not only raising of security challenge, cryptographic key existence in Vanish data destruct system
Time is uncontrollable so that this self-destruction scheme still has biggish deficiency.
Summary of the invention
For the disadvantages described above of the prior art, the present invention proposes a kind of based on data self-destructed cloud storage data upload side
Method carries out the equal portions segmentation of data key, for so that key equal portions pair by uploading the crucial processing in storage to data
The object answered is able to carry out self-destruction method, with the life spans of key equal portions is set by policy object to execute automatically with
Associated self-destruction method, to realize highly effective and safe and stable data self-destruction.
To achieve the above object, the specific technical solution that the present invention uses is as follows:
One kind being based on the self-destructed cloud storage data uploading method of data, for uploading data object and being stored in data cloud
Server, this method specifically comprise the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates N number of equal portions, and wherein the value of N is specified by security strategy;
S3 randomly selects K equal part composition data object M [1, k] from above-mentioned N number of equal portions, and wherein K is storage interstitial content,
And connection is established with each memory node respectively;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be right
The equal portions key data write-in answered is wherein;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload if successful connection
This has the encryption file of key metadata information, completes to upload storage.
As a further improvement of the present invention, directly clear after establishing connection failure with data-storage system server in S6
Except the storage object of creation.
As a further improvement of the present invention, the key is split in S2 and is achieved by the steps of, comprising: is first
First, it generates integer array a [k] and is used as coefficient, and enable the value of a [0] for the value of integer corresponding to original cipher key S;Secondly, generating k-1
There are in a [1 ... k] for random number;Then j=1 is taken, 2, n constructs n yj=f (j) equation;Finally, wherein (1 f (j)
≤ j≤n) be n equal portions after primary key segmentation integer value, times take wherein k equal portions can construct primary key S.
As a further improvement of the present invention, the life span attribute value of the storage object in the memory node passes through fixed
When device timing update, and when value is 0, trigger data self-destruction is acted, that is, calls the pre-stored data erasing side being associated
Method carries out data safety deletion.
As a further improvement of the present invention, the data self-destruction movement is specially to use data overwrite method safety deleting
Corresponding data, specifically:
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random number
According to;
4) storage object is removed by remove_object method.
It is of the invention based on the self-destructed cloud storage data uploading method of data, for security challenge existing for Vanish system
And the uncontrollable drawback of key lifetime, make the corresponding object of key equal portions be able to carry out self-destruction side by method object
Method, is arranged the life spans of key equal portions by policy object to execute self-destruction method associated with it automatically, the present invention
Method can be realized data self-destruction in the case where generating little effect to system by test and comparison, data self-destruction process,
And the life span of key is user controllable, to greatly solve defect existing for current Vanish system.
Detailed description of the invention
Fig. 1 is the data uploading method flow chart of the embodiment of the present invention;
Fig. 2 is the data handling procedure schematic diagram before cipher key destruction;
Fig. 3 is the block architecture diagram using the object-based storage system of the method for the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Firstly, it is of the invention for ease of understanding, first technical term involved in this programme is defined and is explained.
Object storage: object is the basic unit of object storage device (OSD) processing, by unique ID identifier come area
Point.Each object is a series of set of orderly bytes, including data and attribute.Object in OSD is divided into root object (Root
Object), zone object (Partition Object), collection object (Collection Object) and user object (User
Object).Wherein, root object is corresponding with OSD, and each OSD only includes a root object, and is created in OSD initialization,
The attribute description of root object global property relevant to storage equipment, including total capacity, maximum object count and with data complete
Whole property related attribute (such as OSD is realized as RAID, and the rank of RAID is described).Zone object includes one group of user couple
As these user objects possess common attribute, and the data field of zone object is containing only user object ID list, the category of zone object
Property includes the user object number in subregion, user object the space occupied etc. in subregion.Collection object is for realizing user couple
The quick-searching of elephant, a zone object may include zero or more collection object, and a user object may belong to zero
Or multiple collection objects.The object that user object directly uses when accounting for the overwhelming majority and user in OSD using OSD, user
Data storage and management is realized by user object.
Thus object memory interface used in object storage system overcomes the defect of block interface and file interface, makes
Object storage system safety, data sharing, scalability and in terms of can The Gift of Being the Best You Can Be compromise.Object interface is visited
The basic unit asked is object, and object also includes the attribute of energy description object feature other than comprising user data.By with
Object properties information is transmitted between family and equipment, object interface has more abundant semantic meaning representation ability than other interfaces.
With the development of memory technology, the equipment stored in equipment has more and more processing capacities, upper layer application
Partial function can move to equipment (i.e. " Initiative Inventory Management " --- by storage device processes upper-layer functionality).For traditional Initiative Inventory Management
Relevant issues and object storage characteristic, propose object-based active in object storage and Initiative Inventory Management on the basis of
Storage system (OBASS), object-based Initiative Inventory Management system enable Initiative Inventory Management special using the autonomous management object of OSD
Property, realize complicated management function, object can be understood by attribute by moving to the functional module on OSD, it is not necessary to rely on extraneous
Intervention, and OSD can realize autonomous object handles according to the attribute of object.By means of the powerful place integrated in OSD equipment
Reason ability and its object interface for being rich in expressiveness having realize Initiative Inventory Management with can be convenient.
The embodiment of the present invention based on the self-destructed cloud storage data uploading method of data is used to that data object to be uploaded and be deposited
It is stored in data Cloud Server, this method specifically comprises the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates N number of equal portions, and wherein the value of N is specified by security strategy;
S3 randomly selects K equal part composition data object M [1, k] from above-mentioned N number of equal portions, and wherein K is storage interstitial content,
And connection is established with each memory node respectively;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be right
The equal portions key data write-in answered wherein (just has the metamessage of the key equal portions data) at this time on meta data server;If having
The ASO created is just removed in any one connection failure, and upload is marked to fail, and terminates upload procedure;If all connections are all
It is successful then turn in next step;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload if successful connection
This has the encryption file of key metadata information, completes to upload storage.It marks upload to fail if connection failure, terminates to upload
Process.
Preferably, creation can directly be removed after establishing connection failure with data-storage system server in step S6
The storage object.
It is achieved by the steps of it is highly preferred that being split in S2 to the key, comprising: firstly, generating integer number
Group a [k] is used as coefficient, and enables the value of a [0] for the value of integer corresponding to original cipher key S;Secondly, generating k-1 random number, there are a
In [1 ... k];Then j=1 is taken, 2, n constructs n yj=f (j) equation;Finally, wherein f (j) (1≤j≤n) is
The integer value of n equal portions after primary key segmentation, times take wherein k equal portions can construct primary key S.
Specifically, key is split can be realized by ShamirSecretSharing algorithm.
ShamirSecretSharing algorithm is a kind of key distribution algorithm, specifically: assuming that using (k, n) threshold mechanism to divide
Send out key S, that is, divide the key into n different equal portions, times take wherein k equal portions can recombinate to obtain key S.The coefficient number used
Group is a [1 ... k].Known any k value can construct primary key S, it is known that when key equal portions are less than k, can not construct original
Beginning key.The realization process of ShamirSecretSharing algorithm is: firstly, generating an integer array a [k] is used as coefficient.
It enables the value of a [0] be the value of integer corresponding to original cipher key S, while generating k-1 random number there are in a [1 ... k];J=1 is taken,
2, n constructs n yj=f (j) equation.So f (j) (1≤j≤n) is n equal portions after primary key segmentation
Integer value, appoint take wherein k equal portions can construct primary key S.
Further, in this embodiment the life span attribute value of the storage object in memory node passes through timer timing
It updates, and when value is 0, trigger data self-destruction is acted, that is, the pre-stored data method for deleting being associated is called to be counted
According to safety deleting.
On the whole, the present invention realizes the data based on Initiative Inventory Management framework by the application of following key technology
Destruct system: 1) object memory mechanism and interface, and the method that Initiative Inventory Management technology is realized based on this;Pass through distributed objects
Memory interface carrys out storage and management key equal portions, and the self-destroying function of key equal portions is realized by Initiative Inventory Management technology;2) data are wiped
Except related algorithm, algorithm is wiped using relevant data to realize that the safety of key equal portions is destroyed;3) the related of key distribution is calculated
Method distributes key into distributed objects storage system for client (user) using Shamir algorithm as core.
In order to cooperate the distribution of key with share, meta data server fulfiling management file metadata function except, need
Carry out user management, rights management, server admin, session management etc..Storage object adds the lifetime with respect to user object
Attribute (TimeToLive, TTL), the value of ordinary user's object attribute are default value --- " infinity ", i.e., no life
Time limit system removes non-display execution delete operation, and otherwise the object will not be deleted;The lifetime attribute value of Initiative Inventory Management object is
One finite value is used for the self-destructed movement of trigger data.
It include two core components:<key, value>storage subsystem 330 and ASO subsystem 320 in memory node.<
Key, value > storage subsystem 330 are key with the ID of object, and the related data and attribute of object are as value.For pipe
The data and attribute of reason and the object in maintenance memory node: query object, positioning object are written and read, position object category
Property is written and read.ASO subsystem 320 is that the core of Initiative Inventory Management technology embodies, for handling user's Initiative Inventory Management service
Request, including data self-destruction policy object and the management of data self-destruction method object and the execution of method object.
Data self-destruction policy object is that the set of a series of conditions can be with countermeasure similar to the conditional expression in C language
Slightly object is judged, Boolean is returned.Data self-destruction policy object is the basis that data self-destruction method object executes automatically, can
Think the one or more strategy associations of each method object association, but a policy object can only be related to a method object
Connection.
Policy object is registered in OSD by OSD client by POLICY_REGISTE order, and OSD is by the strategy of creation
The ID of object returns to client.OSD client needs to provide the ID of a method object in registration policy object, and OSD exists
The mapping relations of meeting establishment strategy object and method object, OSD pass through referred to as strategy-method (Policy- when construction strategy object
Method) mapping table PM safeguards the mapping relations between these policy objects ID and method object ID.System uses timer
Method timing updates storage the ttl value of object, when ttl is kept to 0, i.e., triggering when expression formula (aso.getTTL ()==0) is true
Data self-destruction movement.Storage system is real-time update and the ttl value for tracking Initiative Inventory Management object, is needed when system starts, note
Volume starting timer approach (onTimer ()), this method can be executed periodically by the timer mechanism of system, should
The Initiative Inventory Management object of all registrations can be all traversed when method executes every time, and by decTime method come corresponding object of successively decreasing
Ttl value, when ttl value is kept to 0, the conditional expression return value of policy object is very to trigger data self-destruction method object
Execution.The timeout value of timer approach can determine according to the strategy of the application scenarios demand locating for system, such as 1
Second or 1 minute.
Method treatment process in the present embodiment, in data self-destruction method object are as follows:
1) storage object (user object) is obtained according to given parameters
2) judge whether object obtained is active storage object, if not directly return.The data self-destruction method
It is only applicable to Initiative Inventory Management object;
3) data overwrite method safety deleting corresponding data is used for Initiative Inventory Management object
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random number
According to;
4) storage object is removed by remove_object method.
When client by meta data server upload key equal portions and encryption file arrive memory node when, encryption file meeting
The form of view object uploads to some memory node, and key can be divided into K equal portions and be uploaded respectively in the form of Initiative Inventory Management object
To K memory node, and there are also life span ttl attributes for each key equal portions Initiative Inventory Management object, with ttl attribute corresponding
Memory node on create data self-destruction policy object, there are also data self-destruction method object, which is fixed.As ASO
System detection then (i.e. timer time arrives), will call data associated therewith to key aliquot A SO life span
Data method for deleting in self-destruction method object, then in<key, value>storage subsystem finds the object to be deleted, will be close
Key equal portions object security complete deletion, that used due to this system is all hard disk (HDD), therefore calls the existing number for HDD
According to erasing algorithm.
Claims (5)
1. one kind is based on the self-destructed cloud storage data uploading method of data, for data object to be uploaded to and is stored in data cloud clothes
Business device, this method specifically comprise the following steps:
S1 is encrypted using the former data of given key pair storage to be uploaded, obtains cryptograph files;
S2 is split the key, generates n equal portions, wherein the value of n is specified by security strategy;
S3 randomly selects k equal part composition data object M [1, k] from above-mentioned n equal portions, and wherein k is storage interstitial content, and point
Connection is not established with each memory node;
S4 creates storage object in memory node, wherein include life span in the attribute of the storage object, it will be corresponding
Equal portions key data is written wherein;
S5 obtains metadata information of the key data on memory node and is written into the head of file after encryption;
S6 and data-storage system server establish connection, and the interface of data-storage system is used to upload this band if successful connection
There is the encryption file of key metadata information, completes to upload storage.
2. it is according to claim 1 be based on the self-destructed cloud storage data uploading method of data, wherein in step S6 with number
The storage object of directly removing creation is established after connection failure according to storage system service device.
3. according to claim 1 or 2 be based on the self-destructed cloud storage data uploading method of data, wherein right in step S2
The key, which is split, to be achieved by the steps of, comprising:
Firstly, generating integer array a [k] is used as coefficient, and enable the value of a [0] for the value of integer corresponding to original cipher key S;
Secondly, generating k-1 random number, there are in a [1 ... k];
Then j=1 is taken, 2, n constructs n yj=f (j) equation, and j is equal portions serial number;
Finally, wherein f (j) (1≤j≤n) is the integer value of n equal portions after primary key segmentation, appoints and take wherein k equal portions
Primary key S can be constructed.
4. according to any one of claim 1 to 3 be based on the self-destructed cloud storage data uploading method of data, wherein institute
The life span attribute value for stating the storage object in memory node is updated by timer timing, and the trigger data when value is 0
Self-destruction movement calls the pre-stored data method for deleting being associated to carry out data safety deletion.
5. according to any one of claim 1 to 4 be based on the self-destructed cloud storage data uploading method of data, wherein institute
Stating data self-destruction movement is specially to use data overwrite method safety deleting corresponding data, specifically:
A) buffer area is filled with full 0 byte sequence, calls write_object method that data field is covered as full 0;
B) buffer area is filled with complete 1 byte sequence, calls write_object method that data field is covered as complete 1;
C) buffer area is filled with random bytes sequence, calls write_object method that data field is covered as random data;
4) storage object is removed by remove_object method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811646451.7A CN109684874A (en) | 2018-12-30 | 2018-12-30 | One kind being based on the self-destructed cloud storage data uploading method of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811646451.7A CN109684874A (en) | 2018-12-30 | 2018-12-30 | One kind being based on the self-destructed cloud storage data uploading method of data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109684874A true CN109684874A (en) | 2019-04-26 |
Family
ID=66191501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811646451.7A Pending CN109684874A (en) | 2018-12-30 | 2018-12-30 | One kind being based on the self-destructed cloud storage data uploading method of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684874A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112206529A (en) * | 2020-10-19 | 2021-01-12 | 珠海金山网络游戏科技有限公司 | Data processing method and device |
-
2018
- 2018-12-30 CN CN201811646451.7A patent/CN109684874A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112206529A (en) * | 2020-10-19 | 2021-01-12 | 珠海金山网络游戏科技有限公司 | Data processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | DivORAM: Towards a practical oblivious RAM with variable block size | |
US10129024B2 (en) | Encrypted file storage | |
Stefanov et al. | Multi-cloud oblivious storage | |
Williams et al. | Single round access privacy on outsourced storage | |
JP6426174B2 (en) | Data management of connected devices | |
EP2731046B1 (en) | Client computer for querying a database stored on a server via a network | |
KR101589849B1 (en) | Deletion of content in storage systems | |
US11271726B2 (en) | Key encryption methods, apparatuses, and systems | |
US11489660B2 (en) | Re-encrypting data on a hash chain | |
US7315859B2 (en) | Method and apparatus for management of encrypted data through role separation | |
KR102202473B1 (en) | Systems and methods for dynamic data storage | |
CN110413652B (en) | Big data privacy retrieval method based on edge calculation | |
JP2008250369A (en) | Management method of secrete data file, management system and proxy server therefor | |
US9262646B1 (en) | Systems and methods for managing web browser histories | |
US11188668B2 (en) | Method for accessing data in a secure manner | |
US20220374540A1 (en) | Field level encryption searchable database system | |
Wang et al. | Data Security Storage Model of the Internet of Things Based on Blockchain. | |
Ye et al. | TamForen: A tamper‐proof cloud forensic framework | |
CN109726591A (en) | One kind being based on the self-destructed cloud storage data system of data | |
WO2022010811A1 (en) | Secure data storage for anonymized contact tracing | |
CN109684874A (en) | One kind being based on the self-destructed cloud storage data uploading method of data | |
CN109726189A (en) | One kind being based on the self-destructed cloud storage data processing method of data | |
CN109743317A (en) | One kind being based on the self-destructed cloud storage data download method of data | |
US8966283B1 (en) | Systems and methods for live migration of a data store to encrypted form | |
Omran et al. | Facilitating secure query processing on encrypted databases on the cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190426 |