CN110502910A - A kind of cloud information storage system based on data encryption - Google Patents
A kind of cloud information storage system based on data encryption Download PDFInfo
- Publication number
- CN110502910A CN110502910A CN201910725908.1A CN201910725908A CN110502910A CN 110502910 A CN110502910 A CN 110502910A CN 201910725908 A CN201910725908 A CN 201910725908A CN 110502910 A CN110502910 A CN 110502910A
- Authority
- CN
- China
- Prior art keywords
- module
- storage
- information
- value
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The problem of present invention discloses a kind of cloud information storage system based on data encryption, the content for passing through accessible server after authorization for solving existing Cloud Server, leads to storage content leakage and safety bottom;Including MIM message input module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module, data acquisition module, backup analysis module, extraction module, key verification module, recovery module and user terminal;Figure conversion is carried out by the way that information will be stored, the figure encryption to storage information is realized, has ensured the safety of storage information;By that will store information progress figure conversion and distribute the problem of several graphics fragments carry out more Cloud Servers storages, avoid existing Cloud Server by the content of accessible server after authorization, storage content is caused to be revealed.
Description
Technical field
The present invention relates to cloud technical field of information storage more particularly to a kind of cloud information storages based on data encryption
System.
Background technique
Cloud storage refers to the storage part in cloud operation framework, from IaaS, the middle layer PaaS to top layer SaaS of bottom
It can be seen that its figure, wherein most being attached most importance to bottom storage data especially;Data storage object includes data flow in process
The information required to look up in the temporary file or process of middle generation;Data be recorded in a certain format computer-internal or
On exterior storage medium;However cloud storage can bring safety and privacy concern, the data for many public cloud services occur are let out
The generation of dew event;
In patent " CN106294878A a kind of novel cloud data encryption storage system " although realize to data into
Row backup avoids data degradation and multistage storage and amount of storage big;But existing deficiency is: it is encrypted after not converted to data,
Cloud server store data inside can be directly accessed by key, it is low to lead the safety deposited in storage system.
Summary of the invention
The cloud information storage system based on data encryption that the purpose of the present invention is to provide a kind of;By the way that information will be stored
Figure conversion is carried out, the figure encryption to storage information is realized, has ensured the safety of storage information;By the way that information will be stored
Carry out figure conversion and distribute several graphics fragments to carry out more Cloud Server storages.
The technical problems to be solved by the invention are as follows:
(1) how the information of user's storage is converted into natural number identification code, then by natural number identification code according to depositing
Storage grade and storage time are converted into transform graphical, and obtain transform graphical again to transform graphical addition interference factor, and right
Again transform graphical be segmented and is allocated storage according to the preferential storage value of Cloud Server, solves existing cloud service
The problem of device passes through the content of accessible server after authorization, leads to storage content leakage and safety bottom;
The purpose of the present invention can be achieved through the following technical solutions: a kind of cloud information storage system based on data encryption
System, including MIM message input module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage mould
Block, assignment storage module, data acquisition module, backup analysis module, extraction module, key verification module, recovery module and use
Family terminal;
The MIM message input module inputs information, storage level and storage time to be stored for user;The information is defeated
Enter information to be stored, storage level and storage time that module inputs user and is sent to matching conversion module;The matching turns
Mold changing block is used to information to be stored being converted into graphical information, the specific steps are as follows:
Step 1: by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number
Identification code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will be wait deposit
The sequence set C={ Ai ... ..., An } that storage information is successively made of the natural number identification code converted obtains band storage information and turns
The identification code set C changed into;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are pre-
If proportionality coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transition diagram
Shape is denoted as Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2
Expression transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is
Circle has 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj
It carries out matching and obtains corresponding transform graphical Zj;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and
Random to generate interference factor, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor
To transform graphical again;And it is denoted as CZj;It is embodied in, when transform graphical is Z1, then natural number identification code Ai is converted into line
It is equal with the value of Ai that section and the length of line segment add interference factor;When transform graphical be Z2 when, then Ai be converted into arcuate line segment and
The value of Ai is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It obtains
Identify figure BT;
Step 7: using formula f=μ * (D*h1+T*h2) acquire mark figure BT number of fragments f, wherein h1,
H2 and μ is preset ratio coefficient fixed value;μ value is positive integer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ...,
f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;Simultaneously
It generates conversion extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key for extraction code is converted
Authentication module is stored;Convert extraction code by storage level, storage time, graphic attribute, interference factor and number of fragments with
And ten random positive integers are constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10It is just whole at random
Number;
The cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;The number
It is used to acquire the number of Cloud Server, the position of free memory and server and user according to acquisition module and inputs letter to be stored
The position of breath, storage level and storage time;The information of acquisition is sent to assignment storage module by the data acquisition module;Institute
Distribution module is stated to be used for every segment figure BTkDistribution to several Cloud Servers store.
Preferably, the distribution module is by every segment figure BTkThe specific steps that distribution to several Cloud Servers store are such as
Under:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory note of Cloud Server Mi
For NMi;The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs information to be stored, storage level and storage time
Remember GS in position;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between it is poor and be labeled as
GL;
S3: formula is utilizedAcquire the preferential storage value of Cloud Server Mi
YMi;Wherein, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;It will choosing
Middle Cloud Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every section
Figure BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in and preferentially deposits
In the most preceding corresponding Cloud Server of Stored Value;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTk
BT is stored and then has successively stored2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose
Server number is sent to assignment storage module.
Preferably, the assignment storage module is for storing every segment figure BTkWith backup figure QBTkChoosing Cloud Server
In position and its choose server to number and generate the instruction of corresponding unique identification;Unique identification instruct several zero to nine
Natural number is constituted;Unique identification instruction is denoted as R1R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine
Natural number;Assignment storage module stores unique identification instruction sending value key verification module.
Preferably, the key verification module receives conversion extraction code and unique identification instructs and generates public key and private key
It stores and sends and shown on user terminal;User terminal by input private key be sent to key verification module and and public key into
Row verifying, after being proved to be successful, key verification module sends the corresponding conversion extraction code of public key and private key and unique identification instruction
Conversion memory modules and assignment storage module;Corresponding natural number identification code and conversion extraction code are sent to by conversion memory modules
Recovery module;Assignment storage module obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing cloud service
It storage location in device and chooses server to number and sends it to extraction module;Extraction module is according to choosing in Cloud Server
Storage location with choose the corresponding every segment figure BT of server number extractionkOr backup figure QBTkAnd send recovery module;Also
Former module is according to every segment figure BTkOr backup figure QBTkIt is restored to mark figure BT or backup mark figure QBT, is then restored
Module will identify figure BT or backup mark figure QBT is restored to transform graphical again, and transform graphical is according to interference factor again
It is restored to transform graphical BT, transform graphical BT is restored to identification code set C according to graphic attribute, then according to identification code set C
Internal natural number identification code Ai is reduced into the corresponding text of information to be stored, symbol and number, recovery module by reduction to
Storage information, which is sent to the user terminal, to be shown;User terminal includes mobile phone, computer or tablet computer.
Preferably, the backup analysis module is for calculating every segment figure BTkBackup coefficient Q;It is specific to calculate step such as
Under:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are pre-
If proportionality coefficient fixed value;QB is backup threshold value;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
Beneficial effects of the present invention:
(1) of the invention by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding nature
Number identification code is matched, and is obtained the identification code set being converted into storage information, is acquired graphic attribute using formula;Root
It is matched according to the transform graphical stored in graphic attribute and conversion memory modules;Graphic attribute is corresponding with matching acquisition is carried out
Transform graphical;Natural number identification code in identification code set is converted with the transform graphical being matched to, and is generated at random
Interference factor is combined by graphic attribute and interference factor and obtains transform graphical again;It will be weighed according to the sequence of identification code set
New transform graphical is sequentially connected, and obtains mark figure;Figure conversion is carried out by the way that information will be stored, is realized to storage information
Figure encryption has ensured the safety of storage information;
(2) present invention acquires the number of fragments of mark figure using formula, and mark figure is successively cut in sequence
It is segmented into section, every segment figure is sent to distribution module and backup analysis module by information uploading module;Conversion is generated simultaneously to mention
Code fetch is simultaneously sent to conversion memory modules and is stored;Conversion memory modules will convert extraction code be sent to key verification module into
Row storage;Every segment figure is distributed by the preferred value of Cloud Server to several Cloud Servers and is stored by distribution module;Passing through will
It stores information progress figure conversion and distributes several graphics fragments and carry out more Cloud Servers storages, avoid existing cloud service
The problem of device passes through the content of accessible server after authorization, and storage content is caused to be revealed.
Detailed description of the invention
The present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of functional block diagram of the cloud information storage system based on data encryption of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is a kind of cloud information storage system based on data encryption, including information input
Module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module,
Data acquisition module, backup analysis module, extraction module, key verification module, recovery module and user terminal;
MIM message input module inputs information, storage level and storage time to be stored for user;Information to be stored is text
The set constituted according to corresponding sequence that word, symbol and number are constituted;The letter to be stored that MIM message input module inputs user
Breath, storage level and storage time are sent to matching conversion module;Matching conversion module is used to information to be stored being converted into figure
Shape information, the specific steps are as follows:
Step 1: by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number
Identification code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will be wait deposit
The sequence set C={ Ai ... ..., An } that storage information is successively made of the natural number identification code converted obtains band storage information and turns
The identification code set C changed into;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are pre-
If proportionality coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;When W value (0,1] model
In enclosing, then value is 1, when the value of W is in (1,2) range, value 1, when W value [2,3) in range, value 2 works as W
Value [2,3) in range, value 2, when W value [3,4) in range, value 3 can be obtained when by formula, storage etc.
Grade is bigger, and graphic attribute is more, indicates that the figure of conversion is more complicated, and more difficult to cracking for figure, corresponding safety is higher,
Storage time is longer, and graphic attribute is more;When the positive integer that the value of W can be 4,5 or more with value, the value of W is bigger, indicates
Storage level is bigger;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transition diagram
Shape is denoted as Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2
Expression transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is
Circle has 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj
It carries out matching and obtains corresponding transform graphical Zj;The graphic attribute of transform graphical further includes 4 graphic attributes or more;Specific table
It is existing are as follows: to choose natural number identification code A10 and be equal to 10, when graphic attribute is 1, then the transform graphical being converted into is that length is 10
Line segment;In figure conversion, natural number identification code A10 is directly obtained by the length 10 of line segment;When graphic attribute is 2, turn
The transform graphical changed into is that arc length is 5 π, and the arcuate line segment that radius is 5, then the arc length of arcuate line segment and radius pass through mathematical operation
Keep it equal with 10, if radius is 5, arc length is 5 π;Then utilize formula10 are calculated, wherein Lh is arc length, and r is half
Diameter;When graphic attribute is 3, transform graphical is the circle that radius is 5, utilizes formulaIt is calculated 10;Sm is the face of circle
Product, Lz is perimeter, and r is radius;When graphic attribute 4, then transform graphical is the figure with 4 attributes;And so on;Pass through figure
The calculating of shape attribute is corresponding with natural number identification code, to be judged;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and
Random to generate interference factor, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor
To transform graphical again;And it is denoted as CZj;It is embodied in, when transform graphical is Z1, then natural number identification code Ai is converted into line
It is equal with the value of Ai that section and the length of line segment add interference factor;When transform graphical be Z2 when, then Ai be converted into arcuate line segment and
The value of Ai is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It obtains
Identify figure BT;
Step 7: using formula f=μ * (D*h1+T*h2) acquire mark figure BT number of fragments f, wherein h1,
H2 and μ is preset ratio coefficient fixed value;μ value is positive integer;It can be obtained by formula, storage level is bigger, number of fragments
More, storage time is longer, and number of fragments is more, and the Cloud Server position of storage is more, and storage information is safer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ...,
f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;Simultaneously
It generates conversion extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key for extraction code is converted
Authentication module is stored;Convert extraction code by storage level, storage time, graphic attribute, interference factor and number of fragments with
And ten random positive integers are constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10It is just whole at random
Number;
Cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;Data acquisition module
Block inputs information to be stored, storage etc. for acquiring the number of Cloud Server, the position of free memory and server and user
The position of grade and storage time;The information of acquisition is sent to assignment storage module by data acquisition module;Distribution module is used for will
Every segment figure BTkDistribution to several Cloud Servers store.
Distribution module is by every segment figure BTkTo several Cloud Server storages, specific step is as follows for distribution:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory note of Cloud Server Mi
For NMi;The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs information to be stored, storage level and storage time
Remember GS in position;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between it is poor and be labeled as
GL;
S3: formula is utilizedAcquire the preferential storage value of Cloud Server Mi
YMi;Wherein, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;It can be obtained by formula, Cloud Server is defeated with user
Enter information to be stored the distance between smaller, the preferential storage value Y of Cloud Server MiMiIt is bigger, more preferentially stored;Cloud clothes
The corresponding free memory of business device Mi is bigger, the preferential storage value Y of Cloud Server MiMiIt is bigger;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;It will choosing
Middle Cloud Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every section
Figure BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in and preferentially deposits
In the most preceding corresponding Cloud Server of Stored Value;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTk
BT is stored and then has successively stored2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose
Server number is sent to assignment storage module.
Assignment storage module is for storing every segment figure BTkWith backup figure QBTkChoose position in Cloud Server and
It is chosen server to number and generates corresponding unique identification instruction;Unique identification instructs several zero to nine natural number structures
At;Unique identification instruction is denoted as R1R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine natural number;
Assignment storage module stores unique identification instruction sending value key verification module.
Key verification module receives conversion extraction code and unique identification instructs and generate public key and private key is stored and sent
It is shown on user terminal;User terminal is sent to key verification module by input private key and is verified with public key, tests
After demonstrate,proving successfully, the corresponding conversion extraction code of public key and private key and unique identification instruction are sent conversion storage mould by key verification module
Block and assignment storage module;Corresponding natural number identification code and conversion extraction code are sent to recovery module by conversion memory modules;
Assignment storage module obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing depositing in Cloud Server
Storage space is set and is chosen server to number and sends it to extraction module;Extraction module is according to the storage position chosen in Cloud Server
Set every segment figure BT corresponding with server number extraction is chosenkOr backup figure QBTkAnd send recovery module;Recovery module root
According to every segment figure BTkOr backup figure QBTkIt is restored to mark figure BT or backup mark figure QBT, then recovery module will be marked
Know figure BT or backup mark figure QBT is restored to transform graphical again, transform graphical is restored to according to interference factor and turns again
Change figure BT, transform graphical BT is restored to identification code set C according to graphic attribute, then according to inside identification code set C from
So number identification code Ai are reduced into the corresponding text of information to be stored, symbol and number, and recovery module is by the information to be stored of reduction
It is sent to the user terminal and is shown;User terminal includes mobile phone, computer or tablet computer.
Backup analysis module is for calculating every segment figure BTkBackup coefficient Q;Steps are as follows for specific calculating:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are pre-
If proportionality coefficient fixed value;QB is backup threshold value;It can be obtained by formula, the corresponding byte of mark figure BT is smaller, backup coefficient
It is bigger, it backs up more;Storage time is longer, and backup coefficient is bigger;Storage level is higher, backs up more;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
The working principle of the invention: the text, symbol and the number that store in information to be stored and conversion memory modules is right
The natural number identification code answered is matched, and is obtained the identification code set C being converted into storage information, is utilized formulaAcquire graphic attribute W;Turned according to what is stored in graphic attribute W and conversion memory modules
Figure is changed to be matched;Graphic attribute W and Zj are subjected to the corresponding transform graphical Zj of matching acquisition;It will be in identification code set C
Natural number identification code Ai is converted with the transform graphical Zj being matched to, and generates interference factor at random, by graphic attribute and
Interference factor combines and obtains transform graphical again;It transform graphical CZj will be sequentially connected again according to the sequence of identification code set C,
Obtain mark figure BT;The number of fragments f that mark figure BT is acquired using formula f=μ * (D*h1+T*h2) is schemed mark
Shape BT is successively cut into f sections in sequence, by every segment figure BTkDistribution module and backup point are sent to by information uploading module
Analyse module;Conversion extraction code is generated simultaneously and is sent to conversion memory modules is stored;Conversion memory modules extract conversion
Code is sent to key verification module and is stored;Distribution module is by every segment figure BTkBy the preferred value of Cloud Server distribute to
Several Cloud Server storages;More clouds clothes are carried out by that will store information progress figure conversion and distribute several graphics fragments
Business device storage, avoids existing Cloud Server from passing through the content of accessible server after authorization.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple
Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention
Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.
Claims (5)
1. a kind of cloud information storage system based on data encryption, it is characterised in that: including MIM message input module, matching conversion
Module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module, data acquisition module,
Backup analysis module, extraction module, key verification module, recovery module and user terminal;
The MIM message input module inputs information, storage level and storage time to be stored for user;The information input mould
Information to be stored, storage level and the storage time that block inputs user are sent to matching conversion module;The matching modulus of conversion
Block is used to information to be stored being converted into graphical information, the specific steps are as follows:
Step 1: the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number are identified
Code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will letter be stored
The sequence set C={ Ai ... ..., An } being successively made of the natural number identification code converted is ceased, band storage information is obtained and is converted into
Identification code set C;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are default ratio
Example coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transform graphical note
For Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2 is indicated
Transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is circle,
With 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj progress
With the corresponding transform graphical Zj of acquisition;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and random
Interference factor is generated, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor and obtains weight
New transform graphical;And it is denoted as CZj;Be embodied in, when transform graphical be Z1 when, then natural number identification code Ai be converted into line segment and
The length of line segment is equal with the value of Ai plus interference factor;When transform graphical is Z2, then Ai is converted into arcuate line segment and Ai
Value is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It is identified
Figure BT;
Step 7: the number of fragments f of mark figure BT is acquired using formula f=μ * (D*h1+T*h2), wherein h1, h2 and μ
It is preset ratio coefficient fixed value;μ value is positive integer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ..., f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;It generates simultaneously
It converts extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key authentication for extraction code is converted
Module is stored;Extraction code is converted by storage level, storage time, graphic attribute, interference factor and number of fragments and ten
A random positive integer is constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10For random positive integer;
The cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;The data are adopted
Collection module inputs information to be stored for acquiring the number of Cloud Server, the position of free memory and server and user, deposits
Store up the position of grade and storage time;The information of acquisition is sent to assignment storage module by the data acquisition module;Described point
It is used for module by every segment figure BTkDistribution to several Cloud Servers store.
2. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described point
With module by every segment figure BTkTo several Cloud Server storages, specific step is as follows for distribution:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory of Cloud Server Mi is denoted as NMi;
The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs the position note of information to be stored, storage level and storage time
GS;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between difference and labeled as GL;
S3: formula is utilizedAcquire the preferential storage value Y of Cloud Server MiMi;Its
In, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;Cloud will be chosen
Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every segment figure
BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in preferential storage value
In most preceding corresponding Cloud Server;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTkStorage
It is complete and then successively store BT2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose service
Device number is sent to assignment storage module.
3. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described point
With memory module for storing every segment figure BTkWith backup figure QBTkIt is choosing position in Cloud Server and its is choosing service
Device numbers and generates corresponding unique identification instruction;Unique identification instructs several zero to nine natural numbers to constitute;Unique identification
Instruction is denoted as R1 R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine natural number;Distribution storage mould
Block stores unique identification instruction sending value key verification module.
4. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described close
Key authentication module receives conversion extraction code and unique identification instructs and generate public key and private key is stored and sent on user terminal
It is shown;User terminal is sent to key verification module by input private key and is verified with public key, close after being proved to be successful
Key authentication module is by the corresponding conversion extraction code of public key and private key and unique identification instruction sends conversion memory modules and distribution is deposited
Store up module;Corresponding natural number identification code and conversion extraction code are sent to recovery module by conversion memory modules;Distribution storage mould
Root tuber obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing storage location and choosing in Cloud Server
Middle server numbers and sends it to extraction module;Extraction module is according to the storage location chosen in Cloud Server and chooses clothes
Device number of being engaged in extracts corresponding every segment figure BTkOr backup figure QBTkAnd send recovery module;Recovery module is according to every segment figure
BTkOr backup figure QBTkBe restored to mark figure BT or backup mark figure QBT, then recovery module will identify figure BT or
Backup mark figure QBT is restored to transform graphical again, and transform graphical is restored to transform graphical BT according to interference factor again, turns
It changes figure BT and is restored to identification code set C according to graphic attribute, then according to the natural number identification code Ai inside identification code set C
It is reduced into the corresponding text of information to be stored, symbol and number, the information to be stored of reduction is sent to user's end by recovery module
End is shown;User terminal includes mobile phone, computer or tablet computer.
5. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described standby
Part analysis module is for calculating every segment figure BTkBackup coefficient Q;Steps are as follows for specific calculating:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are preset ratio
Coefficient fixed value;QB is backup threshold value;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910725908.1A CN110502910B (en) | 2019-08-07 | 2019-08-07 | Cloud information storage system based on data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910725908.1A CN110502910B (en) | 2019-08-07 | 2019-08-07 | Cloud information storage system based on data encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110502910A true CN110502910A (en) | 2019-11-26 |
CN110502910B CN110502910B (en) | 2021-03-30 |
Family
ID=68587073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910725908.1A Active CN110502910B (en) | 2019-08-07 | 2019-08-07 | Cloud information storage system based on data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502910B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110765478A (en) * | 2019-11-07 | 2020-02-07 | 广州深卓信息科技有限公司 | Big data information secure storage encryption system and method thereof |
CN111539115A (en) * | 2020-04-27 | 2020-08-14 | 湖南鲲鹏建筑劳务有限公司广州分公司 | Building management pipeline arrangement optimization system based on BIM |
CN112000977A (en) * | 2020-11-02 | 2020-11-27 | 浙江微能科技有限公司 | System for encrypting and keeping digital assets |
CN112561585A (en) * | 2020-12-16 | 2021-03-26 | 中国人寿保险股份有限公司 | Information service system and method based on graph |
CN112693360A (en) * | 2020-12-10 | 2021-04-23 | 重庆邮电大学移通学院 | Electric automobile electric quantity management method and related device |
CN114567434A (en) * | 2022-03-07 | 2022-05-31 | 亿咖通(湖北)技术有限公司 | Storage method of certificate and secret key and electronic equipment |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101183374A (en) * | 2007-10-17 | 2008-05-21 | 北京逍遥掌信息技术有限公司 | Mobile terminal apparatus electronic file memory structure and management techniques |
CN101958987A (en) * | 2009-07-14 | 2011-01-26 | 中国电信股份有限公司 | Method and system for dynamically converting telecommunications service data |
CN103379148A (en) * | 2012-04-19 | 2013-10-30 | 北京智慧风云科技有限公司 | Cloud calculator and method for processing files through cloud calculator |
CN103747279A (en) * | 2013-11-18 | 2014-04-23 | 南京邮电大学 | Cloud storage and sharing coded video encryption and access control strategy updating method |
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN104091129A (en) * | 2014-06-26 | 2014-10-08 | 腾讯科技(深圳)有限公司 | Data processing method and device |
US20150104166A1 (en) * | 2013-10-10 | 2015-04-16 | Nec Laboratories America, Inc. | Suurballe-based Cloud Service Embedding Procedure in Software-Defined Flexible-Grid Optical Transport Networks |
CN106294878A (en) * | 2016-08-30 | 2017-01-04 | 四川格锐乾图科技有限公司 | A kind of novel high in the clouds data encryption storage system |
CN106683053A (en) * | 2016-10-28 | 2017-05-17 | 陕西师范大学 | GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods |
CN108810140A (en) * | 2018-06-12 | 2018-11-13 | 湘潭大学 | Classification storage method based on dynamic threshold adjustment in cloud storage system |
CN110086789A (en) * | 2019-04-17 | 2019-08-02 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the medium of data transmission |
-
2019
- 2019-08-07 CN CN201910725908.1A patent/CN110502910B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101183374A (en) * | 2007-10-17 | 2008-05-21 | 北京逍遥掌信息技术有限公司 | Mobile terminal apparatus electronic file memory structure and management techniques |
CN101958987A (en) * | 2009-07-14 | 2011-01-26 | 中国电信股份有限公司 | Method and system for dynamically converting telecommunications service data |
CN103379148A (en) * | 2012-04-19 | 2013-10-30 | 北京智慧风云科技有限公司 | Cloud calculator and method for processing files through cloud calculator |
US20150104166A1 (en) * | 2013-10-10 | 2015-04-16 | Nec Laboratories America, Inc. | Suurballe-based Cloud Service Embedding Procedure in Software-Defined Flexible-Grid Optical Transport Networks |
CN103747279A (en) * | 2013-11-18 | 2014-04-23 | 南京邮电大学 | Cloud storage and sharing coded video encryption and access control strategy updating method |
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN104091129A (en) * | 2014-06-26 | 2014-10-08 | 腾讯科技(深圳)有限公司 | Data processing method and device |
CN106294878A (en) * | 2016-08-30 | 2017-01-04 | 四川格锐乾图科技有限公司 | A kind of novel high in the clouds data encryption storage system |
CN106683053A (en) * | 2016-10-28 | 2017-05-17 | 陕西师范大学 | GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods |
CN108810140A (en) * | 2018-06-12 | 2018-11-13 | 湘潭大学 | Classification storage method based on dynamic threshold adjustment in cloud storage system |
CN110086789A (en) * | 2019-04-17 | 2019-08-02 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the medium of data transmission |
Non-Patent Citations (1)
Title |
---|
员建厦: "基于云存储的三维数据组织管理", 《计算机与网络》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110765478A (en) * | 2019-11-07 | 2020-02-07 | 广州深卓信息科技有限公司 | Big data information secure storage encryption system and method thereof |
CN110765478B (en) * | 2019-11-07 | 2020-07-31 | 城云科技(中国)有限公司 | Big data information secure storage encryption system and method thereof |
CN111539115A (en) * | 2020-04-27 | 2020-08-14 | 湖南鲲鹏建筑劳务有限公司广州分公司 | Building management pipeline arrangement optimization system based on BIM |
CN111539115B (en) * | 2020-04-27 | 2023-04-18 | 广东鼎耀工程技术有限公司 | Building pipeline arrangement optimization system based on BIM |
CN112000977A (en) * | 2020-11-02 | 2020-11-27 | 浙江微能科技有限公司 | System for encrypting and keeping digital assets |
CN112000977B (en) * | 2020-11-02 | 2021-02-19 | 浙江微能科技有限公司 | System for encrypting and keeping digital assets |
CN112693360A (en) * | 2020-12-10 | 2021-04-23 | 重庆邮电大学移通学院 | Electric automobile electric quantity management method and related device |
CN112561585A (en) * | 2020-12-16 | 2021-03-26 | 中国人寿保险股份有限公司 | Information service system and method based on graph |
CN114567434A (en) * | 2022-03-07 | 2022-05-31 | 亿咖通(湖北)技术有限公司 | Storage method of certificate and secret key and electronic equipment |
CN114567434B (en) * | 2022-03-07 | 2023-08-11 | 亿咖通(湖北)技术有限公司 | Certificate and key storage method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110502910B (en) | 2021-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110502910A (en) | A kind of cloud information storage system based on data encryption | |
CN104462141B (en) | Method, system and the storage engines device of a kind of data storage and inquiry | |
CN106850187A (en) | A kind of privacy character information encrypted query method and system | |
CN115098888B (en) | Map data packet full-flow adaptive generation and encryption method, device and equipment | |
CN108121776A (en) | A kind of method for reading data and device | |
CN109389283A (en) | Automatically part method, apparatus, computer equipment and storage medium are sent | |
CN109951541A (en) | A kind of serial number generation method and server | |
CN106603605A (en) | Data transmission method and system | |
CN103425653A (en) | Method and system for realizing DICOM (digital imaging and communication in medicine) image quadratic search | |
CN107590157A (en) | A kind of date storage method, data query method and relevant device | |
CN104657481B (en) | A kind of method and device for storing, inquiring about data | |
CN109636553A (en) | Credential management method, apparatus, computer equipment and storage medium | |
CN109191104A (en) | A kind of information processing method and its equipment | |
CN108510235A (en) | Management system for hunter's industry | |
CN104007938A (en) | Key value generating method and device in storage network | |
CN110163750A (en) | A kind of electronic evidence certification and exchange method and system based on block chain | |
CN107391100B (en) | Configuration file generation method and device supporting multi-language bill | |
CN107707686A (en) | Equipment identification method and device | |
CN109614596A (en) | A kind of electronic note processing method, device and system | |
CN109542908B (en) | Data compression method, storage method, access method and system in key-value database | |
CN104601442B (en) | A kind of information updating method and device | |
CN114840634B (en) | Information storage method and device, electronic equipment and computer readable medium | |
CN102682057A (en) | Management method for generative paths of data files of Android application program | |
CN106549948A (en) | Telegram application of multimedia evidence collecting method under Android platform | |
CN102780714A (en) | Information management cloud system and method thereof for sharing information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |