CN110502910A - A kind of cloud information storage system based on data encryption - Google Patents

A kind of cloud information storage system based on data encryption Download PDF

Info

Publication number
CN110502910A
CN110502910A CN201910725908.1A CN201910725908A CN110502910A CN 110502910 A CN110502910 A CN 110502910A CN 201910725908 A CN201910725908 A CN 201910725908A CN 110502910 A CN110502910 A CN 110502910A
Authority
CN
China
Prior art keywords
module
storage
information
value
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910725908.1A
Other languages
Chinese (zh)
Other versions
CN110502910B (en
Inventor
陈海林
张蓬
赵绪龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhendao Information Technology (shanghai) Co Ltd
Original Assignee
Zhendao Information Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhendao Information Technology (shanghai) Co Ltd filed Critical Zhendao Information Technology (shanghai) Co Ltd
Priority to CN201910725908.1A priority Critical patent/CN110502910B/en
Publication of CN110502910A publication Critical patent/CN110502910A/en
Application granted granted Critical
Publication of CN110502910B publication Critical patent/CN110502910B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The problem of present invention discloses a kind of cloud information storage system based on data encryption, the content for passing through accessible server after authorization for solving existing Cloud Server, leads to storage content leakage and safety bottom;Including MIM message input module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module, data acquisition module, backup analysis module, extraction module, key verification module, recovery module and user terminal;Figure conversion is carried out by the way that information will be stored, the figure encryption to storage information is realized, has ensured the safety of storage information;By that will store information progress figure conversion and distribute the problem of several graphics fragments carry out more Cloud Servers storages, avoid existing Cloud Server by the content of accessible server after authorization, storage content is caused to be revealed.

Description

A kind of cloud information storage system based on data encryption
Technical field
The present invention relates to cloud technical field of information storage more particularly to a kind of cloud information storages based on data encryption System.
Background technique
Cloud storage refers to the storage part in cloud operation framework, from IaaS, the middle layer PaaS to top layer SaaS of bottom It can be seen that its figure, wherein most being attached most importance to bottom storage data especially;Data storage object includes data flow in process The information required to look up in the temporary file or process of middle generation;Data be recorded in a certain format computer-internal or On exterior storage medium;However cloud storage can bring safety and privacy concern, the data for many public cloud services occur are let out The generation of dew event;
In patent " CN106294878A a kind of novel cloud data encryption storage system " although realize to data into Row backup avoids data degradation and multistage storage and amount of storage big;But existing deficiency is: it is encrypted after not converted to data, Cloud server store data inside can be directly accessed by key, it is low to lead the safety deposited in storage system.
Summary of the invention
The cloud information storage system based on data encryption that the purpose of the present invention is to provide a kind of;By the way that information will be stored Figure conversion is carried out, the figure encryption to storage information is realized, has ensured the safety of storage information;By the way that information will be stored Carry out figure conversion and distribute several graphics fragments to carry out more Cloud Server storages.
The technical problems to be solved by the invention are as follows:
(1) how the information of user's storage is converted into natural number identification code, then by natural number identification code according to depositing Storage grade and storage time are converted into transform graphical, and obtain transform graphical again to transform graphical addition interference factor, and right Again transform graphical be segmented and is allocated storage according to the preferential storage value of Cloud Server, solves existing cloud service The problem of device passes through the content of accessible server after authorization, leads to storage content leakage and safety bottom;
The purpose of the present invention can be achieved through the following technical solutions: a kind of cloud information storage system based on data encryption System, including MIM message input module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage mould Block, assignment storage module, data acquisition module, backup analysis module, extraction module, key verification module, recovery module and use Family terminal;
The MIM message input module inputs information, storage level and storage time to be stored for user;The information is defeated Enter information to be stored, storage level and storage time that module inputs user and is sent to matching conversion module;The matching turns Mold changing block is used to information to be stored being converted into graphical information, the specific steps are as follows:
Step 1: by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number Identification code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will be wait deposit The sequence set C={ Ai ... ..., An } that storage information is successively made of the natural number identification code converted obtains band storage information and turns The identification code set C changed into;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are pre- If proportionality coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transition diagram Shape is denoted as Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2 Expression transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is Circle has 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj It carries out matching and obtains corresponding transform graphical Zj;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and Random to generate interference factor, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor To transform graphical again;And it is denoted as CZj;It is embodied in, when transform graphical is Z1, then natural number identification code Ai is converted into line It is equal with the value of Ai that section and the length of line segment add interference factor;When transform graphical be Z2 when, then Ai be converted into arcuate line segment and The value of Ai is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It obtains Identify figure BT;
Step 7: using formula f=μ * (D*h1+T*h2) acquire mark figure BT number of fragments f, wherein h1, H2 and μ is preset ratio coefficient fixed value;μ value is positive integer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ..., f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;Simultaneously It generates conversion extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key for extraction code is converted Authentication module is stored;Convert extraction code by storage level, storage time, graphic attribute, interference factor and number of fragments with And ten random positive integers are constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10It is just whole at random Number;
The cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;The number It is used to acquire the number of Cloud Server, the position of free memory and server and user according to acquisition module and inputs letter to be stored The position of breath, storage level and storage time;The information of acquisition is sent to assignment storage module by the data acquisition module;Institute Distribution module is stated to be used for every segment figure BTkDistribution to several Cloud Servers store.
Preferably, the distribution module is by every segment figure BTkThe specific steps that distribution to several Cloud Servers store are such as Under:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory note of Cloud Server Mi For NMi;The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs information to be stored, storage level and storage time Remember GS in position;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between it is poor and be labeled as GL;
S3: formula is utilizedAcquire the preferential storage value of Cloud Server Mi YMi;Wherein, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;It will choosing Middle Cloud Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every section Figure BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in and preferentially deposits In the most preceding corresponding Cloud Server of Stored Value;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTk BT is stored and then has successively stored2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose Server number is sent to assignment storage module.
Preferably, the assignment storage module is for storing every segment figure BTkWith backup figure QBTkChoosing Cloud Server In position and its choose server to number and generate the instruction of corresponding unique identification;Unique identification instruct several zero to nine Natural number is constituted;Unique identification instruction is denoted as R1R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine Natural number;Assignment storage module stores unique identification instruction sending value key verification module.
Preferably, the key verification module receives conversion extraction code and unique identification instructs and generates public key and private key It stores and sends and shown on user terminal;User terminal by input private key be sent to key verification module and and public key into Row verifying, after being proved to be successful, key verification module sends the corresponding conversion extraction code of public key and private key and unique identification instruction Conversion memory modules and assignment storage module;Corresponding natural number identification code and conversion extraction code are sent to by conversion memory modules Recovery module;Assignment storage module obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing cloud service It storage location in device and chooses server to number and sends it to extraction module;Extraction module is according to choosing in Cloud Server Storage location with choose the corresponding every segment figure BT of server number extractionkOr backup figure QBTkAnd send recovery module;Also Former module is according to every segment figure BTkOr backup figure QBTkIt is restored to mark figure BT or backup mark figure QBT, is then restored Module will identify figure BT or backup mark figure QBT is restored to transform graphical again, and transform graphical is according to interference factor again It is restored to transform graphical BT, transform graphical BT is restored to identification code set C according to graphic attribute, then according to identification code set C Internal natural number identification code Ai is reduced into the corresponding text of information to be stored, symbol and number, recovery module by reduction to Storage information, which is sent to the user terminal, to be shown;User terminal includes mobile phone, computer or tablet computer.
Preferably, the backup analysis module is for calculating every segment figure BTkBackup coefficient Q;It is specific to calculate step such as Under:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are pre- If proportionality coefficient fixed value;QB is backup threshold value;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
Beneficial effects of the present invention:
(1) of the invention by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding nature Number identification code is matched, and is obtained the identification code set being converted into storage information, is acquired graphic attribute using formula;Root It is matched according to the transform graphical stored in graphic attribute and conversion memory modules;Graphic attribute is corresponding with matching acquisition is carried out Transform graphical;Natural number identification code in identification code set is converted with the transform graphical being matched to, and is generated at random Interference factor is combined by graphic attribute and interference factor and obtains transform graphical again;It will be weighed according to the sequence of identification code set New transform graphical is sequentially connected, and obtains mark figure;Figure conversion is carried out by the way that information will be stored, is realized to storage information Figure encryption has ensured the safety of storage information;
(2) present invention acquires the number of fragments of mark figure using formula, and mark figure is successively cut in sequence It is segmented into section, every segment figure is sent to distribution module and backup analysis module by information uploading module;Conversion is generated simultaneously to mention Code fetch is simultaneously sent to conversion memory modules and is stored;Conversion memory modules will convert extraction code be sent to key verification module into Row storage;Every segment figure is distributed by the preferred value of Cloud Server to several Cloud Servers and is stored by distribution module;Passing through will It stores information progress figure conversion and distributes several graphics fragments and carry out more Cloud Servers storages, avoid existing cloud service The problem of device passes through the content of accessible server after authorization, and storage content is caused to be revealed.
Detailed description of the invention
The present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of functional block diagram of the cloud information storage system based on data encryption of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is a kind of cloud information storage system based on data encryption, including information input Module, matching conversion module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module, Data acquisition module, backup analysis module, extraction module, key verification module, recovery module and user terminal;
MIM message input module inputs information, storage level and storage time to be stored for user;Information to be stored is text The set constituted according to corresponding sequence that word, symbol and number are constituted;The letter to be stored that MIM message input module inputs user Breath, storage level and storage time are sent to matching conversion module;Matching conversion module is used to information to be stored being converted into figure Shape information, the specific steps are as follows:
Step 1: by the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number Identification code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will be wait deposit The sequence set C={ Ai ... ..., An } that storage information is successively made of the natural number identification code converted obtains band storage information and turns The identification code set C changed into;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are pre- If proportionality coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;When W value (0,1] model In enclosing, then value is 1, when the value of W is in (1,2) range, value 1, when W value [2,3) in range, value 2 works as W Value [2,3) in range, value 2, when W value [3,4) in range, value 3 can be obtained when by formula, storage etc. Grade is bigger, and graphic attribute is more, indicates that the figure of conversion is more complicated, and more difficult to cracking for figure, corresponding safety is higher, Storage time is longer, and graphic attribute is more;When the positive integer that the value of W can be 4,5 or more with value, the value of W is bigger, indicates Storage level is bigger;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transition diagram Shape is denoted as Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2 Expression transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is Circle has 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj It carries out matching and obtains corresponding transform graphical Zj;The graphic attribute of transform graphical further includes 4 graphic attributes or more;Specific table It is existing are as follows: to choose natural number identification code A10 and be equal to 10, when graphic attribute is 1, then the transform graphical being converted into is that length is 10 Line segment;In figure conversion, natural number identification code A10 is directly obtained by the length 10 of line segment;When graphic attribute is 2, turn The transform graphical changed into is that arc length is 5 π, and the arcuate line segment that radius is 5, then the arc length of arcuate line segment and radius pass through mathematical operation Keep it equal with 10, if radius is 5, arc length is 5 π;Then utilize formula10 are calculated, wherein Lh is arc length, and r is half Diameter;When graphic attribute is 3, transform graphical is the circle that radius is 5, utilizes formulaIt is calculated 10;Sm is the face of circle Product, Lz is perimeter, and r is radius;When graphic attribute 4, then transform graphical is the figure with 4 attributes;And so on;Pass through figure The calculating of shape attribute is corresponding with natural number identification code, to be judged;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and Random to generate interference factor, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor To transform graphical again;And it is denoted as CZj;It is embodied in, when transform graphical is Z1, then natural number identification code Ai is converted into line It is equal with the value of Ai that section and the length of line segment add interference factor;When transform graphical be Z2 when, then Ai be converted into arcuate line segment and The value of Ai is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It obtains Identify figure BT;
Step 7: using formula f=μ * (D*h1+T*h2) acquire mark figure BT number of fragments f, wherein h1, H2 and μ is preset ratio coefficient fixed value;μ value is positive integer;It can be obtained by formula, storage level is bigger, number of fragments More, storage time is longer, and number of fragments is more, and the Cloud Server position of storage is more, and storage information is safer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ..., f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;Simultaneously It generates conversion extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key for extraction code is converted Authentication module is stored;Convert extraction code by storage level, storage time, graphic attribute, interference factor and number of fragments with And ten random positive integers are constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10It is just whole at random Number;
Cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;Data acquisition module Block inputs information to be stored, storage etc. for acquiring the number of Cloud Server, the position of free memory and server and user The position of grade and storage time;The information of acquisition is sent to assignment storage module by data acquisition module;Distribution module is used for will Every segment figure BTkDistribution to several Cloud Servers store.
Distribution module is by every segment figure BTkTo several Cloud Server storages, specific step is as follows for distribution:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory note of Cloud Server Mi For NMi;The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs information to be stored, storage level and storage time Remember GS in position;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between it is poor and be labeled as GL;
S3: formula is utilizedAcquire the preferential storage value of Cloud Server Mi YMi;Wherein, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;It can be obtained by formula, Cloud Server is defeated with user Enter information to be stored the distance between smaller, the preferential storage value Y of Cloud Server MiMiIt is bigger, more preferentially stored;Cloud clothes The corresponding free memory of business device Mi is bigger, the preferential storage value Y of Cloud Server MiMiIt is bigger;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;It will choosing Middle Cloud Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every section Figure BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in and preferentially deposits In the most preceding corresponding Cloud Server of Stored Value;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTk BT is stored and then has successively stored2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose Server number is sent to assignment storage module.
Assignment storage module is for storing every segment figure BTkWith backup figure QBTkChoose position in Cloud Server and It is chosen server to number and generates corresponding unique identification instruction;Unique identification instructs several zero to nine natural number structures At;Unique identification instruction is denoted as R1R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine natural number; Assignment storage module stores unique identification instruction sending value key verification module.
Key verification module receives conversion extraction code and unique identification instructs and generate public key and private key is stored and sent It is shown on user terminal;User terminal is sent to key verification module by input private key and is verified with public key, tests After demonstrate,proving successfully, the corresponding conversion extraction code of public key and private key and unique identification instruction are sent conversion storage mould by key verification module Block and assignment storage module;Corresponding natural number identification code and conversion extraction code are sent to recovery module by conversion memory modules; Assignment storage module obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing depositing in Cloud Server Storage space is set and is chosen server to number and sends it to extraction module;Extraction module is according to the storage position chosen in Cloud Server Set every segment figure BT corresponding with server number extraction is chosenkOr backup figure QBTkAnd send recovery module;Recovery module root According to every segment figure BTkOr backup figure QBTkIt is restored to mark figure BT or backup mark figure QBT, then recovery module will be marked Know figure BT or backup mark figure QBT is restored to transform graphical again, transform graphical is restored to according to interference factor and turns again Change figure BT, transform graphical BT is restored to identification code set C according to graphic attribute, then according to inside identification code set C from So number identification code Ai are reduced into the corresponding text of information to be stored, symbol and number, and recovery module is by the information to be stored of reduction It is sent to the user terminal and is shown;User terminal includes mobile phone, computer or tablet computer.
Backup analysis module is for calculating every segment figure BTkBackup coefficient Q;Steps are as follows for specific calculating:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are pre- If proportionality coefficient fixed value;QB is backup threshold value;It can be obtained by formula, the corresponding byte of mark figure BT is smaller, backup coefficient It is bigger, it backs up more;Storage time is longer, and backup coefficient is bigger;Storage level is higher, backs up more;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
The working principle of the invention: the text, symbol and the number that store in information to be stored and conversion memory modules is right The natural number identification code answered is matched, and is obtained the identification code set C being converted into storage information, is utilized formulaAcquire graphic attribute W;Turned according to what is stored in graphic attribute W and conversion memory modules Figure is changed to be matched;Graphic attribute W and Zj are subjected to the corresponding transform graphical Zj of matching acquisition;It will be in identification code set C Natural number identification code Ai is converted with the transform graphical Zj being matched to, and generates interference factor at random, by graphic attribute and Interference factor combines and obtains transform graphical again;It transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, Obtain mark figure BT;The number of fragments f that mark figure BT is acquired using formula f=μ * (D*h1+T*h2) is schemed mark Shape BT is successively cut into f sections in sequence, by every segment figure BTkDistribution module and backup point are sent to by information uploading module Analyse module;Conversion extraction code is generated simultaneously and is sent to conversion memory modules is stored;Conversion memory modules extract conversion Code is sent to key verification module and is stored;Distribution module is by every segment figure BTkBy the preferred value of Cloud Server distribute to Several Cloud Server storages;More clouds clothes are carried out by that will store information progress figure conversion and distribute several graphics fragments Business device storage, avoids existing Cloud Server from passing through the content of accessible server after authorization.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (5)

1. a kind of cloud information storage system based on data encryption, it is characterised in that: including MIM message input module, matching conversion Module, information uploading module, conversion memory modules, distribution module, cloud storage module, assignment storage module, data acquisition module, Backup analysis module, extraction module, key verification module, recovery module and user terminal;
The MIM message input module inputs information, storage level and storage time to be stored for user;The information input mould Information to be stored, storage level and the storage time that block inputs user are sent to matching conversion module;The matching modulus of conversion Block is used to information to be stored being converted into graphical information, the specific steps are as follows:
Step 1: the text stored in information to be stored and conversion memory modules, symbol and digital corresponding natural number are identified Code is matched, and setting natural number identification code is denoted as Ai, i=1 ..., n;And A1=1, A2=2, Ai=i;It will letter be stored The sequence set C={ Ai ... ..., An } being successively made of the natural number identification code converted is ceased, band storage information is obtained and is converted into Identification code set C;
Step 2: setting storage level is denoted as D, and storage time is denoted as T;The unit of T is year;
Step 3: formula is utilizedAcquire graphic attribute W, wherein e1, e2 are default ratio Example coefficient fixed value;λ is modifying factor, value 0.3290342;The value of W is 1,2,3;
Step 4: it is matched according to the transform graphical stored in graphic attribute W and conversion memory modules;Set transform graphical note For Zj, j=1,2,3;Wherein, z1 indicates that transform graphical is line segment, has 1 graphic attribute, graphic attribute is length;Z2 is indicated Transform graphical is arcuate line segment, has 2 graphic attributes, and graphic attribute is arc length and radius;Z3 indicates that transform graphical is circle, With 3 graphic attributes, including perimeter, area and radius;The attribute of j expression transform graphical;By graphic attribute W and Zj progress With the corresponding transform graphical Zj of acquisition;
Step 5: the natural number identification code Ai in identification code set C is converted with the transform graphical Zj being matched to, and random Interference factor is generated, setting interference factor is denoted as ρ;Value is positive integer;It is combined by graphic attribute and interference factor and obtains weight New transform graphical;And it is denoted as CZj;Be embodied in, when transform graphical be Z1 when, then natural number identification code Ai be converted into line segment and The length of line segment is equal with the value of Ai plus interference factor;When transform graphical is Z2, then Ai is converted into arcuate line segment and Ai Value is calculated by arc length, radius and interference factor by the operation in mathematics;
Step 6: it transform graphical CZj will be sequentially connected again according to the sequence of identification code set C, i.e. Zj ... Zn;It is identified Figure BT;
Step 7: the number of fragments f of mark figure BT is acquired using formula f=μ * (D*h1+T*h2), wherein h1, h2 and μ It is preset ratio coefficient fixed value;μ value is positive integer;
Step 8: mark figure BT is successively cut into f sections in sequence, every segment figure is expressed as BTk;K=1 ..., f;
Step 9: by every segment figure BTkDistribution module and backup analysis module are sent to by information uploading module;It generates simultaneously It converts extraction code and is sent to conversion memory modules and stored;Conversion memory modules are sent to key authentication for extraction code is converted Module is stored;Extraction code is converted by storage level, storage time, graphic attribute, interference factor and number of fragments and ten A random positive integer is constituted;It converts extraction code and is labeled as DTW ρ fL1……L10;Wherein L1、……、L10For random positive integer;
The cloud storage module is stored for cloud information, and cloud storage module is made of several Cloud Servers;The data are adopted Collection module inputs information to be stored for acquiring the number of Cloud Server, the position of free memory and server and user, deposits Store up the position of grade and storage time;The information of acquisition is sent to assignment storage module by the data acquisition module;Described point It is used for module by every segment figure BTkDistribution to several Cloud Servers store.
2. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described point With module by every segment figure BTkTo several Cloud Server storages, specific step is as follows for distribution:
S1: several Cloud Servers of setting are labeled as Mi, i=1 ..., n;The corresponding free memory of Cloud Server Mi is denoted as NMi; The corresponding position Cloud Server Mi is denoted as GMi;Setting user inputs the position note of information to be stored, storage level and storage time GS;
S2: pass through GS and GMiCalculate Cloud Server and user input information to be stored the distance between difference and labeled as GL;
S3: formula is utilizedAcquire the preferential storage value Y of Cloud Server MiMi;Its In, v1, v2 are preset ratio coefficient, and the value of v1, v2 are all larger than one;
S4: setting storage threshold value is denoted as Yb;Work as YMiCloud Server Mi is then labeled as choosing Cloud Server by > Yb;Cloud will be chosen Server successively sorts according to preferential storage value is descending;
S5: and then the backup coefficient Q obtained;By every segment figure BTkQ parts of duplication is simultaneously labeled as backup figure QBTk;By every segment figure BTkWith backup figure QBTkAccording to choosing the sequence of Cloud Server successively to store;It is embodied in BT1It is stored in preferential storage value In most preceding corresponding Cloud Server;QBT1Preferential storage value is stored in take second place in corresponding Cloud Server;Backup figure QBTkStorage It is complete and then successively store BT2、QBT2;And so on;
S5: every segment figure BT is countedkWith backup figure QBTkChoose storage location in Cloud Server and by its with choose service Device number is sent to assignment storage module.
3. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described point With memory module for storing every segment figure BTkWith backup figure QBTkIt is choosing position in Cloud Server and its is choosing service Device numbers and generates corresponding unique identification instruction;Unique identification instructs several zero to nine natural numbers to constitute;Unique identification Instruction is denoted as R1 R2 ... Rn, wherein R1, R2 ..., the value range of Rn be zero to nine natural number;Distribution storage mould Block stores unique identification instruction sending value key verification module.
4. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described close Key authentication module receives conversion extraction code and unique identification instructs and generate public key and private key is stored and sent on user terminal It is shown;User terminal is sent to key verification module by input private key and is verified with public key, close after being proved to be successful Key authentication module is by the corresponding conversion extraction code of public key and private key and unique identification instruction sends conversion memory modules and distribution is deposited Store up module;Corresponding natural number identification code and conversion extraction code are sent to recovery module by conversion memory modules;Distribution storage mould Root tuber obtains every segment figure BT according to unique identification instructionkWith backup figure QBTkChoosing storage location and choosing in Cloud Server Middle server numbers and sends it to extraction module;Extraction module is according to the storage location chosen in Cloud Server and chooses clothes Device number of being engaged in extracts corresponding every segment figure BTkOr backup figure QBTkAnd send recovery module;Recovery module is according to every segment figure BTkOr backup figure QBTkBe restored to mark figure BT or backup mark figure QBT, then recovery module will identify figure BT or Backup mark figure QBT is restored to transform graphical again, and transform graphical is restored to transform graphical BT according to interference factor again, turns It changes figure BT and is restored to identification code set C according to graphic attribute, then according to the natural number identification code Ai inside identification code set C It is reduced into the corresponding text of information to be stored, symbol and number, the information to be stored of reduction is sent to user's end by recovery module End is shown;User terminal includes mobile phone, computer or tablet computer.
5. a kind of cloud information storage system based on data encryption according to claim 1, which is characterized in that described standby Part analysis module is for calculating every segment figure BTkBackup coefficient Q;Steps are as follows for specific calculating:
S1: statistics is carried out to mark figure BT and gets corresponding byte-sized and is denoted as Ub;
S2: formula is utilizedAcquire backup coefficient Q;Wherein x1, x2 and x3 are preset ratio Coefficient fixed value;QB is backup threshold value;
S3: when Q value is less than one, then without backup;When Q value is made of integer and decimal, then Q value value is integer.
CN201910725908.1A 2019-08-07 2019-08-07 Cloud information storage system based on data encryption Active CN110502910B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910725908.1A CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910725908.1A CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Publications (2)

Publication Number Publication Date
CN110502910A true CN110502910A (en) 2019-11-26
CN110502910B CN110502910B (en) 2021-03-30

Family

ID=68587073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910725908.1A Active CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Country Status (1)

Country Link
CN (1) CN110502910B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765478A (en) * 2019-11-07 2020-02-07 广州深卓信息科技有限公司 Big data information secure storage encryption system and method thereof
CN111539115A (en) * 2020-04-27 2020-08-14 湖南鲲鹏建筑劳务有限公司广州分公司 Building management pipeline arrangement optimization system based on BIM
CN112000977A (en) * 2020-11-02 2020-11-27 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112561585A (en) * 2020-12-16 2021-03-26 中国人寿保险股份有限公司 Information service system and method based on graph
CN112693360A (en) * 2020-12-10 2021-04-23 重庆邮电大学移通学院 Electric automobile electric quantity management method and related device
CN114567434A (en) * 2022-03-07 2022-05-31 亿咖通(湖北)技术有限公司 Storage method of certificate and secret key and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183374A (en) * 2007-10-17 2008-05-21 北京逍遥掌信息技术有限公司 Mobile terminal apparatus electronic file memory structure and management techniques
CN101958987A (en) * 2009-07-14 2011-01-26 中国电信股份有限公司 Method and system for dynamically converting telecommunications service data
CN103379148A (en) * 2012-04-19 2013-10-30 北京智慧风云科技有限公司 Cloud calculator and method for processing files through cloud calculator
CN103747279A (en) * 2013-11-18 2014-04-23 南京邮电大学 Cloud storage and sharing coded video encryption and access control strategy updating method
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN104091129A (en) * 2014-06-26 2014-10-08 腾讯科技(深圳)有限公司 Data processing method and device
US20150104166A1 (en) * 2013-10-10 2015-04-16 Nec Laboratories America, Inc. Suurballe-based Cloud Service Embedding Procedure in Software-Defined Flexible-Grid Optical Transport Networks
CN106294878A (en) * 2016-08-30 2017-01-04 四川格锐乾图科技有限公司 A kind of novel high in the clouds data encryption storage system
CN106683053A (en) * 2016-10-28 2017-05-17 陕西师范大学 GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
CN108810140A (en) * 2018-06-12 2018-11-13 湘潭大学 Classification storage method based on dynamic threshold adjustment in cloud storage system
CN110086789A (en) * 2019-04-17 2019-08-02 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the medium of data transmission

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183374A (en) * 2007-10-17 2008-05-21 北京逍遥掌信息技术有限公司 Mobile terminal apparatus electronic file memory structure and management techniques
CN101958987A (en) * 2009-07-14 2011-01-26 中国电信股份有限公司 Method and system for dynamically converting telecommunications service data
CN103379148A (en) * 2012-04-19 2013-10-30 北京智慧风云科技有限公司 Cloud calculator and method for processing files through cloud calculator
US20150104166A1 (en) * 2013-10-10 2015-04-16 Nec Laboratories America, Inc. Suurballe-based Cloud Service Embedding Procedure in Software-Defined Flexible-Grid Optical Transport Networks
CN103747279A (en) * 2013-11-18 2014-04-23 南京邮电大学 Cloud storage and sharing coded video encryption and access control strategy updating method
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN104091129A (en) * 2014-06-26 2014-10-08 腾讯科技(深圳)有限公司 Data processing method and device
CN106294878A (en) * 2016-08-30 2017-01-04 四川格锐乾图科技有限公司 A kind of novel high in the clouds data encryption storage system
CN106683053A (en) * 2016-10-28 2017-05-17 陕西师范大学 GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
CN108810140A (en) * 2018-06-12 2018-11-13 湘潭大学 Classification storage method based on dynamic threshold adjustment in cloud storage system
CN110086789A (en) * 2019-04-17 2019-08-02 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the medium of data transmission

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
员建厦: "基于云存储的三维数据组织管理", 《计算机与网络》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765478A (en) * 2019-11-07 2020-02-07 广州深卓信息科技有限公司 Big data information secure storage encryption system and method thereof
CN110765478B (en) * 2019-11-07 2020-07-31 城云科技(中国)有限公司 Big data information secure storage encryption system and method thereof
CN111539115A (en) * 2020-04-27 2020-08-14 湖南鲲鹏建筑劳务有限公司广州分公司 Building management pipeline arrangement optimization system based on BIM
CN111539115B (en) * 2020-04-27 2023-04-18 广东鼎耀工程技术有限公司 Building pipeline arrangement optimization system based on BIM
CN112000977A (en) * 2020-11-02 2020-11-27 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112000977B (en) * 2020-11-02 2021-02-19 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112693360A (en) * 2020-12-10 2021-04-23 重庆邮电大学移通学院 Electric automobile electric quantity management method and related device
CN112561585A (en) * 2020-12-16 2021-03-26 中国人寿保险股份有限公司 Information service system and method based on graph
CN114567434A (en) * 2022-03-07 2022-05-31 亿咖通(湖北)技术有限公司 Storage method of certificate and secret key and electronic equipment
CN114567434B (en) * 2022-03-07 2023-08-11 亿咖通(湖北)技术有限公司 Certificate and key storage method and electronic equipment

Also Published As

Publication number Publication date
CN110502910B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN110502910A (en) A kind of cloud information storage system based on data encryption
CN104462141B (en) Method, system and the storage engines device of a kind of data storage and inquiry
CN106850187A (en) A kind of privacy character information encrypted query method and system
CN115098888B (en) Map data packet full-flow adaptive generation and encryption method, device and equipment
CN108121776A (en) A kind of method for reading data and device
CN109389283A (en) Automatically part method, apparatus, computer equipment and storage medium are sent
CN109951541A (en) A kind of serial number generation method and server
CN106603605A (en) Data transmission method and system
CN103425653A (en) Method and system for realizing DICOM (digital imaging and communication in medicine) image quadratic search
CN107590157A (en) A kind of date storage method, data query method and relevant device
CN104657481B (en) A kind of method and device for storing, inquiring about data
CN109636553A (en) Credential management method, apparatus, computer equipment and storage medium
CN109191104A (en) A kind of information processing method and its equipment
CN108510235A (en) Management system for hunter&#39;s industry
CN104007938A (en) Key value generating method and device in storage network
CN110163750A (en) A kind of electronic evidence certification and exchange method and system based on block chain
CN107391100B (en) Configuration file generation method and device supporting multi-language bill
CN107707686A (en) Equipment identification method and device
CN109614596A (en) A kind of electronic note processing method, device and system
CN109542908B (en) Data compression method, storage method, access method and system in key-value database
CN104601442B (en) A kind of information updating method and device
CN114840634B (en) Information storage method and device, electronic equipment and computer readable medium
CN102682057A (en) Management method for generative paths of data files of Android application program
CN106549948A (en) Telegram application of multimedia evidence collecting method under Android platform
CN102780714A (en) Information management cloud system and method thereof for sharing information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant