CN110502910B - Cloud information storage system based on data encryption - Google Patents

Cloud information storage system based on data encryption Download PDF

Info

Publication number
CN110502910B
CN110502910B CN201910725908.1A CN201910725908A CN110502910B CN 110502910 B CN110502910 B CN 110502910B CN 201910725908 A CN201910725908 A CN 201910725908A CN 110502910 B CN110502910 B CN 110502910B
Authority
CN
China
Prior art keywords
module
storage
conversion
graph
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910725908.1A
Other languages
Chinese (zh)
Other versions
CN110502910A (en
Inventor
陈海林
张蓬
赵绪龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trueland Information Technology Shanghai Co ltd
Original Assignee
Trueland Information Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trueland Information Technology Shanghai Co ltd filed Critical Trueland Information Technology Shanghai Co ltd
Priority to CN201910725908.1A priority Critical patent/CN110502910B/en
Publication of CN110502910A publication Critical patent/CN110502910A/en
Application granted granted Critical
Publication of CN110502910B publication Critical patent/CN110502910B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a cloud information storage system based on data encryption, which is used for solving the problems that the existing cloud server can access the content of the server after authorization, so that the stored content is leaked and the safety is low; the system comprises an information input module, a matching conversion module, an information uploading module, a conversion storage module, a distribution module, a cloud storage module, a distribution storage module, a data acquisition module, a backup analysis module, an extraction module, a key verification module, a restoration module and a user terminal; the graph encryption of the stored information is realized by performing graph conversion on the stored information, and the safety of the stored information is guaranteed; by carrying out graph conversion on the stored information and distributing a plurality of graph fragments to store the stored information by a plurality of cloud servers, the problem that the stored content is leaked due to the fact that the existing cloud servers can access the content of the servers after authorization is avoided.

Description

Cloud information storage system based on data encryption
Technical Field
The invention relates to the technical field of cloud information storage, in particular to a cloud information storage system based on data encryption.
Background
The cloud storage refers to a storage part in a cloud computing architecture, and the body shadow can be seen from the IaaS at the bottom layer, the PaaS at the middle layer and the SaaS at the top layer, wherein the most important is the data stored at the bottom layer; the data storage object comprises a temporary file generated in the processing process of the data stream or information needing to be searched in the processing process; data is recorded in a certain format on a storage medium inside or outside the computer; however, the cloud storage brings safety and privacy problems, and a plurality of data leakage events of public cloud services occur;
although the patent "CN 106294878A is a novel cloud data encryption storage system", it realizes data backup to avoid data loss and large multi-level storage and storage capacity; but has the following disadvantages: the data is encrypted after being converted, the data stored in the cloud server can be directly accessed through the secret key, and the safety in the storage system is low.
Disclosure of Invention
The invention aims to provide a cloud information storage system based on data encryption; the graph encryption of the stored information is realized by performing graph conversion on the stored information, and the safety of the stored information is guaranteed; the storage information is subjected to graph conversion, and a plurality of graph fragments are distributed to be stored in a plurality of cloud servers.
The technical problem to be solved by the invention is as follows:
(1) how to convert information stored by a user into a natural number identification code, then converting the natural number identification code into a conversion graph according to the storage grade and the storage time, adding an interference factor to the conversion graph to obtain a re-conversion graph, segmenting the re-conversion graph, and distributing and storing the re-conversion graph according to a priority storage value of a cloud server, so that the problems that the existing cloud server can access the content of the server after authorization, the stored content is leaked, and the safety is low are solved;
the purpose of the invention can be realized by the following technical scheme: a cloud information storage system based on data encryption comprises an information input module, a matching conversion module, an information uploading module, a conversion storage module, a distribution module, a cloud storage module, a distribution storage module, a data acquisition module, a backup analysis module, an extraction module, a key verification module, a restoration module and a user terminal;
the information input module is used for inputting information to be stored, storage grade and storage time by a user; the information input module sends information to be stored, storage grade and storage time input by a user to the matching conversion module; the matching conversion module is used for converting the information to be stored into the graphic information, and comprises the following specific steps:
the method comprises the following steps: matching the information to be stored with a natural number identification code corresponding to characters, symbols and numbers stored in a conversion storage module, and setting the natural number identification code as Ai, wherein i is 1, … … and n; and a1 ═ 1, a2 ═ 2, Ai ═ i; sequentially forming a sequence set C (Ai, … …, An) by the converted natural number identification codes of the information to be stored to obtain An identification code set C converted from the stored information;
step two: setting a storage grade as D, and setting storage time as T; the unit of T is year;
step three: using formulas
Figure BDA0002158929130000021
Obtaining a graph attribute W, wherein e1 and e2 are preset proportionality coefficient fixed values; λ is a correction factor, and its value is 0.3290342; the value of W is 1,2 and 3;
step four: matching with a conversion graph stored in a conversion storage module according to the graph attribute W; setting a conversion pattern as Zj, wherein j is 1,2 and 3; wherein z1 represents that the converted graph is a line segment and has 1 graph attribute, and the graph attribute is a length; z2 represents the conversion graph is an arc line segment, and has 2 graph attributes, wherein the graph attributes are arc length and radius; z3 indicates that the transformed graph is a circle with 3 graph attributes including perimeter, area and radius; j represents the attribute of the conversion graph; matching the graph attribute W with Zj to obtain a corresponding conversion graph Zj;
step five: converting the natural number identification codes Ai in the identification code set C by using the matched conversion graphs Zj, randomly generating interference factors, and setting the interference factors as rho; taking the value as a positive integer; obtaining a retransformed graph by combining the graph attribute and the interference factor; and noted as CZj; specifically, when the conversion graph is Z1, the natural number identification code Ai is converted into a line segment, and the length of the line segment plus the interference factor is equal to the value of Ai; when the conversion graph is Z2, Ai is converted into an arc line segment, and the value of Ai is obtained by calculating the arc length, the radius and the interference factor through the operation in mathematics;
step six: connecting the retransformation images CZj in sequence according to the sequence of the identification code set C, namely Zj … … Zn; obtaining an identification pattern BT;
step seven: obtaining the segmentation number f of the identification pattern BT by using a formula f ═ mu ═ h1+ T × h2, wherein h1, h2 and mu are all preset fixed proportionality coefficient values; mu is a positive integer;
step eight: cutting the identification pattern BT into f sections in sequence, wherein each section of pattern is represented as BTk;k=1、……、f;
Step nine: each segment of graphics BTkSent to the distribution module and the backup analysis module through the information uploading module(ii) a Meanwhile, generating a conversion extraction code and sending the conversion extraction code to a conversion storage module for storage; the conversion storage module sends the conversion extraction code to the key verification module for storage; the conversion extraction code consists of storage grade, storage time, graphic attributes, interference factors, segmentation quantity and ten random positive integers; the conversion extraction code label is DTW rho fL1……L10(ii) a Wherein L is1、……、L10Is a random positive integer;
the cloud storage module is used for storing cloud information and is composed of a plurality of cloud servers; the data acquisition module is used for acquiring the serial number of the cloud server, the positions of the rest memory and the server and the positions of information to be stored, the storage grade and the storage time input by a user; the data acquisition module sends acquired information to the distribution storage module; the distribution module is used for enabling each graphic BTkAnd distributing to a plurality of cloud servers for storage.
Preferably, the distribution module distributes each graphic BTkThe specific steps of distributing the storage to a plurality of cloud servers are as follows:
s1: setting a plurality of cloud servers as Mi, wherein i is 1, … … and n; the remaining memory corresponding to the cloud server Mi is marked as NMi(ii) a The position corresponding to the cloud server Mi is marked as GMi(ii) a Setting a position note GS of information to be stored, a storage grade and storage time input by a user;
s2: by GS and GMiCalculating the distance difference between the cloud server and the information to be stored input by the user and marking the distance difference as GL;
s3: using formulas
Figure BDA0002158929130000041
Obtaining and obtaining a priority storage value Y of the cloud server MiMi(ii) a Wherein v1 and v2 are preset proportionality coefficients, and the values of v1 and v2 are both greater than one;
s4: setting a storage threshold value as Yb; when Y isMi>Yb, marking the cloud server Mi as the selected cloud server; sorting the selected cloud servers in sequence from large to small according to the priority storage values;
s5: then obtaining a backup coefficient Q; each segment of graphics BTkCopy Q and mark as backup graph QBTk(ii) a Each segment of graphics BTkAnd a backup graph QBTkSequentially storing according to the sequence of the selected cloud servers; embodied as BT1Storing the data in the cloud server corresponding to the most front priority storage value; QBT (QBT)1Storing the data in a cloud server corresponding to the storage priority; backup graph QBTkAfter the storage is finished, the BT is stored in sequence2、QBT2(ii) a And so on;
s5: counting BT of each graphkAnd a backup graph QBTkAnd the storage position in the selected cloud server and the selected server number are sent to the distribution storage module.
Preferably, the allocation storage module is used for storing each graphic BTkAnd a backup graph QBTkThe position in the selected cloud server and the number of the selected server generate a corresponding unique identification instruction; the unique identification instruction is composed of a plurality of natural numbers from zero to nine; the unique identification command is recorded as R1R2 … … Rn, wherein the value ranges of R1, R2, R … … and Rn are all natural numbers from zero to nine; and the distribution storage module sends the unique identification instruction to the value key verification module for storage.
Preferably, the key verification module receives the conversion extraction code and the unique identification instruction, generates a public key and a private key, stores the public key and the private key, and sends the public key and the private key to the user terminal for display; the user terminal sends the private key to the key verification module and verifies the private key and the public key, and after the verification is successful, the key verification module sends a conversion extraction code and a unique identification instruction corresponding to the public key and the private key to the conversion storage module and the distribution storage module; the conversion storage module sends the corresponding natural number identification code and the conversion extraction code to the restoration module; the distribution storage module acquires each graphic BT according to the unique identification instructionkAnd a backup graph QBTkNumbering the storage position in the selected cloud server and the selected server and sending the storage position and the selected server to the extraction module; the extraction module extracts each corresponding graphic BT according to the storage position in the selected cloud server and the number of the selected serverkOr a backup graphic QBTkAnd sending the restoration module; the recovery module BT according to each graphkOr a backup graphic QBTkThe method comprises the steps of restoring to an identification pattern BT or a backup identification pattern QBT, restoring the identification pattern BT or the backup identification pattern QBT to a retransformed pattern by a restoring module, restoring the retransformed pattern to a converted pattern BT according to interference factors, restoring the converted pattern BT to an identification code set C according to pattern attributes, restoring characters, symbols and numbers corresponding to information to be stored according to a natural number identification code Ai in the identification code set C, and transmitting the restored information to be stored to a user terminal for displaying by the restoring module; the user terminal comprises a mobile phone, a computer or a tablet computer.
Preferably, the backup analysis module is used for calculating each graph BTkThe backup coefficient Q of (2); the specific calculation steps are as follows:
s1: counting the identification pattern BT to obtain the corresponding byte size and recording the byte size as Ub;
s2: using formulas
Figure BDA0002158929130000051
Obtaining a backup coefficient Q; wherein x1, x2 and x3 are all preset fixed values of proportionality coefficients; QB is a backup threshold;
s3: when the Q value is less than one, backup is not carried out; when the Q value is composed of an integer and a decimal, the Q value is an integer.
The invention has the beneficial effects that:
(1) the method comprises the steps of matching information to be stored with natural number identification codes corresponding to characters, symbols and numbers stored in a conversion storage module to obtain an identification code set converted from stored information, and obtaining graphic attributes by using a formula; matching with a conversion graph stored in a conversion storage module according to the graph attribute; matching the graphic attributes with the graphic attributes to obtain a corresponding converted graphic; converting the natural number identification codes in the identification code set by using the matched conversion graphs, randomly generating interference factors, and combining the graph attributes with the interference factors to obtain a reconverted graph; connecting the retransformed patterns in sequence according to the sequence of the identification code set to obtain an identification pattern; the graph encryption of the stored information is realized by performing graph conversion on the stored information, and the safety of the stored information is guaranteed;
(2) the method comprises the steps of obtaining the number of segments of identification graphs by using a formula, sequentially cutting the identification graphs into segments, and sending each segment of graphs to a distribution module and a backup analysis module through an information uploading module; meanwhile, generating a conversion extraction code and sending the conversion extraction code to a conversion storage module for storage; the conversion storage module sends the conversion extraction code to the key verification module for storage; the distribution module distributes each section of graph to a plurality of cloud servers for storage through the priority value of the cloud servers; by carrying out graph conversion on the stored information and distributing a plurality of graph fragments to store the stored information by a plurality of cloud servers, the problem that the stored content is leaked due to the fact that the existing cloud servers can access the content of the servers after authorization is avoided.
Drawings
The invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of a cloud information storage system based on data encryption according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the invention relates to a cloud information storage system based on data encryption, which comprises an information input module, a matching conversion module, an information uploading module, a conversion storage module, a distribution module, a cloud storage module, a distribution storage module, a data acquisition module, a backup analysis module, an extraction module, a key verification module, a restoration module and a user terminal;
the information input module is used for inputting information to be stored, storage grade and storage time by a user; the information to be stored is a set which is composed of characters, symbols and numbers according to a corresponding sequence; the information input module sends the information to be stored, the storage grade and the storage time which are input by a user to the matching conversion module; the matching conversion module is used for converting the information to be stored into the graphic information, and comprises the following specific steps:
the method comprises the following steps: matching the information to be stored with a natural number identification code corresponding to characters, symbols and numbers stored in a conversion storage module, and setting the natural number identification code as Ai, wherein i is 1, … … and n; and a1 ═ 1, a2 ═ 2, Ai ═ i; sequentially forming a sequence set C (Ai, … …, An) by the converted natural number identification codes of the information to be stored to obtain An identification code set C converted from the stored information;
step two: setting a storage grade as D, and setting storage time as T; the unit of T is year;
step three: using formulas
Figure BDA0002158929130000071
Obtaining a graph attribute W, wherein e1 and e2 are preset proportionality coefficient fixed values; λ is a correction factor, and its value is 0.3290342; the value of W is 1,2 and 3; when the value of W is (0, 1)]In the range, the value is 1, when the value of W is in the range of (1,2), the value is 1, when the value of W is in the range of [2,3), the value is 2, when the value of W is in the range of [3,4), the value is 3, when the value is obtained through a formula, the larger the storage grade is, the more the graph attributes are, the more complex the graph representing the conversion is, the more difficult the graph is to be cracked, the higher the corresponding safety is, the longer the storage time is, and the more the graph attributes are; when the value of W can also be positive integers of 4, 5 and above, the larger the value of W is, the larger the storage grade is;
step four: matching with a conversion graph stored in a conversion storage module according to the graph attribute W; setting a conversion pattern as Zj, wherein j is 1,2 and 3; wherein z1 represents that the converted graph is a line segment and has 1 graph attribute, and the graph attribute is a length; z2 represents the conversion graph is an arc line segment, and has 2 graph attributes, wherein the graph attributes are arc length and radius; z3 denotes a package converting a graphic into a circle with 3 graphic attributesIncluding perimeter, area and radius; j represents the attribute of the conversion graph; matching the graph attribute W with Zj to obtain a corresponding conversion graph Zj; the graphic attributes of the converted graphics also comprise 4 graphic attributes and more; the concrete expression is as follows: selecting the natural number identification code A10 to be equal to 10, and converting the converted graph into a line segment with the length of 10 when the graph attribute is 1; when the graph is converted, the natural number identification code A10 is obtained directly through the length 10 of the line segment; when the graphic attribute is 2, the converted conversion graphic is an arc line segment with the arc length of 5 pi and the radius of 5, and the arc length and the radius of the arc line segment are equal to 10 through mathematical operation, if the radius is 5 and the arc length is 5 pi; then use the formula
Figure BDA0002158929130000081
Calculating to obtain 10, wherein Lh is the arc length and r is the radius; when the graph attribute is 3, the graph is converted into a circle with the radius of 5, and the formula is utilized
Figure BDA0002158929130000082
Calculating to obtain 10; sm is the area of a circle, Lz is the perimeter, and r is the radius; when the graph attribute is 4, converting the graph into a graph with 4 attributes; and so on; the graph attributes are calculated to correspond to the natural number identification codes, so that judgment is carried out;
step five: converting the natural number identification codes Ai in the identification code set C by using the matched conversion graphs Zj, randomly generating interference factors, and setting the interference factors as rho; taking the value as a positive integer; obtaining a retransformed graph by combining the graph attribute and the interference factor; and noted as CZj; specifically, when the conversion graph is Z1, the natural number identification code Ai is converted into a line segment, and the length of the line segment plus the interference factor is equal to the value of Ai; when the conversion graph is Z2, Ai is converted into an arc line segment, and the value of Ai is obtained by calculating the arc length, the radius and the interference factor through the operation in mathematics;
step six: connecting the retransformation images CZj in sequence according to the sequence of the identification code set C, namely Zj … … Zn; obtaining an identification pattern BT;
step seven: obtaining the segmentation number f of the identification pattern BT by using a formula f ═ mu ═ h1+ T × h2, wherein h1, h2 and mu are all preset fixed proportionality coefficient values; mu is a positive integer; the storage level is larger, the number of the segments is larger, the storage time is longer, the number of the segments is larger, the positions of the stored cloud servers are larger, and the stored information is safer;
step eight: cutting the identification pattern BT into f sections in sequence, wherein each section of pattern is represented as BTk;k=1、……、f;
Step nine: each segment of graphics BTkThe information is transmitted to the distribution module and the backup analysis module through the information uploading module; meanwhile, generating a conversion extraction code and sending the conversion extraction code to a conversion storage module for storage; the conversion storage module sends the conversion extraction code to the key verification module for storage; the conversion extraction code consists of storage grade, storage time, graphic attributes, interference factors, segmentation quantity and ten random positive integers; the conversion extraction code label is DTW rho fL1……L10(ii) a Wherein L is1、……、L10Is a random positive integer;
the cloud storage module is used for storing cloud information and is composed of a plurality of cloud servers; the data acquisition module is used for acquiring the serial number of the cloud server, the positions of the rest memory and the server and the positions of information to be stored, the storage grade and the storage time input by a user; the data acquisition module sends acquired information to the distribution storage module; the distribution module is used for distributing each graphic BTkAnd distributing to a plurality of cloud servers for storage.
The distribution module distributes each graphic BTkThe specific steps of distributing the storage to a plurality of cloud servers are as follows:
s1: setting a plurality of cloud servers as Mi, wherein i is 1, … … and n; the remaining memory corresponding to the cloud server Mi is marked as NMi(ii) a The position corresponding to the cloud server Mi is marked as GMi(ii) a Setting a position note GS of information to be stored, a storage grade and storage time input by a user;
s2: by GS and GMiCalculating the distance difference between the cloud server and the information to be stored input by the user and marking the distance difference as GL;
s3: using formulas
Figure BDA0002158929130000091
Obtaining and obtaining a priority storage value Y of the cloud server MiMi(ii) a Wherein v1 and v2 are preset proportionality coefficients, and the values of v1 and v2 are both greater than one; the smaller the distance between the cloud server and the information to be stored input by the user is, the smaller the value Y stored by the cloud server Mi preferentiallyMiThe larger the size, the more preferential the storage; the larger the residual memory corresponding to the cloud server Mi is, the higher the value Y stored by the cloud server Mi in priorityMiThe larger;
s4: setting a storage threshold value as Yb; when Y isMi>Yb, marking the cloud server Mi as the selected cloud server; sorting the selected cloud servers in sequence from large to small according to the priority storage values;
s5: then obtaining a backup coefficient Q; each segment of graphics BTkCopy Q and mark as backup graph QBTk(ii) a Each segment of graphics BTkAnd a backup graph QBTkSequentially storing according to the sequence of the selected cloud servers; embodied as BT1Storing the data in the cloud server corresponding to the most front priority storage value; QBT (QBT)1Storing the data in a cloud server corresponding to the storage priority; backup graph QBTkAfter the storage is finished, the BT is stored in sequence2、QBT2(ii) a And so on;
s5: counting BT of each graphkAnd a backup graph QBTkAnd the storage position in the selected cloud server and the selected server number are sent to the distribution storage module.
The distribution storage module is used for storing each graphic BTkAnd a backup graph QBTkThe position in the selected cloud server and the number of the selected server generate a corresponding unique identification instruction; the unique identification instruction is composed of a plurality of natural numbers from zero to nine; the unique identification command is recorded as R1R2 … … Rn, wherein the value ranges of R1, R2, R … … and Rn are all natural numbers from zero to nine; and the distribution storage module sends the unique identification instruction to the value key verification module for storage.
Key verification module received translationExtracting the code and the unique identification instruction, generating a public key and a private key, storing the public key and the private key, and sending the public key and the private key to a user terminal for displaying; the user terminal sends the private key to the key verification module and verifies the private key and the public key, and after the verification is successful, the key verification module sends a conversion extraction code and a unique identification instruction corresponding to the public key and the private key to the conversion storage module and the distribution storage module; the conversion storage module sends the corresponding natural number identification code and the conversion extraction code to the restoration module; the distribution storage module acquires each graphic BT according to the unique identification instructionkAnd a backup graph QBTkNumbering the storage position in the selected cloud server and the selected server and sending the storage position and the selected server to the extraction module; the extraction module extracts each corresponding graphic BT according to the storage position in the selected cloud server and the number of the selected serverkOr a backup graphic QBTkAnd sending the restoration module; the recovery module BT according to each graphkOr a backup graphic QBTkThe method comprises the steps of restoring to an identification pattern BT or a backup identification pattern QBT, restoring the identification pattern BT or the backup identification pattern QBT to a retransformed pattern by a restoring module, restoring the retransformed pattern to a converted pattern BT according to interference factors, restoring the converted pattern BT to an identification code set C according to pattern attributes, restoring characters, symbols and numbers corresponding to information to be stored according to a natural number identification code Ai in the identification code set C, and transmitting the restored information to be stored to a user terminal for displaying by the restoring module; the user terminal comprises a mobile phone, a computer or a tablet computer.
The backup analysis module is used for calculating the BT of each segment of graphkThe backup coefficient Q of (2); the specific calculation steps are as follows:
s1: counting the identification pattern BT to obtain the corresponding byte size and recording the byte size as Ub;
s2: using formulas
Figure BDA0002158929130000111
Obtaining a backup coefficient Q; wherein x1, x2 and x3 are all preset fixed values of proportionality coefficients; QB is a backup threshold; the method has the advantages that the smaller the byte corresponding to the identification pattern BT is, the larger the backup coefficient is, and the more the backup is; the longer the storage time, the larger the backup coefficient(ii) a The higher the storage level, the more backups;
s3: when the Q value is less than one, backup is not carried out; when the Q value is composed of an integer and a decimal, the Q value is an integer.
The working principle of the invention is as follows: matching the information to be stored with the natural number identification code corresponding to the characters, symbols and numbers stored in the conversion storage module to obtain an identification code set C converted from the stored information, and using a formula
Figure BDA0002158929130000112
Obtaining a graph attribute W; matching with a conversion graph stored in a conversion storage module according to the graph attribute W; matching the graph attribute W with Zj to obtain a corresponding conversion graph Zj; converting the natural number identification code Ai in the identification code set C by using the matched conversion graph Zj, randomly generating an interference factor, and combining the graph attribute and the interference factor to obtain a reconverted graph; sequentially connecting the re-transformed patterns CZj according to the sequence of the identification code set C to obtain an identification pattern BT; obtaining the segmentation quantity f of the identification pattern BT by using a formula f ═ mu ═ h (D ═ h1+ T ═ h2), sequentially cutting the identification pattern BT into f segments, and sequentially cutting each segment of pattern BT into f segmentskThe information is transmitted to the distribution module and the backup analysis module through the information uploading module; meanwhile, generating a conversion extraction code and sending the conversion extraction code to a conversion storage module for storage; the conversion storage module sends the conversion extraction code to the key verification module for storage; the distribution module distributes each graphic BTkThe priority values of the cloud servers are distributed to a plurality of cloud servers for storage; the storage information is subjected to graph conversion, and a plurality of graph fragments are distributed to be stored by a plurality of cloud servers, so that the condition that the existing cloud servers can access the content of the servers after authorization is avoided.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (5)

1. The utility model provides a high in clouds information storage system based on data encryption which characterized in that: the system comprises an information input module, a matching conversion module, an information uploading module, a conversion storage module, a distribution module, a cloud storage module, a distribution storage module, a data acquisition module, a backup analysis module, an extraction module, a key verification module, a restoration module and a user terminal;
the information input module is used for inputting information to be stored, storage grade and storage time by a user; the information input module sends information to be stored, storage grade and storage time input by a user to the matching conversion module; the matching conversion module is used for converting the information to be stored into the graphic information, and comprises the following specific steps:
the method comprises the following steps: matching the information to be stored with a natural number identification code corresponding to characters, symbols and numbers stored in a conversion storage module, and setting the natural number identification code as Ai, wherein i is 1, … … and n; and a1 ═ 1, a2 ═ 2, Ai ═ i; sequentially forming a sequence set C (Ai, … …, An) by the converted natural number identification codes of the information to be stored to obtain An identification code set C converted from the information to be stored;
step two: setting a storage grade as D, and setting storage time as T; the unit of T is year;
step three: using formulas
Figure FDA0002765179640000011
Obtaining a graph attribute W, wherein e1 and e2 are preset proportionality coefficient fixed values; λ is a correction factor, and its value is 0.3290342; the value of W is 1,2 and 3;
step four: matching with a conversion graph stored in a conversion storage module according to the graph attribute W; setting a conversion pattern as Zj, wherein j is 1,2 and 3; wherein z1 represents that the converted graph is a line segment and has 1 graph attribute, and the graph attribute is a length; z2 represents the conversion graph is an arc line segment, and has 2 graph attributes, wherein the graph attributes are arc length and radius; z3 indicates that the transformed graph is a circle with 3 graph attributes including perimeter, area and radius; j represents the attribute of the conversion graph; matching the graph attribute W with Zj to obtain a corresponding conversion graph Zj;
step five: converting the natural number identification codes Ai in the identification code set C by using the matched conversion graphs Zj, randomly generating interference factors, and setting the interference factors as rho; taking the value as a positive integer; obtaining a retransformed graph by combining the graph attribute and the interference factor; and noted as CZj; specifically, when the conversion graph is Z1, the natural number identification code Ai is converted into a line segment, and the length of the line segment plus the interference factor is equal to the value of Ai; when the conversion graph is Z2, Ai is converted into an arc line segment, and the value of Ai is obtained by calculating the arc length, the radius and the interference factor through the operation in mathematics;
step six: connecting the retransformation images CZj in sequence according to the sequence of the identification code set C, namely Zj … … Zn; obtaining an identification pattern BT;
step seven: obtaining the segmentation number f of the identification pattern BT by using a formula f ═ mu ═ h1+ T × h2, wherein h1, h2 and mu are all preset fixed proportionality coefficient values; mu is a positive integer;
step eight: cutting the identification pattern BT into f sections in sequence, wherein each section of pattern is represented as BTk;k=1、……、f;
Step nine: each segment of graphics BTkThe information is transmitted to the distribution module and the backup analysis module through the information uploading module; meanwhile, generating a conversion extraction code and sending the conversion extraction code to a conversion storage module for storage; the conversion storage module sends the conversion extraction code to the key verification module for storage; the conversion extraction code consists of storage grade, storage time, graphic attributes, interference factors, segmentation quantity and ten random positive integers; the conversion extraction code label is DTW rho fL1……L10(ii) a Wherein L is1、……、L10Is a random positive integer;
the cloud storage module is used for storing cloud information and is composed of a plurality of cloud servers; the data acquisition module is used for acquiring the serial number of the cloud server, the positions of the rest memory and the server and the positions of information to be stored, the storage grade and the storage time input by a user; the data acquisition module will acquireSending the information of the set to a distribution storage module; the distribution module is used for enabling each graphic BTkAnd distributing to a plurality of cloud servers for storage.
2. The cloud information storage system based on data encryption of claim 1, wherein the distribution module distributes each segment of graphics BTkThe specific steps of distributing the storage to a plurality of cloud servers are as follows:
s1: setting a plurality of cloud servers as Mi, wherein i is 1, … … and n; the remaining memory corresponding to the cloud server Mi is marked as NMi(ii) a The position corresponding to the cloud server Mi is marked as GMi(ii) a Setting a position note GS of information to be stored, a storage grade and storage time input by a user;
s2: by GS and GMiCalculating the distance difference between the cloud server and the information to be stored input by the user and marking the distance difference as GL;
s3: using formulas
Figure FDA0002765179640000031
Obtaining and obtaining a priority storage value Y of the cloud server MiMi(ii) a Wherein v1 and v2 are preset proportionality coefficients, and the values of v1 and v2 are both greater than one;
s4: setting a storage threshold value as Yb; when Y isMi>Yb, marking the cloud server Mi as the selected cloud server; sorting the selected cloud servers in sequence from large to small according to the priority storage values;
s5: then obtaining a backup coefficient Q; each segment of graphics BTkCopy Q and mark as backup graph QBTk(ii) a Each segment of graphics BTkAnd a backup graph QBTkSequentially storing according to the sequence of the selected cloud servers; embodied as BT1Storing the data in the cloud server corresponding to the most front priority storage value; QBT (QBT)1Storing the data in a cloud server corresponding to the storage priority; backup graph QBT1After the storage is finished, the BT is stored in sequence2、QBT2(ii) a And so on;
s5: counting BT of each graphkAnd a backup graph QBTkIn the selectionAnd the storage position in the middle cloud server and the selected server number are sent to the distribution storage module.
3. The cloud information storage system based on data encryption of claim 2, wherein the allocation storage module is configured to store each segment of graphics BTkAnd a backup graph QBTkThe position in the selected cloud server and the number of the selected server generate a corresponding unique identification instruction; the unique identification instruction is composed of a plurality of natural numbers from zero to nine; the unique identification command is recorded as R1R2 … … Rn, wherein the value ranges of R1, R2, R … … and Rn are all natural numbers from zero to nine; and the distribution storage module sends the unique identification instruction to the key verification module for storage.
4. The cloud information storage system based on data encryption of claim 3, wherein the key verification module receives the conversion extraction code and the unique identification instruction, generates a public key and a private key, stores the public key and the private key, and sends the public key and the private key to the user terminal for display; the user terminal sends the private key to the key verification module and verifies the private key and the public key, and after the verification is successful, the key verification module sends a conversion extraction code and a unique identification instruction corresponding to the public key and the private key to the conversion storage module and the distribution storage module; the conversion storage module sends the corresponding natural number identification code and the conversion extraction code to the restoration module; the distribution storage module acquires each graphic BT according to the unique identification instructionkAnd a backup graph QBTkNumbering the storage position in the selected cloud server and the selected server and sending the storage position and the selected server to the extraction module; the extraction module extracts each corresponding graphic BT according to the storage position in the selected cloud server and the number of the selected serverkOr a backup graphic QBTkAnd sending the restoration module; the recovery module BT according to each graphkOr a backup graphic QBTkThe identification pattern BT or the backup identification pattern QBT is restored to a re-conversion pattern, the re-conversion pattern is restored to a conversion pattern BT according to the interference factors, and the conversion pattern BT is restored according to the patternThe attributes are restored to an identification code set C, then characters, symbols and numbers corresponding to the information to be stored are restored according to a natural number identification code Ai in the identification code set C, and a restoration module sends the restored information to be stored to a user terminal for displaying; the user terminal comprises a mobile phone, a computer or a tablet computer.
5. The cloud information storage system based on data encryption of claim 1, wherein the backup analysis module is configured to calculate each graph BTkThe backup coefficient Q of (2); the specific calculation steps are as follows:
s1: counting the identification pattern BT to obtain the corresponding byte size and recording the byte size as Ub;
s2: using formulas
Figure FDA0002765179640000041
Obtaining a backup coefficient Q; wherein x1, x2 and x3 are all preset fixed values of proportionality coefficients; QB is a backup threshold;
s3: when the Q value is less than one, backup is not carried out; when the Q value is composed of an integer and a decimal, the Q value is an integer.
CN201910725908.1A 2019-08-07 2019-08-07 Cloud information storage system based on data encryption Active CN110502910B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910725908.1A CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910725908.1A CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Publications (2)

Publication Number Publication Date
CN110502910A CN110502910A (en) 2019-11-26
CN110502910B true CN110502910B (en) 2021-03-30

Family

ID=68587073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910725908.1A Active CN110502910B (en) 2019-08-07 2019-08-07 Cloud information storage system based on data encryption

Country Status (1)

Country Link
CN (1) CN110502910B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765478B (en) * 2019-11-07 2020-07-31 城云科技(中国)有限公司 Big data information secure storage encryption system and method thereof
CN111539115B (en) * 2020-04-27 2023-04-18 广东鼎耀工程技术有限公司 Building pipeline arrangement optimization system based on BIM
CN112000977B (en) * 2020-11-02 2021-02-19 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112693360A (en) * 2020-12-10 2021-04-23 重庆邮电大学移通学院 Electric automobile electric quantity management method and related device
CN112561585B (en) * 2020-12-16 2024-06-28 中国人寿保险股份有限公司 Information service system and method based on graph
CN114567434B (en) * 2022-03-07 2023-08-11 亿咖通(湖北)技术有限公司 Certificate and key storage method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183374A (en) * 2007-10-17 2008-05-21 北京逍遥掌信息技术有限公司 Mobile terminal apparatus electronic file memory structure and management techniques
CN106683053A (en) * 2016-10-28 2017-05-17 陕西师范大学 GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
CN110086789A (en) * 2019-04-17 2019-08-02 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the medium of data transmission

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958987B (en) * 2009-07-14 2013-06-26 中国电信股份有限公司 Method and system for dynamically converting telecommunications service data
CN103379148A (en) * 2012-04-19 2013-10-30 北京智慧风云科技有限公司 Cloud calculator and method for processing files through cloud calculator
US9247327B2 (en) * 2013-10-10 2016-01-26 Nec Laboratories America, Inc. Suurballe-based cloud service embedding procedure in software-defined flexible-grid optical transport networks
CN103747279A (en) * 2013-11-18 2014-04-23 南京邮电大学 Cloud storage and sharing coded video encryption and access control strategy updating method
CN104023027B (en) * 2014-06-18 2017-03-29 西安电子科技大学 High in the clouds data definitiveness delet method based on ciphertext sampling burst
CN104091129B (en) * 2014-06-26 2016-12-14 腾讯科技(深圳)有限公司 A kind of data processing method and device
CN106294878A (en) * 2016-08-30 2017-01-04 四川格锐乾图科技有限公司 A kind of novel high in the clouds data encryption storage system
CN108810140B (en) * 2018-06-12 2021-09-28 湘潭大学 High-performance hierarchical storage optimization method based on dynamic threshold adjustment in cloud storage system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183374A (en) * 2007-10-17 2008-05-21 北京逍遥掌信息技术有限公司 Mobile terminal apparatus electronic file memory structure and management techniques
CN106683053A (en) * 2016-10-28 2017-05-17 陕西师范大学 GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
CN110086789A (en) * 2019-04-17 2019-08-02 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the medium of data transmission

Also Published As

Publication number Publication date
CN110502910A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
CN110502910B (en) Cloud information storage system based on data encryption
CN108961141B (en) Vector map double zero watermarking method, system, storage medium and server
CN104091301B (en) A kind of tile pyramid parallel constructing method based on MapReduce
CN108829899B (en) Data table storage, modification, query and statistical method
CN106612172A (en) Data change recovery algorithm capable of restoring data authenticity in cloud storage
CN110765478B (en) Big data information secure storage encryption system and method thereof
CN106302720A (en) A kind of for block chain Survivable storage system and method
CN107251039A (en) Utilize the Information Security of the data structure of decomposition
He et al. A weighted threshold secret sharing scheme for remote sensing images based on Chinese remainder theorem
CN104156451A (en) Data storage managing method and system
CN112000977B (en) System for encrypting and keeping digital assets
CN115883109A (en) Data compression and encryption method and system for aviation system
CN104200171A (en) Virtual file system based on information hiding
CN104007938A (en) Key value generating method and device in storage network
CN107645558A (en) A kind of three-level secure cloud storage method calculated based on mist
CN111260532B (en) Privacy image encryption method, device, electronic equipment and computer readable storage medium
WO2014089843A1 (en) Method and device for data encryption and decryption
CN109768860B (en) Encryption method, decryption method and terminal
CN102509058B (en) Point type GIS vector data disguise and recovery method based on redundant bit replacement
CN108985759B (en) Address generating method, system, equipment and storage medium for cryptocurrency
CN115017877B (en) Storage method of layout file and local reconstruction method of sample database
CN114677057B (en) Green energy financial data acquisition and evaluation method and system based on machine learning
CN115906111A (en) Character string encryption method based on three-dimensional coordinate system
CN107566123A (en) PPTP VPN passwords methods of calibration and computer-readable recording medium
CN112329393A (en) Method, equipment and storage medium for generating short code ID

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant