CN112866415B - Data backup private cloud storage and downloading method - Google Patents
Data backup private cloud storage and downloading method Download PDFInfo
- Publication number
- CN112866415B CN112866415B CN202110208543.2A CN202110208543A CN112866415B CN 112866415 B CN112866415 B CN 112866415B CN 202110208543 A CN202110208543 A CN 202110208543A CN 112866415 B CN112866415 B CN 112866415B
- Authority
- CN
- China
- Prior art keywords
- file
- client
- cloud storage
- private cloud
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method, which comprises the following security management stages: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user; a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges to obtain a server Access token, and uploads the fragmented file to the target private cloud storage; a file storage stage: after the client side completes the file slicing transmission, notifying the private cloud storage server side to sequentially combine and restore the file slicing information into an original file, and performing consistency verification; a file downloading stage: the client initiates a downloading request to the designated file by carrying an Access token, the cloud storage server performs security verification, and returns a specific file downloading address of the client, and the client downloads the file through the address.
Description
Technical Field
The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method.
Background
Private cloud storage is built individually by businesses or individuals, providing only limited users with corresponding storage services and quality of service (QoS) through a variety of different types of storage devices in a collaborative network.
Compared with traditional storage and public cloud storage, private cloud storage has the following advantages: 1. the data can be stored uniformly and managed efficiently; 2. the storage space is easy to expand and convenient to upgrade; 3. the separation of the inner network and the outer network is high in safety.
Disclosure of Invention
The invention aims to solve the problems in the background technology and provides a data backup private cloud storage and downloading method.
The technical aim of the invention is realized by the following technical scheme:
a data backup private cloud storage and downloading method comprises the following steps:
and a security management stage: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user;
a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges to obtain a server Access token, and uploads the fragmented file to the target private cloud storage;
a file storage stage: after the client side completes the file slicing transmission, notifying the private cloud storage server side to sequentially combine and restore the file slicing information into an original file, and performing consistency verification;
a file downloading stage: the client initiates a downloading request to the designated file by carrying an Access token, the cloud storage server performs security verification, and returns a specific file downloading address of the client, and the client downloads the file through the address.
Preferably, the specific steps of the security management stage are as follows:
1. the administrator user logs in to the private cloud storage server to perform authorization setting on the common user, and the method comprises the following steps: creating authorized users, authorizing access to IP addresses (black lists), specifying file storage paths, allocating disk space usage, configuring network transmission rates and access token validity periods;
2. the server side corrects the disk space occupied by the user regularly according to the management plan (storage plan task, automatic deletion plan and data synchronization plan) of the service system, and gives a prompt when the storage space is insufficient to complete the current storage operation;
3. and providing a periodic automatic deletion scheme, and cleaning the redundant data on the private cloud storage periodically according to the set deletion time limit and the reserved backup times.
Preferably, the specific steps of the file transmission stage are as follows:
1. the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on national password 4 (SM 4);
and the server side is combined with IP black-and-white list setting to carry out verification, and after the verification is passed, the AccessToken information with preset time efficiency is returned to the client side.
The client records the Access token and the validity period returned by the server to obtain authorization; and when the access token is accessed next time, if the validity period of the access token is over, repeating the step one, and re-obtaining the authorization.
2. The client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048.
And according to the number of the file fragments, carrying out file fragment transmission in the second cyclic step, wherein: in the transmission process, carrying the Access token and the Hash value of the fragmented file with the fragmented data stream to carry out unified uploading.
3. After the file transmission is completed, the private cloud storage server is informed to carry out fragment file merging organization, and file characteristic information is uploaded, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value.
Preferably, the specific steps of the file storage stage are as follows:
1. after receiving the request of transmitting the client-side fragmented files, the server side judges the authorization information of the user and the disk space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
2. after receiving the request for completing the file transmission of the client, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
3. and if the file is a ZIP compressed file, analyzing the file information in the compressed package (opening the ZIP file in a file stream mode, reading the solidified file information in the ZIP, wherein the solidified file information comprises a file name, a CRC (cyclic redundancy check) value, the file size before and after compression and a modification date), and independently performing database recording operation.
Preferably, the specific steps of the file downloading stage are as follows:
1. the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
2. the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not. If so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
3. the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.
In conclusion, the invention solves the problems of low safety and poor manageability of the traditional file management technology. And uniformly managing the internal users and the computer disk resources through a private cloud storage technology. Meanwhile, the ZIP compressed package online single file extraction and downloading method solves the problem that the whole compressed package is to be downloaded in order to obtain a certain single file in the compressed package in the traditional compressed package downloading process, and effectively saves the downloading time and bandwidth resources.
Detailed Description
The following specific examples are intended to be illustrative of the invention and are not intended to be limiting, as modifications of the invention will be apparent to those skilled in the art upon reading the specification without inventive contribution thereto, and are intended to be protected by the patent law within the scope of the appended claims.
The present invention will be described in detail with reference to examples.
Example 1:
a data backup private cloud storage and downloading method comprises the following steps:
and a security management stage: using a private cloud storage management end to create an authorized access user, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user, wherein the specific steps are as follows:
1. the administrator user logs in to the private cloud storage server to perform authorization setting on the common user, and the method comprises the following steps: creating authorized users, authorizing access to IP addresses (black lists), specifying file storage paths, allocating disk space usage, configuring network transmission rates and access token validity periods;
2. the server side corrects the disk space occupied by the user regularly according to the management plan (storage plan task, automatic deletion plan and data synchronization plan) of the service system, and gives a prompt when the storage space is insufficient to complete the current storage operation;
3. and providing a periodic automatic deletion scheme, and cleaning the redundant data on the private cloud storage periodically according to the set deletion time limit and the reserved backup times.
A file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges and obtains a server Access token, and uploads the fragmented file to the target private cloud storage, and the specific steps are as follows:
1. the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on national password 4 (SM 4);
and the server side is combined with IP black-and-white list setting to carry out verification, and after the verification is passed, the AccessToken information with preset time efficiency is returned to the client side.
The client records the Access token and the validity period returned by the server to obtain authorization; and when the access token is accessed next time, if the validity period of the access token is over, repeating the step one, and re-obtaining the authorization.
2. The client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048.
And according to the number of the file fragments, carrying out file fragment transmission in the second cyclic step, wherein: in the transmission process, carrying the Access token and the Hash value of the fragmented file with the fragmented data stream to carry out unified uploading.
3. After the file transmission is completed, the private cloud storage server is informed to carry out fragment file merging organization, and file characteristic information is uploaded, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value.
A file storage stage: after the client side completes the file slicing transmission, the private cloud storage server side is informed to sequentially combine and restore the file slicing information into an original file, and consistency verification is carried out, and the specific steps are as follows:
1. after receiving the request of transmitting the client-side fragmented files, the server side judges the authorization information of the user and the disk space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
2. after receiving the request for completing the file transmission of the client, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
3. and if the file is a ZIP compressed file, analyzing the file information in the compressed package (opening the ZIP file in a file stream mode, reading the solidified file information in the ZIP, wherein the solidified file information comprises a file name, a CRC (cyclic redundancy check) value, the file size before and after compression and a modification date), and independently performing database recording operation.
A file downloading stage: the client initiates a downloading request to the appointed file by carrying an Access token, the cloud storage server performs security verification and returns a specific file downloading address of the client, and the client downloads the appointed file through the address, and the specific steps are as follows:
1. the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
2. the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not. If so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
3. the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.
Claims (1)
1. The data backup private cloud storage and downloading method is characterized by comprising the following steps of:
s1, a security management stage: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user; the method comprises the following specific steps:
s1-1, an administrator user logs in to a private cloud storage server, and performs authorization setting on a common user, wherein the method comprises the following steps: creating authorized users, authorizing access to the IP address black-and-white list, designating file storage paths, allocating disk space usage, configuring network transmission rate and access token validity period;
s1-2, the server side comprises the following steps according to a management plan of a service system: the method comprises the steps of storing a plan task, automatically deleting a plan and a data synchronization plan, correcting disk space occupied by a user regularly, and giving a prompt when the storage space is insufficient for completing the current storage operation;
s1-3, providing a periodic automatic deleting scheme, and periodically cleaning redundant data on the private cloud storage according to a set deleting time limit and the reserved backup times;
s2, a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges and obtains a server Access token, and uploads the fragmented file to the target private cloud storage, and the specific steps are as follows:
s2-1, the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on the national password 4;
the server side is combined with IP address black-and-white list setting to verify, and after verification, the server side returns AccessToken information with preset time efficiency to the client side;
the client records the Access token and the validity period returned by the server to obtain authorization; when accessing next time, if the valid period of the Access token is over, repeating the step S2-1, and re-obtaining authorization;
s2-2, the client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048;
and (3) according to the number of file fragments, performing file fragment transmission in a circulating step S2-2, wherein: in the transmission process, carrying an Access token and a Hash value of a fragmented file on the fragmented data stream to be uniformly uploaded;
s2-3, after the file transmission is completed, notifying a private cloud storage server to carry out fragment file merging organization, and uploading file characteristic information, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value;
s3, a file storage stage: after the client side completes the file slicing transmission, the private cloud storage server side is informed to sequentially combine and restore the file slicing information into an original file, and consistency verification is carried out, and the specific steps are as follows:
s3-1, after receiving a client-side fragmented file transmission request, the server side judges authorization information of the user and disc space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
s3-2, after receiving a client file transmission completion request, the server checks according to the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file; calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
s3-3, the server records the file characteristic information into a database, if the file is a ZIP compressed file, the file information in the compressed package is analyzed, and the database recording operation is independently carried out;
s4, a file downloading stage: the client initiates a downloading request to the appointed file by carrying an Access token, the cloud storage server performs security verification and returns a specific file downloading address of the client, and the client downloads the appointed file through the address, and the specific steps are as follows:
s4-1, the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
s4-2, the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not; if so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
s4-3, the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208543.2A CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208543.2A CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112866415A CN112866415A (en) | 2021-05-28 |
CN112866415B true CN112866415B (en) | 2023-07-28 |
Family
ID=75991201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110208543.2A Active CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112866415B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726838B (en) * | 2021-06-17 | 2023-09-19 | 武汉理工数字传播工程有限公司 | File transmission method, device, equipment and storage medium |
CN114268463A (en) * | 2021-11-30 | 2022-04-01 | 重庆长安汽车股份有限公司 | Data security transmission method based on cloud storage |
CN114239081A (en) * | 2022-02-25 | 2022-03-25 | 华中科技大学同济医学院附属协和医院 | Business certificate processing method, system and electronic equipment |
CN115086306B (en) * | 2022-08-18 | 2022-11-18 | 天津市天河计算机技术有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN115757328B (en) * | 2022-11-15 | 2023-06-27 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN116074128A (en) * | 2023-04-04 | 2023-05-05 | 北京久安世纪科技有限公司 | SFTP (Small form-factor pluggable) authorization method and system based on portable operation and maintenance gateway |
CN116827637B (en) * | 2023-06-29 | 2024-03-19 | 四川中屹互联信息技术有限公司 | Canvas-based data encryption transmission method, system, equipment and medium |
CN116991633B (en) * | 2023-08-29 | 2024-05-31 | 北京星汉博纳医药科技有限公司 | Data backup processing method, device and equipment |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN105930233A (en) * | 2016-05-19 | 2016-09-07 | 北京春鸿企业管理咨询有限公司 | Method and system for automatically backing up data of specified public cloud account |
CN106341371A (en) * | 2015-07-08 | 2017-01-18 | 杭州奕锐电子有限公司 | Cloud storage data encryption method and cloud storage system |
CN107332939A (en) * | 2017-09-02 | 2017-11-07 | 刘兴丹 | It is a kind of to pass through the cloud storage method that is locally stored, device |
CN107786526A (en) * | 2016-08-31 | 2018-03-09 | 北京优朋普乐科技有限公司 | Anti-stealing link method, client and server system |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
CN111507481A (en) * | 2020-04-17 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Federated learning system |
CN111709038A (en) * | 2020-05-07 | 2020-09-25 | 北京中科凡语科技有限公司 | File encryption and decryption method, distributed storage system, equipment and storage medium |
KR102179497B1 (en) * | 2020-04-13 | 2020-11-17 | 주식회사 한국정보보호경영연구소 | System for Data Storing and Managing based on Multi-cloud and Driving method thereof |
CN112114849A (en) * | 2020-09-23 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Resource updating method and device |
CN112166588A (en) * | 2019-02-19 | 2021-01-01 | 甲骨文国际公司 | Tenant replication bootstrapping for multi-tenant identity cloud services |
-
2021
- 2021-02-24 CN CN202110208543.2A patent/CN112866415B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN106341371A (en) * | 2015-07-08 | 2017-01-18 | 杭州奕锐电子有限公司 | Cloud storage data encryption method and cloud storage system |
CN105930233A (en) * | 2016-05-19 | 2016-09-07 | 北京春鸿企业管理咨询有限公司 | Method and system for automatically backing up data of specified public cloud account |
CN107786526A (en) * | 2016-08-31 | 2018-03-09 | 北京优朋普乐科技有限公司 | Anti-stealing link method, client and server system |
CN107332939A (en) * | 2017-09-02 | 2017-11-07 | 刘兴丹 | It is a kind of to pass through the cloud storage method that is locally stored, device |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
CN112166588A (en) * | 2019-02-19 | 2021-01-01 | 甲骨文国际公司 | Tenant replication bootstrapping for multi-tenant identity cloud services |
KR102179497B1 (en) * | 2020-04-13 | 2020-11-17 | 주식회사 한국정보보호경영연구소 | System for Data Storing and Managing based on Multi-cloud and Driving method thereof |
CN111507481A (en) * | 2020-04-17 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Federated learning system |
CN111709038A (en) * | 2020-05-07 | 2020-09-25 | 北京中科凡语科技有限公司 | File encryption and decryption method, distributed storage system, equipment and storage medium |
CN112114849A (en) * | 2020-09-23 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Resource updating method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112866415A (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112866415B (en) | Data backup private cloud storage and downloading method | |
US10387213B2 (en) | Dispersed storage network secure hierarchical file directory | |
US10416889B2 (en) | Session execution decision | |
US10325110B2 (en) | Distributing registry information in a dispersed storage network | |
US9740730B2 (en) | Authorizing distributed task processing in a distributed storage network | |
US10108484B2 (en) | Detecting storage errors in a dispersed storage network | |
US9762395B2 (en) | Adjusting a number of dispersed storage units | |
CN104603740B (en) | Filing data identifies | |
US9063968B2 (en) | Identifying a compromised encoded data slice | |
US8966194B2 (en) | Processing a write request in a dispersed storage network | |
US20210326043A1 (en) | Dynamically Adjusting Storage Resources In A Vast Storage Network | |
US10558581B1 (en) | Systems and techniques for data recovery in a keymapless data storage system | |
US11928230B2 (en) | Adjusting efficiency of storing data | |
CN111565144A (en) | Data layered storage management method for instant communication tool | |
CN116522308A (en) | Database account hosting method, device, computer equipment and storage medium | |
CN112613049B (en) | Unified cloud storage system based on block chain and method for realizing data security | |
CN115694878A (en) | Data transmission method, equipment and storage medium | |
CN114374706B (en) | Content security management method based on distributed architecture | |
Chouhan et al. | Reliable verification of distributed encoded data fragments in the cloud | |
CN117972649A (en) | Universal software authentication method based on conventions | |
CN115834571A (en) | File transmission method and device based on block chain | |
CN114448712A (en) | Method and device for realizing security gateway of interplanetary file system | |
CN118113516A (en) | Cross-platform service backup and recovery method | |
CN116318889A (en) | Network security protection method integrating media platform | |
CN117997749A (en) | Domestic operating system terminal domain group policy distribution method and device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |