CN116962042A - Data sharing platform - Google Patents
Data sharing platform Download PDFInfo
- Publication number
- CN116962042A CN116962042A CN202310913334.7A CN202310913334A CN116962042A CN 116962042 A CN116962042 A CN 116962042A CN 202310913334 A CN202310913334 A CN 202310913334A CN 116962042 A CN116962042 A CN 116962042A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- module
- public key
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 37
- 230000005540 biological transmission Effects 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 21
- 230000004927 fusion Effects 0.000 claims abstract description 5
- 238000007726 management method Methods 0.000 claims description 26
- 238000013500 data storage Methods 0.000 claims description 24
- 238000000034 method Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 15
- 238000004458 analytical method Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 8
- 238000004140 cleaning Methods 0.000 claims description 6
- 238000007781 pre-processing Methods 0.000 claims description 6
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000008054 signal transmission Effects 0.000 claims description 4
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 230000002776 aggregation Effects 0.000 claims description 3
- 238000004220 aggregation Methods 0.000 claims description 3
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data sharing platform, which relates to the technical field of data sharing and metadata management and comprises a database, wherein a key management module is in communication connection with a connecting end of the database, a data processing module is in communication connection with a connecting end of the key management module, the data processing module is in communication connection with a file sharing server, the file sharing server is in communication connection with a client port, the data are encrypted and protected layer by layer through SHA algorithm encryption, public key, data encryption and protection through the key management module, the stability of the data transmission process is ensured, the situation that data are intercepted or attacked in midway is not generated, the data are decrypted by the file sharing server after corresponding data are obtained by a designated user through the data driving program, the decrypted data are restored to the inside of the database through the data driving program, further data arrangement and fusion are carried out, and the data are prevented from being lost.
Description
Technical Field
The invention relates to the technical field of data sharing and metadata management, in particular to a data sharing platform.
Background
The background of the data sharing platform can be traced to the rise of a big data age, along with the rapid development of the Internet and information technology, more and more organizations and institutions accumulate a large amount of data resources, the data contain valuable knowledge and findings, and huge values can be brought to the fields of enterprise decision making, scientific research, government management and the like, however, due to the barriers and isolation of the data, a plurality of data cannot be fully utilized and shared, the data mainly exists in each organization, and the format, standard and authority are different, so that the data are difficult to be mutually used. In addition, security and privacy protection of data are also a major difficulty faced by data sharing, so that in order to solve these problems, a data sharing platform is created, and is aimed at providing a safe and reliable environment for different organizations and individuals, promoting sharing and communication of data, and ensuring security of data in transmission and storage processes by adopting advanced technical means, such as encryption, identity verification, access control and the like, and meanwhile, providing functions of data integration, processing, analysis and the like, so that users can better understand and utilize data.
Through retrieval, the bulletin number CN107770170B discloses a data sharing platform system, and the invention proposes that' through adopting a TCP/UDP protocol, the system is easy to program, has strong universality and easy control authority, encrypts the transmitted data through a transmission layer protocol https, improves the security of downloading the data, encrypts the data transmission information by adopting a secret key, then encrypts the secret key and the information by using an RSA encryption module, and after receiving the information, a user utilizes node management to allocate and regulate the nodes when transmitting the data to a data port, thereby maximally improving the efficiency of data transmission, and adopts a micro-network to create a storage module of flash memory particles by a multilayer split technology. "
According to the data sharing platform system, the transmitted data is encrypted through the TCP/UDP protocol, so that the security of the downloaded data is improved, the risk of leakage, abuse or attack of the data in the transmission, storage and processing processes is still possibly encountered, and the transmitted data cannot be returned to the inside of the database again after the data are transmitted, so that the problem of data loss is easily caused.
Disclosure of Invention
The invention aims to provide a data sharing platform so as to solve the problems that the data provided in the background art possibly has risks of leakage, misuse or attack in the transmission, storage and processing processes, and the data cannot return to the inside of a database after transmission, so that the data is easy to lose.
In order to achieve the above purpose, the present invention provides the following technical solutions: the system comprises a database, wherein a key management module is in communication connection with a connecting end of the database, a data processing module is in communication connection with a connecting end of the key management module, the data processing module is in communication connection with a file sharing server, and the file sharing server is in communication connection with a client port;
the database provides powerful inquiry and analysis functions, can perform complex condition inquiry and aggregation analysis on data, is internally connected with a storage module in a communication manner, is connected with an encryption module in a communication manner at the connection end of the storage module, and can encrypt the data stored in the database in a communication output manner to prevent interception or attack of hackers during data transmission;
the key management module is responsible for generating and distributing a key for encrypting and decrypting data, can generate a key with high security intensity, ensures that the key is safely transmitted to each node needing to encrypt or decrypt the data, and the key management system allows an administrator to carry out authority control on the key so as to ensure that only authorized users or systems can use a specific key, thus limiting the access range of the data and improving the confidentiality of the data and the fineness of authority management;
the data processing module is responsible for cleaning and preprocessing the original data, including removing repeated data, processing missing values and abnormal values, converting formats and the like, and can improve the quality and accuracy of the data through data cleaning and preprocessing, thereby laying a foundation for subsequent analysis and application;
the file sharing server pays attention to the security and authority management of the file, ensures that only authorized users can access and download the file through means of identity authentication, access control, encryption and the like, can set different authority levels, limits the modification, deletion and sharing operations of the user on the file, and protects the security of sensitive information and intellectual property rights;
the client port user can be connected to the data sharing platform and carries out login authentication, after the access authority is obtained, the user can browse, search and access the data resources stored on the platform, the client port provides the functions of uploading and downloading data, the user can upload local data to the sharing platform or download required data files from the platform through the client, and the data files are all encrypted data files.
Preferably, the key management module comprises SHA algorithm encryption, a public key and data encryption and protection, wherein the SHA algorithm encryption is in communication connection with the public key, the public key is in communication connection with the data encryption and protection, the SHA algorithm encryption can carry out hash calculation on data to generate a unique hash value, in the data sharing platform, the hash value of the data can be calculated by using SHA algorithm encryption and stored on the platform, when a user downloads the data, the data integrity can be verified by calculating the hash value of the data again and comparing the hash value with the hash value stored on the platform, and the data is ensured not to be tampered or damaged in the transmission process.
Preferably, the public key is used for encrypting data in an asymmetric encryption algorithm RSA, and in the data sharing platform, when a user needs to share sensitive data with other users, the public key of a receiver can be used for encrypting the data, so that only the receiver with the corresponding private key can decrypt and view the data, and confidentiality and privacy of the data can be effectively protected.
Preferably, the data encryption and protection data sharing platform may contain a large amount of sensitive information and personal privacy data, and through data encryption, the data can be converted into an encrypted form, unauthorized access and theft are prevented in the transmission and storage processes, and only authorized users can decrypt the data by using corresponding keys, so that only legal receivers can obtain the original data.
Preferably, the data processing module comprises a data storage module and a data exchange module, wherein the data storage module is in communication connection with the data exchange module, and the data storage module and the data exchange module exchange and store data by mutually transmitting signals.
Preferably, the data storage module can receive and securely store encrypted data, and provides a reliable storage facility to ensure that the data is correctly stored inside the platform, preventing data loss or corruption.
Preferably, the data exchange module can convert the format of the data transmitted to the data storage module by the data exchange module, so that different systems or applications can understand and process the data, and the data exchange module realizes the interoperability and compatibility of the data by converting one data format into another data format.
The application method of the data sharing platform comprises the following steps:
s1, firstly, a user needs to input an effective user name and password to log in the data sharing platform, and searches for required information by searching, when the user wants to use the information, the database prepares and sorts the data required by the user, the data can enter an encryption state through SSL/TLS protocol, and the data is encrypted through SHA algorithm.
S2, after encryption is completed, the encrypted data are transmitted to a public key through signal transmission to carry out public key encryption, the data can be converted into a public key encryption form through public key encryption, unauthorized access and theft are prevented in the transmission and storage processes, only authorized users can use the corresponding keys to decrypt, and only legal receivers can be ensured to obtain the original data.
S3, after the encryption of the public key is completed, the encrypted data is communicated and transmitted to the inside of data encryption and protection, a protection process of the encrypted data is realized, the encrypted data is transmitted to the data storage module, and the data storage module can provide a reliable storage facility to ensure that the data is correctly stored in the platform.
S4, the stored data can be converted from one data format to another data format by transmitting the stored data to the data exchange module, so that the data can be transmitted into the data port, the data port sends the data into the client port through the key appointed by the user according to the user IP address appointed in the access port to the file sharing server for sharing the data.
S5, after the user obtains the corresponding data, the file sharing server can repeat the same steps to decrypt the data, and the decrypted data is restored to the inside of the database through the data driver to carry out further data arrangement and fusion.
Compared with the prior art, the invention has the beneficial effects that: a data sharing platform is characterized in that a key management module is arranged, data is encrypted and protected layer by layer through SHA algorithm encryption, public keys and data encryption and protection, stability of a data transmission process is guaranteed, and the situation that data is intercepted or attacked in a midway mode is avoided.
After the specified user obtains corresponding data, the file sharing server can repeat the same steps to decrypt the data, and the decrypted data is restored to the inside of the database through the data driving program to carry out further data arrangement and fusion, so that the data cannot be lost.
Drawings
FIG. 1 is a schematic diagram of the overall construction of the present invention;
FIG. 2 is a schematic diagram of the overall structure of the present invention;
in the figure: 1. a database; 2. a key management module; 201. encryption by SHA algorithm; 202. a public key; 203. data encryption and protection; 3. a data processing module; 301. a data storage module; 302. a data exchange module; 4. a file sharing server; 5. a client port.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-2, the present invention provides a technical solution: the system comprises a database 1, wherein a key management module 2 is in communication connection with a connecting end of the database 1, a data processing module 3 is in communication connection with a connecting end of the key management module 2, a file sharing server 4 is in communication connection with the data processing module 3, and a client port 5 is in communication connection with the file sharing server 4;
the database 1 provides powerful inquiry and analysis functions, can perform complex condition inquiry and aggregation analysis on data, the inside of the database 1 is connected with a storage module in a communication way, the connection end of the storage module is connected with an encryption module in a communication way, and the encryption module can encrypt the data stored in the database 1 in a communication output way so as to prevent interception or attack of hackers in the data transmission way;
the key management module 2 is responsible for generating and distributing a key for encrypting and decrypting data, can generate a key with high security intensity, ensures that the key is safely transmitted to each node needing to encrypt or decrypt the data, and the key management system allows an administrator to carry out authority control on the key so as to ensure that only authorized users or systems can use a specific key, thus limiting the access range of the data and improving the confidentiality of the data and the fineness of authority management;
the data processing module 3 is responsible for cleaning and preprocessing the original data, including removing repeated data, processing missing values and abnormal values, converting formats and the like, and can improve the quality and accuracy of the data through data cleaning and preprocessing, thereby laying a foundation for subsequent analysis and application;
the file sharing server 4 pays attention to the security and authority management of the file, ensures that only authorized users can access and download the file through means of identity authentication, access control, encryption and the like, can set different authority levels, limits the modification, deletion and sharing operations of the user on the file, and protects the security of sensitive information and intellectual property rights;
the client port 5 is provided with the functions of uploading and downloading data, the user can upload local data to the sharing platform or download required data files from the platform through the client, and the data files are encrypted data files.
Further, the key management module 2 includes an SHA algorithm encryption 201, a public key 202, and a data encryption and protection 203, where the SHA algorithm encryption 201 is in communication connection with the public key 202, and the public key 202 is in communication connection with the data encryption and protection 203, the SHA algorithm encryption 201 can perform hash computation on data to generate a unique hash value, in the data sharing platform, the SHA algorithm encryption 201 can be used to calculate the hash value of the data and store the hash value on the platform, and when a user downloads the data, the user can verify the integrity of the data by calculating the hash value of the data again and comparing the hash value with the hash value stored on the platform, so as to ensure that the data is not tampered or damaged in the transmission process, and ensure the integrity of the data.
Further, the public key 202 is used for encrypting data in the asymmetric encryption algorithm RSA, in the data sharing platform, when a user needs to share sensitive data with other users, the public key 202 of the receiver can be used for encrypting the data, so that only the receiver with the corresponding private key can decrypt and view the data, confidentiality and privacy of the data can be effectively protected, and the data can be ensured to fall into hands of a user.
Furthermore, the data encryption and protection 203 may include a large amount of sensitive information and personal privacy data in the data sharing platform, and through data encryption, these data can be converted into an encrypted form, so that unauthorized access and theft are prevented in the transmission and storage process, and only authorized users can decrypt by using the corresponding keys, so that only legal receivers can obtain the original data, and the integrity and security of the data can be further ensured.
Further, the data processing module 3 includes a data storage module 301 and a data exchange module 302, where the data storage module 301 and the data exchange module 302 are in communication connection, and the data storage module 301 and the data exchange module 302 implement exchange and storage of data by mutually transmitting signals, and can ensure data sharing between the data storage module 301 and the data exchange module 302 in real time through communication connection.
Further, the data storage module 301 can receive and securely store encrypted data, and it provides a reliable storage facility, so as to ensure that the data is correctly stored in the platform, prevent the data from being lost or damaged, and ensure the integrity of the data.
Further, the data exchange module 302 can convert the format of the data transmitted to itself by the data storage module 301, so that different systems or applications can understand and process the data, and the data exchange module 302 realizes the interoperability and compatibility of the data by converting from one data format to another data format, thereby achieving the purpose of data sharing.
The application method of the data sharing platform comprises the following steps:
s1, firstly, a user needs to input an effective user name and password to log in a data sharing platform, and searches for required information by searching, when the user wants to use the information, the database 1 prepares and sorts the data required by the user, the data can enter an encryption state through SSL/TLS protocol, the data is encrypted through SHA algorithm encryption 201, and unauthorized personnel can be prevented from accessing and acquiring sensitive data through encryption.
S2, after encryption is completed, the encrypted data is transmitted to the public key 202 through signal transmission for public key encryption, the data can be converted into a public key encryption form through public key encryption, unauthorized access and theft are prevented in the transmission and storage processes, only authorized users can use the corresponding keys for decryption, only legal receivers can be ensured to obtain the original data, and the final transmission of the data to appointed demand personnel can be ensured.
S3, after the encryption of the public key is completed, the encrypted data is communicated and transmitted to the inside of the data encryption and protection 203, a protection process of the encrypted data is realized, and the encrypted data is transmitted to the data storage module 301, and the data storage module 301 can provide a reliable storage facility to ensure that the data is correctly stored in the platform and prevent the data from being lost or damaged.
S4, the stored data can be converted from one data format to another data format by transmitting the data to the data exchange module 302, so that the data is transmitted into the data port, the data port sends the data into the client port 5 for sharing the data by the key appointed by the user according to the user IP address appointed in the access port, and the data security is further ensured.
S5, after the user obtains the corresponding data, the file sharing server 4 can repeat the same steps to decrypt the data, and the decrypted data is restored to the inside of the database 1 through the data driver to further sort and fuse the data, and meanwhile, the user' S demand for information is tracked to push related information.
Working principle: firstly, a user needs to input a valid user name and password to log in a data sharing platform, searching for required information, when the user wants to use the information, preparing and arranging data required by the user by the database 1, enabling the data to enter an encryption state through SSL\TLS protocol, encrypting the data through SHA algorithm encryption 201, transmitting the encrypted data to a public key 202 through signal transmission to encrypt the public key after encryption is finished, encrypting the public key, converting the data into a public key encryption form, preventing unauthorized access and theft in the transmission and storage processes, decrypting by only authorized users by using corresponding keys, ensuring that only legal receivers can obtain original data, transmitting encrypted data communication to the inside of data encryption and protection 203 after encryption of the public key is finished, realizing the protection function of encrypted data and transmitting the encrypted data into the data storage module 301, the data storage module 301 can provide a reliable storage facility to ensure that the data is correctly stored in the platform to prevent the data from being lost or damaged, the stored data can be converted from one data format to another data format by transmitting the stored data to the data exchange module 302 so as to be transmitted into a data port, the data port transmits the data into the file sharing server 4 according to the user IP address appointed in the access port, the data is transmitted into the client port 5 for sharing the data through the key appointed by the user, after the user obtains the corresponding data, the file sharing server 4 can repeat the same steps to decrypt the data, and the decrypted data is restored into the database 1 through the driver of the database 1, further data arrangement and fusion are performed.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. The data sharing platform comprises a database (1), and is characterized in that a key management module (2) is connected to a connecting end of the database (1) in a communication mode, a data processing module (3) is connected to a connecting end of the key management module (2) in a communication mode, a file sharing server (4) is connected to the data processing module (3) in a communication mode, and a client port (5) is connected to the file sharing server (4) in a communication mode;
the database (1) provides powerful inquiry and analysis functions, can perform complex condition inquiry and aggregation analysis on data, the database (1) is internally connected with a storage module in a communication manner, the connection end of the storage module is connected with an encryption module in a communication manner, and the encryption module can encrypt the data stored in the database (1) in a communication output manner, so that interception or attack of a hacker is prevented during data transmission;
the key management module (2) is responsible for generating and distributing keys for data encryption and decryption, can generate keys with high security intensity, ensures the secure transmission of the keys to each node needing to encrypt or decrypt data, and the key management system allows an administrator to carry out authority control on the keys so as to ensure that only authorized users or systems can use specific keys, thus limiting the access range of the data and improving the confidentiality of the data and the fineness of authority management;
the data processing module (3) is responsible for cleaning and preprocessing the original data, including removing repeated data, processing missing values and abnormal values, converting formats and the like, and can improve the quality and accuracy of the data through data cleaning and preprocessing, thereby laying a foundation for subsequent analysis and application;
the file sharing server (4) pays attention to the security and authority management of the files, ensures that only authorized users can access and download the files through means of identity authentication, access control, encryption and the like, can set different authority levels, limits the modification, deletion and sharing operations of the users on the files, and protects the security of sensitive information and intellectual property rights;
the client port (5) can be connected to the data sharing platform for login authentication, and can browse, search and access the data resources stored on the platform after the access authority is obtained, the client port (5) provides the functions of uploading and downloading data, and the user can upload local data to the sharing platform or download required data files from the platform through the client, wherein the data files are encrypted data files.
2. The data sharing platform according to claim 1, wherein the key management module (2) comprises a SHA algorithm encryption (201), a public key (202) and a data encryption and protection (203), the SHA algorithm encryption (201) is in communication connection with the public key (202), the public key (202) is in communication connection with the data encryption and protection (203), the SHA algorithm encryption (201) can perform hash computation on data to generate a unique hash value, in the data sharing platform, the SHA algorithm encryption (201) can be used for calculating the hash value of the data and storing the hash value on the platform, and when a user downloads the data, the hash value of the data can be calculated again and compared with the hash value stored on the platform to verify the integrity of the data, so that the data is not tampered or damaged in the transmission process.
3. A data sharing platform according to claim 2, wherein the public key (202) is used for encrypting data in an asymmetric encryption algorithm RSA, in which when a user needs to share sensitive data with other users, the public key (202) of the receiver can be used to encrypt the data, so that only the receiver having the corresponding private key can decrypt and view the data, thus effectively protecting confidentiality and privacy of the data.
4. A data sharing platform according to claim 2, characterized in that the data encryption and protection (203) data sharing platform may contain a lot of sensitive information and personal privacy data, which data can be converted into encrypted form by data encryption, unauthorized access and theft are prevented during transmission and storage, only authorized users can decrypt with the corresponding keys, ensuring that only legitimate receivers can obtain the original data.
5. A data sharing platform according to claim 1, wherein the data processing module (3) comprises a data storage module (301) and a data exchange module (302), the data storage module (301) and the data exchange module (302) are in communication connection, and exchange and storage of data are realized by mutually transmitting signals.
6. A data sharing platform according to claim 5, wherein the data storage module (301) is adapted to receive and securely store encrypted data, and provides a reliable storage facility to ensure that data is correctly stored within the platform to prevent loss or corruption of data.
7. A data sharing platform according to claim 6, characterized in that the data exchange module (302), the data exchange module (302) can convert the format of the data transmitted to itself by the data storage module (301) to enable different systems or applications to understand and process the data, the data exchange module (302) achieving interoperability and compatibility of the data by converting from one data format to another.
The application method of the data sharing platform comprises the following steps:
s1, firstly, a user needs to input an effective user name and password to log in a data sharing platform, and searches for required information by searching, when the user wants to use the information, a database (1) prepares and sorts data required by the user, the data can enter an encryption state through SSL/TLS protocol, and encryption of the data is carried out through SHA algorithm encryption (201).
S2, after encryption is completed, the encrypted data is transmitted to a public key (202) through signal transmission for public key encryption, the data can be converted into a public key encryption form through public key encryption, unauthorized access and theft are prevented in the transmission and storage processes, only authorized users can use the corresponding keys for decryption, and only legal receivers can be ensured to obtain the original data.
S3, after the public key encryption is completed, the encrypted data is communicated and transmitted to the inside of the data encryption and protection (203), a protection process of the encrypted data is realized, the encrypted data is transmitted to the data storage module (301), and the data storage module (301) can provide a reliable storage facility to ensure that the data is correctly stored in the platform.
S4, the stored data can be converted from one data format to another data format by transmitting the stored data to the data exchange module (302), so that the data is transmitted into the data port, the data port sends the data into the client port (5) for sharing the data through a key appointed by a user according to the IP address of the user appointed in the access port, and the data is sent into the file sharing server (4).
S5, after the user obtains the corresponding data, the file sharing server (4) can repeat the same steps to decrypt the data, and the decrypted data is restored to the inside of the database (1) through the data driving program to carry out further data arrangement and fusion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310913334.7A CN116962042A (en) | 2023-07-25 | 2023-07-25 | Data sharing platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310913334.7A CN116962042A (en) | 2023-07-25 | 2023-07-25 | Data sharing platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116962042A true CN116962042A (en) | 2023-10-27 |
Family
ID=88442226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310913334.7A Pending CN116962042A (en) | 2023-07-25 | 2023-07-25 | Data sharing platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116962042A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118246918A (en) * | 2024-04-12 | 2024-06-25 | 四川融科智联科技有限公司 | Funds safety three-dimensional digital management platform with multiple defense mechanisms |
CN118279044A (en) * | 2024-04-15 | 2024-07-02 | 南京联合产权(科技)交易所有限责任公司 | Data processing method and system for data asset right mortgage |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130108679A (en) * | 2012-03-23 | 2013-10-07 | 주식회사 우리은행 | Data sharing system using a tablets apparatus and controlling method therefor |
CN103561034A (en) * | 2013-11-11 | 2014-02-05 | 武汉理工大学 | Secure file sharing system |
CN112994872A (en) * | 2021-04-26 | 2021-06-18 | 北京电信易通信息技术股份有限公司 | Key management method and system for mobile terminal platform |
CN113676453A (en) * | 2021-07-17 | 2021-11-19 | 中国人民解放军战略支援部队信息工程大学 | Data encryption system and method for data resource safety access |
-
2023
- 2023-07-25 CN CN202310913334.7A patent/CN116962042A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130108679A (en) * | 2012-03-23 | 2013-10-07 | 주식회사 우리은행 | Data sharing system using a tablets apparatus and controlling method therefor |
CN103561034A (en) * | 2013-11-11 | 2014-02-05 | 武汉理工大学 | Secure file sharing system |
CN112994872A (en) * | 2021-04-26 | 2021-06-18 | 北京电信易通信息技术股份有限公司 | Key management method and system for mobile terminal platform |
CN113676453A (en) * | 2021-07-17 | 2021-11-19 | 中国人民解放军战略支援部队信息工程大学 | Data encryption system and method for data resource safety access |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118246918A (en) * | 2024-04-12 | 2024-06-25 | 四川融科智联科技有限公司 | Funds safety three-dimensional digital management platform with multiple defense mechanisms |
CN118279044A (en) * | 2024-04-15 | 2024-07-02 | 南京联合产权(科技)交易所有限责任公司 | Data processing method and system for data asset right mortgage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6941146B2 (en) | Data security service | |
Sood | A combined approach to ensure data security in cloud computing | |
Kaaniche et al. | A secure client side deduplication scheme in cloud storage environments | |
CN109614818B (en) | Authorized identity-based keyword search encryption method | |
CN102687133B (en) | Containerless data for trustworthy computing and data services | |
JP6678457B2 (en) | Data security services | |
CN116962042A (en) | Data sharing platform | |
CN106529327A (en) | Data access system and method oriented to encryption database under hybrid cloud environment | |
EP3035641A1 (en) | Method for file upload to cloud storage system, download method and device | |
CN113541935B (en) | Encryption cloud storage method, system, equipment and terminal supporting key escrow | |
CN114595205A (en) | Block chain-based power system log partition storage and retrieval verification method | |
CN100414540C (en) | System and method for analyzing and abstracting data evidence | |
CN105049448B (en) | Single-sign-on device and method | |
CN115174600A (en) | Ciphertext data encryption and safe retrieval method and device for cloud storage system | |
Feng et al. | Autonomous vehicles' forensics in smart cities | |
Benouar et al. | Robust blockchain for IoT security | |
WO2018080857A1 (en) | Systems and methods for creating, storing, and analyzing secure data | |
CN115865461A (en) | Method and system for distributing data in high-performance computing cluster | |
Apirajitha et al. | On developing Block‐Chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud | |
Nandini et al. | Implementation of hybrid cloud approach for secure authorized deduplication | |
Hamdi et al. | A security novel for a networked database | |
CN117768119B (en) | Searchable encryption identity authentication method based on semi-quantum entanglement | |
Rajani et al. | Integrity verification & distributed accountability in high performance distributed clouds | |
CN109840423B (en) | Recording method, device and equipment of data relationship | |
Bramhe et al. | Multi-Cloud Secure Data storage using Cryptographic Techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |