WO2014135010A1 - 一种数据隐藏存储的方法及系统 - Google Patents

一种数据隐藏存储的方法及系统 Download PDF

Info

Publication number
WO2014135010A1
WO2014135010A1 PCT/CN2014/072342 CN2014072342W WO2014135010A1 WO 2014135010 A1 WO2014135010 A1 WO 2014135010A1 CN 2014072342 W CN2014072342 W CN 2014072342W WO 2014135010 A1 WO2014135010 A1 WO 2014135010A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
memory
size
encrypted
controller
Prior art date
Application number
PCT/CN2014/072342
Other languages
English (en)
French (fr)
Inventor
胡加明
Original Assignee
苏州阔地网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州阔地网络科技有限公司 filed Critical 苏州阔地网络科技有限公司
Publication of WO2014135010A1 publication Critical patent/WO2014135010A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the invention belongs to the field of Langshi communication, and in particular relates to a method and system for data hiding storage.
  • the present invention provides a data hiding storage method and system to solve the above problems.
  • the present invention provides a method of data hiding storage, including the following steps.
  • the client generates an encrypted file of the file to be stored according to the first policy and sends the encrypted file to the controller.
  • the controller acquires the memory storage space size and the number of clusters. If the size of the remaining storage space of the memory is greater than or equal to the size of the encrypted file, the controller obtains a file allocation table according to the second policy and sends the encrypted file and the file allocation table to the file distributor.
  • the file allocator stores the encrypted file in a cluster in the remaining memory space of the memory according to the received file allocation table and the encrypted file.
  • the invention provides a data hiding storage system, comprising a client, a controller, a file distributor and a memory, wherein the client is connected to the controller, the controller is respectively connected to a file distributor and a memory, and the file distributor is connected Memory.
  • the client is configured to generate an encrypted file of the file to be stored according to the first policy and send the encrypted file to the controller.
  • the controller is configured to obtain a memory storage space size and a cluster number, and is further configured to: if the memory remaining storage space size is greater than or equal to the encrypted file size, obtain a file allocation table according to the second policy, and encrypt the file The file and the file allocation table are sent to the file allocator.
  • the file allocator is configured to store the encrypted file into a cluster in a remaining storage space of the memory according to the received file allocation table and the encrypted file.
  • the memory is configured to provide the controller with a remaining storage space size and a cluster number; and is further configured to store an encrypted file.
  • the client Compared with the prior art, according to the data hiding storage method and system provided by the present invention, the client generates an encrypted file to be stored and sends the encrypted file to the controller according to the first policy.
  • the controller obtains the size of the remaining storage space of the memory and the number of clusters. If the size of the remaining storage space of the memory is greater than or equal to the size of the encrypted file, the controller according to the second policy, Obtain a file allocation table and send the encrypted file and file allocation table to the file allocator.
  • the file allocator stores the encrypted file in a cluster in the storage space of the memory according to the received file allocation table and the encrypted file, thereby realizing data security.
  • FIG. 1 is a flow chart showing a method of data hiding storage provided in accordance with a preferred embodiment of the present invention
  • FIG. 2 is a schematic view of a parabola provided in accordance with a preferred embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a system for data hiding storage provided in accordance with a preferred embodiment of the present invention. Specific head application
  • FIG. 1 is a flow chart of a method of data hiding storage provided in accordance with a preferred embodiment of the present invention. As shown in FIG. 1, the data hiding storage method provided by the preferred embodiment of the present invention includes a step 104.
  • Step 101 The client generates an encrypted file according to the first policy, and sends the encrypted file to the controller.
  • the process of generating an encrypted file by the client according to the first policy is as follows: the client divides the number of blocks according to a preset, and performs a block-by-blocking algorithm to block the files to be stored, and then combines the files; Adding a check code (defined as: first data) at the beginning and end of the combined file block; calculating a file signature of the first data by using the MD5 algorithm (defined as: second data): combining the first data of the main body, preparing the first Data and second data, obtaining an encrypted file.
  • a check code defined as: first data
  • the method of dividing the to-be-stored file by the blocking algorithm according to the preset number of partitioning blocks is as follows: taking the remainder of [ ⁇ ], and dividing the file to be stored, where V represents Store the data bit order in the file, ⁇ is the default number of split blocks.
  • the file to be stored on the client is "a method and system for storing a file invisible encryption”
  • the number of preset partitions is 3
  • the three divided data blocks are respectively a file block with a remainder of 0 and a remainder.
  • the client takes the remainder of [ ⁇ ], for example: "The data bit order of the "one” in the file to be stored is], then the remainder of ⁇ 1/3] is 1, then put "one" into the file with the remainder of 1.
  • Block 2 "species” in the file to be stored in the data bit order is 2, then the remainder of [2/3] is 2, then put “species” into the file block 3 with a remainder of 2; "text” is waiting If the data bit order in the storage file is 3, then the remainder of [3/3] is 0, then the "text” is placed in the file block 1 with the remainder 0, and so on, to obtain the file block: File block 1 with a remainder of 0
  • the genre storage system is a hidden sum of one storage method.
  • a check code is added at the beginning and end of the combined file block, and is defined as the first data: the BEGI genre is a hidden and END.
  • the MD5 algorithm is used to calculate the file signature of the first data, and is defined as the second data, as shown by T: 5721.9DFEB567EE470DDA2824:F0270A5E.
  • Step 102 The controller acquires a memory storage space size and a cluster number.
  • the controller after receiving the encrypted file sent by the client, the controller sends a query request to the memory; the memory feeds back a query response to the controller, where the query response carries a memory storage space size And the number of clusters.
  • the memory obtains the number of clusters according to the storage space size of the preset single cluster and the size of the remaining storage space.
  • the number of clusters is 4M /4K - 1024 c,
  • Step 103 If the size of the remaining storage space of the memory is greater than or equal to the size of the encrypted file, the controller obtains a file allocation table according to the second policy, and sends the encrypted file and the file allocation table to the file distributor.
  • the controller compares the size of the remaining storage space of the memory with the size of the encrypted file. If the size of the remaining storage space of the memory is smaller than the size of the encrypted file, the controller returns an error prompt to the client.
  • the controller compares the size of the remaining storage space of the memory to be greater than or equal to the size of the encrypted file, the controller obtains the file allocation table according to the second policy: the controller obtains a file allocation table according to ⁇ ydx, where xl ⁇ ⁇ is a positive integer; y:: x 2 -; -bx+c ( a ⁇ 0 ) , x represents the first cluster, and y represents the value corresponding to x.
  • the remaining storage space of the memory has 1024 clusters.
  • the area of the intersection of the parabola and the X axis in this embodiment,
  • Step 104 The file allocator stores the encrypted file into a cluster in a remaining storage space of the memory according to the received file allocation table and the encrypted file.
  • the file allocator stores the encrypted file in a cluster in a remaining storage space of the memory according to the received file allocation table and the encrypted file: the file allocator queries file allocation The size of the encrypted file to be stored corresponding to each cluster in the table is obtained, and the encrypted files of the corresponding size are sequentially stored in the corresponding clusters of the memory.
  • the data hiding storage system provided by the preferred embodiment of the present invention includes a client 201, a controller 202, a file distributor 203, and a memory 204.
  • the client 201 is connected to the controller 202, and the control is performed.
  • the device 202 is connected to a file distributor 203 and a memory 204, respectively, and the file distributor 203 is connected to the memory 204.
  • the client 201 is configured to generate an encrypted file to be stored in the file according to the first policy, and send the encrypted file to the controller 202.
  • the controller 202 is configured to obtain the remaining storage space size and the number of clusters of the memory 204, and further, if the remaining storage space size of the memory 204 is greater than or equal to the encrypted file size, obtain a file allocation table according to the second policy, and The encrypted file and the file allocation table are sent to the file distributor 203.
  • the file allocator 203 is configured to store the encrypted file into a cluster in a remaining storage space of the memory 204 according to the received file allocation table and the encrypted file.
  • the memory 204 is configured to provide the controller 202 with the remaining storage space size and the number of clusters, and ffl to store the encrypted file.
  • the client generates an encrypted file according to the first policy and sends the encrypted file to the controller.
  • Controller acquires memory remaining storage The size of the space and the number of clusters. If the size of the remaining storage space of the memory is greater than or equal to the size of the encrypted file, the controller obtains the file allocation table according to the second policy and sends the encrypted file and the file allocation table to the file allocator.
  • the file allocator stores the encrypted file in a cluster in the remaining storage space of the memory according to the received file allocation table and the encrypted file, thereby realizing data security.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明提供一种数据隐藏存储的方法及系统,本发明方法包括以下步骤。客户端根据第一策略,将待存储文件生成加密文件并将所述加密文件发送至控制器。所述控制器获取存储器剩余存储空间大小及簇个数。若存储器剩余存储空间大小大于或等于所述加密文件大小,则所述控制器根据第二策略,获得文件分配表并将所述加密文件及所述文件分配表发送至文件分配器。所述文件分配器根据接收的所述文件分配表及所述加密文件,将所述加密文件存储至存储器剩余存储空间中的簇中。

Description

一种数据隐藏存储的方法及系统 技术领域
本发明属于郎时通信领域, 尤其涉及一种数据隐藏存储的方法及系统。
随着网络化社会的不断进步, 越来越多的即时通讯工具应用到工作和生活中, 比如飞信、
MSN和一些企业版应用软件等。 在实际应用中, 文件存储的安全性对于视频会议的使用起着 至关重要的作用。 现有技术中, 人 ί门会将文件存储在预先划分好的保留区, 这种方法在一定 程度上提升了文件存储的安全性, 但由于存储文件时缺乏合理的加密及划分方法, 仍然不能 防止保留区的数据被非法读取或修改。 发明内容
本发明提供一种数据隐藏存储的方法及系统以解决上述问题。
本发明提供一种数据隐藏存储的方法, 包括以下歩骤。 客户端根据第一策略, 将待存储 文件生成加密文件并将所述加密文件发送至控制器。 所述控制器获取存储器剰余存储空间大 小及簇个数。 若存储器剩余存储空间大小大于或等于所述加密文件大小, 则所述控制器根据 第二策略, 获得文件分配表并将所述加密文件及所述文件分配表发送至文件分配器。 所述文 件分配器根据接收的所述文件分配表及所述加密文件, 将所述加密文件存储至存储器剩余存 储空间中的簇中。
本发明提供一种数据隐藏存储的系统, 包括客户端、 控制器、 文件分配器及存储器, 所 述客户端连接控制器, 所述控制器分别连接文件分配器及存储器, 所述文件分配器连接存储 器。 所述客户端, 用于根据第一策略, 将待存储文件生成加密文件并将所述加密文件发送至 控制器。 所述控制器, 用于获取存储器剩余存储空间大小及簇个数, 还用于若存储器剩余存 储空间大小大于或等于所述加密文件大小, 根据第二策略, 获得文件分配表并将所述加密文 件及所述文件分配表发送至文件分配器。 所述文件分配器, 用于根据接收的所述文件分配表 及所述加密文件, 将所述加密文件存储至存储器剩余存储空间中的簇中。 所述存储器, 用于 向所述控制器提供剩余存储空间大小及簇个数; 还用于存储加密文件。
相较于先前技术, 根据本发明提供的数据隐藏存储的方法及系统, 客户端根据第一策略, 将待存储文件生成加密文件并将加密文件发送至控制器。 控制器获取存储器剩余存储空间大 小及簇个数。若存储器剩余存储空间大小大于或等于加密文件大小, 则控制器根据第二策略, 获得文件分配表并将加密文件及文件分配表发送至文件分配器。 文件分配器根据接收的文件 分配表及加密文件, 将加密文件存储至存储器剰余存储空间中的簇中, 从而实现了数据安全
隞圏说明
此处所说明的附图.用来提供对本发明的进一步理解, 构成本申请的一部分, 本发明的示 意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在 '图中:
图 1所示为根据本发明的较佳实施例提供的数据隐藏存储的方法的流程图;
图 2所示为根据本发明的较佳实施例提供的抛物线的示意图;
图 3所示为根据本发明的较佳实施例提供的数据隐藏存储的系统的示意图。 具体头施方式
文中将参考 '图并结合实施例来详细说明本发明。需要说明的是, 在不冲突的情况 , 本申请中的实施例及实施例中的特征可以相互组合。
图 1所示为根据本发明的较佳实施例提供的数据隐藏存储的方法的流程图。如图 1所示, 本发明的较佳实施例提供的数据隐藏存储的方法包括步骤 10广104。
步骤 101 : 客户端根据第一策略, 将待存储文件生成加密文件并将所述加密文件发送至 控制器。
具体而言, 客户端根据第一策略, 将待存储文件生成加密文件的过程为: 客户端根据预 设分割块数, 通过分块算法, 对所述待存储文件进行分块后, 进行组合; 在组合后的文件块 的首尾加上校验码(定义为: 第一数据); 利用 MD5算法计算第一数据的文件签名 (定义为: 第二数据): 组合主第一数据、 备第一数据及第二数据, 获得加密文件。 其中, 客户端根据预 设分割块数, 通过分块算法, 对所述待存储文件进行分块的方式为: 取【ν 】余数, 对所述 待存储文件进行分块, 其中, V代表待存储文件中的数据位序, ί为预设分割块数。
举例而言, 若客户端的待存储文件为 "一种文件隐形加密存储的方法和系统", 预设分割 块数为 3 , 所述 3个分割数据块分别为余数为 0的文件块 1、 余数为 1的文件块 2及余数为 2 的文件块 3。 客户端取【^^】余数, 例如: "一"在待存储文件中的数据位序为】, 则取 ί 1/3】 的余数为 1, 则将 "一"放入余数为 1 的文件块 2; "种"在待存储文件中的数据位序为 2, 则取【2/3】 的余数为 2, 则将 "种"放入余数为 2的文件块 3 ; "文"在待存储文件中的数据 位序为 3 , 则取【3/3〗 的余数为 0, 则将 "文"放入余数为 0的文件块 1, 以此类推, 获得以 Τ文件块: 余数为 0的文件块 1 文形存方系
余数为 1的文件块 2 一件加储法统
余数为 2的文件块 3 种隐密的和
组合上述:三个文件块得到如下文件块: 文形存方系一件加储法统种隐密的和。 在所述组 合后的文件块的首尾加上校验码, 定义为第一数据: BEGI 文形存方系一件加储法统种隐密 的和 END。 利用 MD5 算法计算第-一数据的文件签名, 并定义为第二数据, 如 T所示: 5721.9DFEB567EE470DDA2824:F0270A5E。 组合主第一数据、 备第一数据及第二数据, 获得加密 文件为: BEG IN文形存方系一件加储法统种隐密的和 END BEG I 文形存方系一件加储法统种 隐密的和 E D57219DFEB567EE470DDA2824F0270A5Eo
步骤 102 : 所述控制器获取存储器剩余存储空间大小及簇个数。
具体而言, 所述控制器接收客户端发送的加密文件后, 向存储器发送查洵请求; 所述存 储器向所述控制器反馈查询响应, 其中, 所述查询响应中携带了存储器剩余存储空间大小及 簇个数。 于此, 所述存储器根据预设的单个簇的存储空间大小及剩余存储空间大小, 获得簇 的个数。 †算公式为, 簇的个数=存储器剩余存储空间大小 /单个簇的存储空间大小。
举例而言,若单个簇的存储空间大小为 4K,存储器剰余存储空间大小 4M ,则簇的个数 = 4M /4K - 1024 c,
步骤 103 : 若存储器剩余存储空间大小大于或等于所述加密文件大小, 则所述控制器根 据第二策略, 获得文件分配表并将所述加密文件及所述文件分配表发送至文件分配器。
具体而言, 控制器比较所述存储器剩余存储空间大小与加密文件大小, 若存储器剩余存 储空间大小小于所述加密文件大小, 所述控制器向所述客户端返回错误提示。
当控制器比较存储器剩余存储空间大小大于或等于所述加密文件大小时, 控制器根据第 二策略, 获得文件分配表的过程为: 所述控制器根据 Γ ydx , 获得文件分配表, 其中, x l ϋ χ为正整数; y:: x 2-;-bx+c ( a<0 ) , x代表第几个簇, y代表 x对应的值。
举例而言, 假设加密文件大小为 2M, 存储器的剩余存储空间大小为 若单个簇的存储 空间大小为 4K, 则存储器的剩余存储空间有 1024个簇。 函数 y=ax 2+bx+C ( a<0 ) 的抛物线与 X轴的交集的面积即为加密文件大小, 即 2M。 于此, 所述抛物线与 X轴的交点坐标为(0> 0) 及(i024, 0) , 由此可得所述抛物线表达式为 y=¾ (x- - 0) (X 1024) , 即 γ: ax2 - 1024ax。 所述抛 物 线 与 X 轴 的 交 集 的 面 积 , 于 本 实 施 例 中 , 即
Figure imgf000005_0001
2048- ί1024(ίϊ 2 ~ 1024α )ί& , 计算获得;^ 3/51.22 , 则所述函数式尸 - 3/5122 χ2 ÷3/256χ。 抛物 Jo '
线如图 2所示: ΐ·本实施例中, 「 f ..(-^-- 2 +-=^x)dx , 则第 1个簇上待存储的加密文件大/
512^
(-3/5122 X2 Η-3/256Χ) dx=0, 00585556 KB , 第 2 个簇上待存储的加密 小为
(-3/5122 x2+3/256x)dx -0.017551422 KB, 依次类推, 第 1024个簇上待存储的加密文件
1024
大小为 f ( 3/5I22x2+3/256x)dx =0.00585556 KB。 获得文件分配表如下:
1023
Figure imgf000006_0001
步骤 104: 所述文件分配器根据接收的所述文件分配表及所述加密文件, 将所述加密文 件存储至存储器剩余存储空间中的簇中。
具体而言, 所述文件分配器根据接收的所述文件分配表及所述加密文件, 将所述加密文 件存储至存储器剩余存储空间中的簇中的过程为: 所述文件分配器查询文件分配表中各个簇 对应的待存储的加密文件大小,获取对应大小的加密文件依次存储到所述存储器的对应簇中。
图 3所示为根据本发明的较佳实施例提供的数据隐藏存储的系统的示意图。如图 3所示, 本发明的较佳实施例提供的数据隐藏存储的系统包括客户端 201、 控制器 202、 文件分配器 203及存储器 204,所述客户端 201连接控制器 202,所述控制器 202分别连接文件分配器 203 及存储器 204, 所述文件分配器 203连接存储器 204。 所述客户端 201, 用于根据第一策略, 将待存储文件生成加密文件并将所述加密文件发送至控制器 202。所述控制器 202, 用于获取 存储器 204剩余存储空间大小及簇个数, 还用于若存储器 204剩余存储空间大小大于或等于 所述加密文件大小, 根据第二策略, 获得文件分配表并将所述加密文件及所述文件分配表发 送至文件分配器 203。所述文件分配器 203,用于根据接收的所述文件分配表及所述加密文件, 将所述加密文件存储至存储器 204剩余存储空间中的簇中。 所述存储器 204, 用于向所述控 制器 202提供剩余存储空间大小及簇个数, 还 ffl于存储加密文件。 关于上述系统的操作流程 同上述方法所述, 故于此不再赘述。
综上所述, 根据本发明较佳实施例提供的数据隐藏存储的方法及系统, 客户端根据第一 策略, 将待存储文件生成加密文件并将加密文件发送至控制器。 控制器获取存储器剩余存储 空间大小及簇个数。 若存储器剩余存储空间大小大于或等于加密文件大小, 则控制器根据第 二策略, 获得文件分配表并将加密文件及文件分配表发送至文件分配器。 文件分配器根据接 收的文件分配表及加密文件, 将加密文件存储至存储器剩余存储空间中的簇中, 从而实现了 数据安全性。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技术人员 来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的任何修改、 等 同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1、 一种数据隐藏存储的方法, 其特征在于, 包括以下步骤:
客户端根据第一策略, 将待存储文件生成加密文件并将所述加密文件发送至控制器; 所述控制器获取存储器剩余存储空间大小及簇个数;
若存储器剩余存储空间大小大于或等于所述加密文件大小,则所述控制器根据第二策略, 获得文件分配表并将所述加密文件及所述文件分配表发送至文件分配器;
所述文件分配器根据接收的所述文件分配表及所述加密文件, 将所述加密文件存储至存 储器剰余存储空间中的簇中。
2、 根据权利要求 1所述的方法, 其特征在于, 客户端根据第一策略, 将待存储文件生成 加密文件的过程为:
客户端根据预设分割块数, 通过分块算法, 对所述待存储文件进行分块后, 进行组合; 在组合后的文件块的首尾加上校验码 (定义为: 第一数据);
利.用 MD5算法计算第-一数据的文件签名 (定义为: 第二数据);
组合主第一数据、 备第一数据及第二数据, 获得加密文件。
3、 根据权利要求 2所述的方法,其特征在于,客户端根据预设分割块数,通过分块算法, 对所述待存储文件进行分块的方式为- 取【v/i】余数, 对所述待存储文件进行分块, 其中, V代表待存储文件中的数据位序, i 为预设分割块数。
4、 根据权利要求 1所述的方法, 其特征在于, 所述控制器获取存储器剩余存储空间大小 及簇个数的过程为:
所述控制器向所述存储器发送查询请求;
所述存储器向所述控制器反馈查询响应, 其中, 所述查询响应中携带了存储器剩余存储 空间大小及簇个数。
5、 根据权利要求 1所述的方法, 其特征在于, 所述存储器根据预设的单个簇的存储空间 大小及剩余存储空间大小, 获得簇的个数。
6、 根据权利要求 i所述的方法, 其特征在于, 所述文件分配表包括簇的序号及对应的待 存储的加密文件大小。
7、 根据权利要求 1所述的方法, 其特征在于, 所述控制器根据第二策略, 获得文件分配 表的过程为: 所述控制器根据 ,获得文件分配表,其中, χ 1 ϋ χ为正整数; y==ax2+bx- c ( a<0), X代表第几个簇, y代表 X对应的值。
8、根据权利要求 1所述的方法, 其特征在于, 所述文件分配器根据接收的所述文件分配 表及所述加密文件, 将所述加密文件存储至存储器剰余存储空间中的簇中的过程为:
所述文件分配器查询文件分配表中各个簇对应的待存储的加密文件大小, 获取对应大小 的加密文件依次存储到所述存储器的对应簇中。
9、一种数据隐藏存储的系统, 其特征在于, 包括客户端、控制器、文件分配器及存储器, 所述客户端连接控制器, 所述控制器分别连接文件分配器及存储器, 所述文件分配器连接存 储器,
所述客户端, 用于根据第一策略, 将待存储文件生成加密文件并将所述加密文件发送至 控制器;
所述控制器, 用于获取存储器剰余存储空间大小及簇个数, 还用于若存储器剩余存储空 间大小大于或等于所述加密文件大小, 根据第二策略, 获得文件分配表并将所述加密文件及 所述文件分配表发送至文件分配器;
所述文件分配器, 用于根据接收的所述文件分配表及所述加密文件, 将所述加密文件存 储至存储器剩余存储空间中的簇中;
所述存储器, 用于向所述控制器提供剩余存储空间大小及簇个数, 还用于存储加密文件。
PCT/CN2014/072342 2013-03-02 2014-02-20 一种数据隐藏存储的方法及系统 WO2014135010A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310066377.2 2013-03-02
CN201310066377.2A CN103220209B (zh) 2013-03-02 2013-03-02 一种数据隐藏存储的方法及系统

Publications (1)

Publication Number Publication Date
WO2014135010A1 true WO2014135010A1 (zh) 2014-09-12

Family

ID=48817691

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/072342 WO2014135010A1 (zh) 2013-03-02 2014-02-20 一种数据隐藏存储的方法及系统

Country Status (2)

Country Link
CN (1) CN103220209B (zh)
WO (1) WO2014135010A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220209B (zh) * 2013-03-02 2015-09-30 阔地教育科技有限公司 一种数据隐藏存储的方法及系统
CN108390942A (zh) * 2018-03-21 2018-08-10 山东超越数控电子股份有限公司 一种硬件加密的分布式云存储方法与装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928842A (zh) * 2005-09-07 2007-03-14 创惟科技股份有限公司 大量数据储存装置的高隐密非循序隐藏区块存储器机密数据保护方法
CN101082883A (zh) * 2006-05-31 2007-12-05 朴显泽 一种具有多层加密保护的存储装置
CN103218567A (zh) * 2013-03-02 2013-07-24 苏州阔地网络科技有限公司 一种隐藏数据存储的方法及系统
CN103220209A (zh) * 2013-03-02 2013-07-24 苏州阔地网络科技有限公司 一种数据隐藏存储的方法及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100389420C (zh) * 2005-09-13 2008-05-21 北京中星微电子有限公司 用协处理器加速文件系统操作的方法及装置
CN102750324A (zh) * 2012-05-28 2012-10-24 华为技术有限公司 文件存储系统、装置及文件存取方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928842A (zh) * 2005-09-07 2007-03-14 创惟科技股份有限公司 大量数据储存装置的高隐密非循序隐藏区块存储器机密数据保护方法
CN101082883A (zh) * 2006-05-31 2007-12-05 朴显泽 一种具有多层加密保护的存储装置
CN103218567A (zh) * 2013-03-02 2013-07-24 苏州阔地网络科技有限公司 一种隐藏数据存储的方法及系统
CN103220209A (zh) * 2013-03-02 2013-07-24 苏州阔地网络科技有限公司 一种数据隐藏存储的方法及系统

Also Published As

Publication number Publication date
CN103220209B (zh) 2015-09-30
CN103220209A (zh) 2013-07-24

Similar Documents

Publication Publication Date Title
US10877850B2 (en) Systems and methods of transmitting data
EP3062261B1 (en) Community-based de-duplication for encrypted data
JP6389895B2 (ja) 要求によって供給される鍵を用いたデータセキュリティ
Li et al. A hybrid cloud approach for secure authorized deduplication
US20180307704A1 (en) Secure cloud-based shared content
US8762743B2 (en) Encrypting data objects to back-up
US20220198052A1 (en) Data storage method, device, and storage medium
WO2019075978A1 (zh) 数据传输方法、装置、计算机设备和存储介质
US20050097348A1 (en) Password-based key management
US11768947B1 (en) Distributed data security
CN102457555A (zh) 一种分布式存储的安全系统及方法
US20140270153A1 (en) System and Method for Content Encryption in a Key/Value Store
WO2014146607A1 (zh) 信息处理方法、检索方法、装置、用户终端及服务
CA2936106A1 (en) Encrypted data - data integrity verification and auditing system
US20150288664A1 (en) Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
Giri et al. A survey on data integrity techniques in cloud computing
US9356782B2 (en) Block encryption
Pawar et al. Providing security and integrity for data stored in cloud storage
WO2014135010A1 (zh) 一种数据隐藏存储的方法及系统
CN111010408A (zh) 一种分布式加密和解密方法及系统
KR101790757B1 (ko) 암호데이터를 저장하는 클라우드 시스템 및 그 방법
CN113792315A (zh) 一种支持块级加密去重的云数据访问控制方法及控制系统
CN103259780B (zh) 一种加密数据存储的方法及系统
CN103259779A (zh) 一种文件隐形处理的方法及系统
Bajpai et al. Ensuring security in on-demand file replication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14759763

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14759763

Country of ref document: EP

Kind code of ref document: A1