CN103207973A - Method and system for invisibly storing file in encrypted manner - Google Patents

Method and system for invisibly storing file in encrypted manner Download PDF

Info

Publication number
CN103207973A
CN103207973A CN2013100671622A CN201310067162A CN103207973A CN 103207973 A CN103207973 A CN 103207973A CN 2013100671622 A CN2013100671622 A CN 2013100671622A CN 201310067162 A CN201310067162 A CN 201310067162A CN 103207973 A CN103207973 A CN 103207973A
Authority
CN
China
Prior art keywords
file
storer
encrypt
bunch
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100671622A
Other languages
Chinese (zh)
Other versions
CN103207973B (en
Inventor
胡加明
刘晓东
其他发明人请求不公开姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Codyy Network Technology Co Ltd
Original Assignee
Suzhou Codyy Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Codyy Network Technology Co Ltd filed Critical Suzhou Codyy Network Technology Co Ltd
Priority to CN201310067162.2A priority Critical patent/CN103207973B/en
Publication of CN103207973A publication Critical patent/CN103207973A/en
Application granted granted Critical
Publication of CN103207973B publication Critical patent/CN103207973B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a system for invisibly storing a file in an encrypted manner. The method includes the steps: receiving the file transmitted by a client by a file processor, generating an encrypted file according to a first strategy and transmitting the encrypted file to a controller; acquiring the size of residual storage space and the number of clusters of a memory by the controller; acquiring a file assignment table according to a second strategy and transmitting the encrypted file and the file assignment table to a file distributor by the controller if the residual storage space of the memory is larger than or equal to the size of the encrypted file; and storing the encrypted file in the clusters in the residual storage space by the file distributor according to the received file assignment table and the received encrypted file.

Description

A kind of file concealed-enciphering storage means and system
Technical field
The invention belongs to the instant messaging field, relate in particular to a kind of file concealed-enciphering storage means and system.
Background technology
Along with the continuous progress of networking society, increasing immediate communication tool is applied in work and the life, such as Fetion, MSN and some enterprise version application software etc.In actual applications, the security of file storage plays crucial effects for the use of video conference.In the prior art, people can be stored in file ready-portioned reserved area in advance, this method has promoted the security of file storage to a certain extent, but owing to lack during storage file and reasonably encrypt and division methods, can not prevent still that the data of reserved area from illegally being read or revising.
Summary of the invention
The invention provides a kind of file concealed-enciphering storage means and system to address the above problem.
The invention provides a kind of file concealed-enciphering storage means, may further comprise the steps.File handler receives the file that client sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller.Described controller obtains storer residual memory space size and bunch number.If storer residual memory space size is more than or equal to described encrypt file size, then described controller obtains file allocation table and described encrypt file and described file allocation table is sent to the file allocation device according to second strategy.Described file allocation device is according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in.
The invention provides a kind of file concealed-enciphering storage system, comprise client, file handler, file allocation device, controller and storer, described client connects described file handler, described file handler connects controller, described controller is threaded file divider and storer respectively, described file allocation device connected storage.Described file handler is used for receiving the file that client sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller.Described controller, be used for obtaining storer residual memory space size and bunch number, also be used for as if storer residual memory space size more than or equal to described encrypt file size, according to second strategy, obtain file allocation table and described encrypt file and described file allocation table are sent to the file allocation device.Described file allocation device is used for according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in.Described storer is used for providing residual memory space size and bunch number to described controller; Also be used for encrypted file.
Compared to prior art, according to file concealed-enciphering storage means provided by the invention and system, file handler receives the file that client sends, and according to first strategy, generates encrypt file and encrypt file is sent to controller.File encryption is handled, improved data security.Controller obtains storer residual memory space size and bunch number.If storer residual memory space size is greater than the encrypt file size, then controller obtains file allocation table and encrypt file and file allocation table is sent to the file allocation device according to second strategy.The file allocation device is according to the file allocation table and the encrypt file that receive, with encrypt file be stored in the storer residual memory space bunch in, thereby realized data security.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not constitute improper restriction of the present invention.In the accompanying drawings:
Figure 1 shows that the process flow diagram of the file concealed-enciphering storage means that preferred embodiment according to the present invention provides;
Figure 2 shows that the para-curve synoptic diagram of functional expression;
Figure 3 shows that the synoptic diagram of the file concealed-enciphering storage system that preferred embodiment according to the present invention provides.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Figure 1 shows that the process flow diagram of the file concealed-enciphering storage means that preferred embodiment according to the present invention provides.As shown in Figure 1, the file concealed-enciphering storage means that provides of preferred embodiment of the present invention comprises step 101~104.
Step 101: file handler receives the file that client sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller.
Particularly, file handler is according to first strategy, and the process that generates encrypt file is: file handler is according to default block number, by block algorithm, described file carried out piecemeal after, make up; The head and the tail of the blocks of files after combination add that check code (is defined as: first data); The file signature that utilizes the MD5 algorithm to calculate first data (is defined as: second data); Make up main first data, be equipped with first data and second data, obtain encrypt file.Wherein, file handler is according to default block number, and by block algorithm, the mode of described file being carried out piecemeal is: get [v/i] remainder, described file is carried out piecemeal, wherein, and the data bit order in the v representation file, i is default block number.
For example, the file to be stored that file handler receives is " a kind of method and system of file concealed-enciphering storage ", if default block number is 3, it is that 0 blocks of files 1, remainder are that 1 blocks of files 2 and remainder are 2 blocks of files 3 that described 3 partition data pieces are respectively remainder.File handler is got [v/i] remainder, and for example: " one " data bit order hereof is 1, and the remainder of then getting [1/3] is 1, then " one " is put into remainder and be 1 blocks of files 2; " kind " data bit order hereof is 2, and the remainder of then getting [2/3] is 2, then " kind " is put into remainder and be 2 blocks of files 3; " literary composition " data bit order hereof is 3, and the remainder of then getting [3/3] is 0, then " literary composition " is put into remainder and be 0 blocks of files 1, by that analogy, obtains following blocks of files:
Remainder is 0 blocks of files 1 The literary composition shape side of depositing system
Remainder is 1 blocks of files 2 One adds storage legally constituted authority
Remainder is 2 blocks of files 3 Kind latent close and
Make up above-mentioned three blocks of files and obtain following blocks of files: the civilian shape side of depositing be one add storage legally constituted authority kind latent close and.The head and the tail of the blocks of files after described combination add check code, are defined as first data: the BEGIN literary composition shape side of depositing and are one and add storage legally constituted authority kind and conceal close and END.Utilize the MD5 algorithm to calculate the file signature of first data, and be defined as second data, as follows: 57219DFEB567EE470DDA2824F0270A5E.Main first data of combination, be equipped with first data and second data, obtain encrypt file and be: the BEGIN literary composition shape side of depositing is one and adds storage legally constituted authority kind latent close and the END BEGIN literary composition shape side of depositing and be one and add and store up the legally constituted authority kind and conceal close and END57219DFEB567EE470DDA2824F0270A5E.
Step 102: described controller obtains storer residual memory space size and bunch number.
Particularly, after described controller receives the encrypt file of file handler transmission, send query requests to storer; Described storer responds to described controller feedback query, wherein, has carried storer residual memory space size and bunch number in the described inquiry response.In this, described storer is according to default single bunch storage size and residual memory space size, the number that obtains bunch.Computing formula is, bunch the storage size of number=storer residual memory space size/single bunch.
For example, if single bunch storage size is 4K, storer residual memory space size 4M, then bunch number=4M/4K=1024.
Step 103: more than or equal to described encrypt file size, then described controller obtains file allocation table and described encrypt file and described file allocation table is sent to the file allocation device according to second strategy as if storer residual memory space size.
Particularly, the more described storer residual memory space size of controller and encrypt file size, if storer residual memory space size is less than described encrypt file size, described controller sends the information of reporting an error to described file handler, returns miscue by file handler to client.
When controller comparison storer residual memory space size was big or small more than or equal to described encrypt file, controller was according to second strategy, and the process that obtains file allocation table is: described controller basis
Figure BDA00002877375100031
Obtain file allocation table, wherein, x 〉=1 and x are positive integer; Y=ax 2+ bx+c(a<0), which individual bunch x represent, and y represents the value of x correspondence.
For example, suppose that the encrypt file size is 2M, the residual memory space size of storer is 4M, if single bunch storage size is 4K, then the residual memory space of storer has 1024 bunches.Function y=ax 2The area of the common factor of para-curve+bx+c(a<0) and x axle is encrypt file size, i.e. 2M.In this, the intersecting point coordinate of described para-curve and x axle is (0,0) and (1024,0), can get described para-curve expression formula thus and be y=a (x-0) (x-1024), i.e. y=ax 2-1024ax.
Figure DEST_PATH_GDA00003157666400032
Figure DEST_PATH_GDA00003157666400033
In present embodiment, namely Calculate and obtain a=-3/512 2, described functional expression y=-3/512 then 2x 2+ 3/256x.
Figure 2 shows that the para-curve synoptic diagram of functional expression.As shown in Figure 2, described functional expression is y=-3/512 2x 2+ 3/256x.In present embodiment, Then 1st bunch of last encrypt file size to be stored is ∫ 0 1 ( - 3 / 512 2 x 2 + 3 / 256 x ) dx = 0.00585556 KB , Going up encrypt file size to be stored for 2nd bunch is
Figure DEST_PATH_GDA00003157666400044
Figure DEST_PATH_GDA00003157666400045
And the like, the 1024th bunch of last encrypt file size to be stored is ∫ 1023 1024 ( - 3 / 512 2 x 2 + 3 / 256 x ) dx = 0.00585556 KB . The acquisition file allocation table is as follows:
Bunch Encrypt file size to be stored
1 0.00585556KB
2 0.017551422KB
512 2.999996185KB
1024 0.00585556KB
Step 104: described file allocation device is according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in.
Particularly, described file allocation device is according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in process be: the encrypt file size to be stored of each bunch correspondence in the described file allocation device inquiry file allocation table, the encrypt file that obtains corresponding size store in the correspondence bunch of described storer successively.
Figure 2 shows that the synoptic diagram of the file concealed-enciphering storage system that preferred embodiment according to the present invention provides.As shown in Figure 2, the file concealed-enciphering storage system that preferred embodiment of the present invention provides comprises client 201, file handler 202, controller 203, file allocation device 204 and storer 205, described client 201 connects described file handler 202, described file handler 202 connects controller 203, described controller 203 is threaded file divider 204 and storer 205 respectively, described file allocation device 204 connected storages 205.Described file handler 202 is used for receiving the file that client 201 sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller 203.Described controller 203, be used for obtaining storer 205 residual memory spaces size and bunch number, also be used for as if storer 205 residual memory space sizes more than or equal to described encrypt file size, according to second strategy, obtain file allocation table and described encrypt file and described file allocation table are sent to file allocation device 204.Described file allocation device 204 is used for according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in storer 205 residual memory spaces bunch in.Described storer 205 is used for providing residual memory space size and bunch number to described controller; Also be used for encrypted file.Operating process about said system is described with above-mentioned method, so repeat no more in this.
In sum, preferred embodiment provides according to the present invention file concealed-enciphering storage means and system, file handler receives the file that client sends, and according to first strategy, generates encrypt file and encrypt file is sent to controller.File encryption is handled, improved data security.Controller obtains storer residual memory space size and bunch number.If storer residual memory space size is greater than the encrypt file size, then controller obtains file allocation table and encrypt file and file allocation table is sent to the file allocation device according to second strategy.The file allocation device is according to the file allocation table and the encrypt file that receive, with encrypt file be stored in the storer residual memory space bunch in, thereby realized data security.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. a file concealed-enciphering storage means is characterized in that, may further comprise the steps:
File handler receives the file that client sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller;
Described controller obtains storer residual memory space size and bunch number;
If storer residual memory space size is more than or equal to described encrypt file size, then described controller obtains file allocation table and described encrypt file and described file allocation table is sent to the file allocation device according to second strategy;
Described file allocation device is according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in.
2. method according to claim 1 is characterized in that, file handler is according to first strategy, and the process that generates encrypt file is:
File handler is according to default block number, by block algorithm, described file carried out piecemeal after, make up;
The head and the tail of the blocks of files after combination add that check code (is defined as: first data);
The file signature that utilizes the MD5 algorithm to calculate first data (is defined as: second data);
Make up main first data, be equipped with first data and second data, obtain encrypt file.
3. method according to claim 2 is characterized in that, file handler is according to default block number, and by block algorithm, the mode of described file being carried out piecemeal is:
Get [v/i] remainder, described file is carried out piecemeal, wherein, the data bit order in the v representation file, i is default block number.
4. method according to claim 1 is characterized in that, the process that described controller obtains storer residual memory space size and bunch number is:
Described controller sends query requests to described storer;
Described storer responds to described controller feedback query, wherein, has carried storer residual memory space size and bunch number in the described inquiry response.
5. method according to claim 1 is characterized in that, described storer is according to default single bunch storage size and residual memory space size, the number that obtains bunch.
6. method according to claim 1 is characterized in that, the sequence number that described file allocation table comprises bunch and corresponding encrypt file size to be stored.
7. method according to claim 1 is characterized in that, described controller is according to second strategy, and the process that obtains file allocation table is:
Described controller basis
Figure FDA00002877375000011
Obtain file allocation table, wherein, x 〉=1 and x are positive integer; Y=ax 2+ bx+c(a<0), which individual bunch x represent, and y represents the value of x correspondence.
8. method according to claim 1 is characterized in that, described file allocation device is according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in process be:
The encrypt file size to be stored of each bunch correspondence in the described file allocation device inquiry file allocation table, the encrypt file that obtains corresponding size store in the correspondence bunch of described storer successively.
9. file concealed-enciphering storage system, it is characterized in that, comprise client, file handler, file allocation device, controller and storer, described client connects described file handler, described file handler connects controller, described controller is threaded file divider and storer respectively, described file allocation device connected storage
Described file handler is used for receiving the file that client sends, and according to first strategy, generates encrypt file and described encrypt file is sent to controller;
Described controller, be used for obtaining storer residual memory space size and bunch number, also be used for as if storer residual memory space size more than or equal to described encrypt file size, according to second strategy, obtain file allocation table and described encrypt file and described file allocation table are sent to the file allocation device;
Described file allocation device is used for according to the described file allocation table and the described encrypt file that receive, with described encrypt file be stored in the storer residual memory space bunch in;
Described storer is used for providing residual memory space size and bunch number to described controller, also is used for encrypted file.
CN201310067162.2A 2013-03-02 2013-03-02 A kind of file concealed-enciphering storage means and system Expired - Fee Related CN103207973B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310067162.2A CN103207973B (en) 2013-03-02 2013-03-02 A kind of file concealed-enciphering storage means and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310067162.2A CN103207973B (en) 2013-03-02 2013-03-02 A kind of file concealed-enciphering storage means and system

Publications (2)

Publication Number Publication Date
CN103207973A true CN103207973A (en) 2013-07-17
CN103207973B CN103207973B (en) 2015-09-30

Family

ID=48755190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310067162.2A Expired - Fee Related CN103207973B (en) 2013-03-02 2013-03-02 A kind of file concealed-enciphering storage means and system

Country Status (1)

Country Link
CN (1) CN103207973B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731402A (en) * 2005-09-13 2006-02-08 北京中星微电子有限公司 Method and apparatus for accelerating file system operation by using coprocessor
CN102750324A (en) * 2012-05-28 2012-10-24 华为技术有限公司 File storage system, file storage device and file access method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731402A (en) * 2005-09-13 2006-02-08 北京中星微电子有限公司 Method and apparatus for accelerating file system operation by using coprocessor
CN102750324A (en) * 2012-05-28 2012-10-24 华为技术有限公司 File storage system, file storage device and file access method

Also Published As

Publication number Publication date
CN103207973B (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN106991334B (en) Data access method, system and device
CN104135539B (en) Date storage method, SDN controllers and distributed network storage system
CN111201754A (en) Apparatus for providing a collection of cryptographically protected and filtered and sorted transaction data sets of links of a blockchain
CN102880705B (en) Database key generating apparatus and database key generation method
WO2020258840A1 (en) Blockchain-based transaction processing method and apparatus, and electronic device
CN102523290B (en) Data processing method, device and system
WO2005122630B1 (en) Arrangement in a network node for secure storage and retrieval of encoded data distributed among multiple network nodes
CN103442090A (en) Cloud computing system for data scatter storage
Qin et al. Applying private information retrieval to lightweight bitcoin clients
CN107959695A (en) A kind of data transmission method and device
CN106453393B (en) The secret protection data type matching process that can verify that in participatory perception
Giri et al. A survey on data integrity techniques in cloud computing
CN104463020A (en) Method for protecting data integrity of memory
CN103414762A (en) Cloud backup method and cloud backup device
CN116204923A (en) Data management and data query methods and devices
CN105162869A (en) Data backup management method and equipment
KR101428649B1 (en) Encryption system for mass private information based on map reduce and operating method for the same
CN105204782B (en) A kind of method and device for realizing data storage
CN111339130A (en) Data query method, related equipment and readable storage medium
CN105991282A (en) Password generation method and device
CN103220209A (en) Method and system of data hidden storage
CN103259780A (en) Method and system for storing enciphered data
CN103218567A (en) Method and system for hiding data storage
CN103220272A (en) File hiding method and file hiding system
CN103259779A (en) Method and system for file invisibility processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: Suzhou City, Jiangsu province 215121 Fengting Avenue Suzhou Industrial Park No. 666 Weiting Intelligent Industrial Park Building 8

Applicant after: Kuo Di education and science company limited

Address before: Suzhou City, Jiangsu province 215121 Fengting Avenue Suzhou Industrial Park No. 666 Weiting Intelligent Industrial Park Building 8

Applicant before: Suzhou Kuodi Network Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SUZHOU KUODI NETWORK TECHNOLOGY CO., LTD. TO: CODYY EDUCATION TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150930

Termination date: 20200302