CN109194663A - A kind of method and device of file storage and downloading based on cloud computing - Google Patents

A kind of method and device of file storage and downloading based on cloud computing Download PDF

Info

Publication number
CN109194663A
CN109194663A CN201811069596.5A CN201811069596A CN109194663A CN 109194663 A CN109194663 A CN 109194663A CN 201811069596 A CN201811069596 A CN 201811069596A CN 109194663 A CN109194663 A CN 109194663A
Authority
CN
China
Prior art keywords
key
file
cipher text
user
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811069596.5A
Other languages
Chinese (zh)
Inventor
孙伟源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811069596.5A priority Critical patent/CN109194663A/en
Publication of CN109194663A publication Critical patent/CN109194663A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The method for the file storage based on cloud computing that the invention discloses a kind of, comprising: when storage file, first key is generated by random key generating algorithm, plaintext document is converted to file cipher text using first key;The first key is encrypted to obtain the second key;Second key and file cipher text binding are stored.The invention also discloses a kind of method and devices of file download based on cloud computing.This programme is while protecting personal data safety, simple flexible convenient for the management, update and maintenance of key.

Description

A kind of method and device of file storage and downloading based on cloud computing
Technical field
The present invention relates to cloud storage technology, the method and device of espespecially a kind of file storage and downloading based on cloud computing.
Background technique
Personal cloud computing is extension of the cloud computing in personal field, is the personal letter centered on Internet (internet) Breath processing carries out tissue, storage, distribution and reprocessing to personal various information by Internet.Personal information is private Have, it is higher to security requirement.Individual possesses the multimedia messages such as a large amount of picture, video, it is desirable that amount of storage is big and can be with Extension, and computing capability is required not strong.With the popularity of the internet, personal cloud computing will grow into same with enterprise cloud computing The universal service of sample.For personal user, the advantage of cloud computing is quite obvious: cheap or even free, safety, without no It is taken on demand in, performance.Currently, personal user concerns cloud computing technology data are uploading to cloud computing clothes the most Safety after business device, no one wishes that the privacy (such as the private informations such as photo, diary) of oneself is clear as the public after all Look at the object of propagation.The best method for protecting secure user data is exactly to use encryption technology, studies reasonable suitable personal cloud The key managing project of data storage characteristics is particularly important in calculating.
At present there are some drawbacks in the key management method of mainstream in actual use, be mainly reflected in following a few sides Face: first is that issuing digital certificate to all users using digital certificate mode, file is encrypted using symmetric key, and right Key is claimed to need to be obtained according to corresponding private key to decrypt when user accesses file by the public key encryption storage in digital certificate Symmetric key is obtained, and then decrypts file.Since the private key inconvenience user of digital certificate remembers, user needs to carry private key Data file can be just accessed in (such as there are in USB flash disk), be not suitable for the demand that individual cloud user accesses cloud whenever and wherever possible.Second is that adopting With single symmetric key encryption All Files, for example login username and password are utilized, passes through certain algorithm and generate one Symmetric key encrypts all user files using the key.This method is realized simply, and the user name and password facilitates user Memory, do not need to safeguard more information yet, once but symmetric key leak, All Files are all dangerous, can at any time by Decryption;When user wishes to replace the user name and password, need to carry out re-encrypted to All Files with new key, workload is huge Greatly;Third is that encrypting file by the way of one-time pad, different files is encrypted using different keys, a key only makes With primary.This method can greatly improve the safety of data file, only threaten leaking part of key and use these The file security of key encryption, however the number of files stored beyond the clouds is numerous, personal user can not remember all keys, cloud Server must safeguard " file-key " table of comparisons, for which the corresponding key encryption of which file to be recorded.Once close The damage of key table is non-readable, then means that all encryption files of user cannot be opened, loss will be very heavy.
Summary of the invention
The method of in order to solve the above-mentioned technical problems, the present invention provides a kind of file storage and downloading based on cloud computing And device, to improve personal cloud computing data security and property convenient for management.
In order to reach the object of the invention, the method for the file storage based on cloud computing that the present invention provides a kind of, comprising:
When storage file, first key is generated by random key generating algorithm, is turned plaintext document using first key It is melted into file cipher text;
The first key is encrypted to obtain the second key;
Second key and file cipher text binding are stored.
It is further, described to encrypt the first key to obtain the second key, comprising:
The user name and user's entry password inputted when by logging in system by user carries out Hash operation, by operation result Data are encrypted to obtain second key as first key described in key pair.
Further, it is described by second key and the file cipher text binding stored during, further includes:
The file cipher text is marked.
A kind of device of the file storage based on cloud computing, wherein include:
First encrypting module after the instruction for receiving storage file, generates first by random key generating algorithm Plaintext document is converted to file cipher text using first key by key;
Second encrypting module obtains the second key for encrypting the first key;
Memory module, for storing second key and file cipher text binding.
Further, second encrypting module, by the first key encrypt to obtain the second key include: by with The user name and user's entry password inputted when the login system of family carries out Hash operation, using operation result data as key pair institute First key is stated to be encrypted to obtain second key.
Further, second key and the file cipher text are bound the process stored by the memory module In, it is also used to that the file cipher text is marked.
A method of the file download based on cloud computing, comprising:
It when downloading file, such as determines that file to be downloaded is file cipher text, then will extract the from the file cipher text Two keys are decrypted to obtain first key to second key;
The file cipher text is decrypted to obtain plaintext document by the first key;
The plaintext document is downloaded.
Further, determination file to be downloaded is that file cipher text is achieved in the following ways:
By read carried in the file cipher text for mark whether be ciphertext label.
It is further, described that second key is decrypted to obtain first key, comprising:
Second key is decrypted to obtain first key by user name and user's entry password.
A kind of device of the file download based on cloud computing, comprising:
First deciphering module when for downloading file, such as determines that file to be downloaded is file cipher text, then will be from the text The second key is extracted in part ciphertext, and second key is decrypted to obtain first key;
Second deciphering module, for being decrypted to obtain plaintext document to the file cipher text by the first key;
Download module, for being downloaded to the plaintext document.
Further, first deciphering module is decrypted to obtain first key, comprising: pass through use to second key Name in an account book and user's entry password are decrypted to obtain first key to second key.
The scheme of the embodiment of the present invention, while protecting personal data safety, convenient for the management, update and dimension of key Shield, it is simple flexible.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is a kind of flow chart of the method for file storage based on cloud computing of the embodiment of the present invention;
Fig. 2 is the flow chart of the encryption file of the embodiment of the present invention;
Fig. 3 is the flow chart of the encryption key of the embodiment of the present invention;
Fig. 4 is the schematic diagram of the format of the plaintext document of the embodiment of the present invention;
Fig. 5 is the schematic diagram of the format of the file cipher text of the embodiment of the present invention;
Fig. 6 is a kind of schematic diagram of the device of file storage based on cloud computing of the embodiment of the present invention;
Fig. 7 is a kind of flow chart of the method for file download based on cloud computing of the embodiment of the present invention;
Fig. 8 is a kind of schematic diagram of the device of file download based on cloud computing of the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
Fig. 1 is a kind of flow chart of the method for file storage based on cloud computing of the embodiment of the present invention, as shown in Figure 1, The method of the present embodiment includes:
When step 101, storage file, first key is generated by random key generating algorithm, it will be literary using first key Part is converted to file cipher text in plain text;
Step 102 encrypts the first key to obtain the second key;
Step 103 stores second key and file cipher text binding.
The method of the present embodiment realizes the one-time pad of file, and the first key for encrypting each file is different.Portion The leakage for dividing first key, only influences whether the file security encrypted with these first keys, does not constitute to alternative document It threatens.
The embodiment of the present invention proposes a kind of method of file storage based on cloud computing, has both ensured that personal data were pacified Entirely, and convenient for management, update and the maintenance of key.
The method that the embodiment of the present invention proposes is suitble to the key management of personal cloud computing, and key is carried out binding with file and is deposited Storage, does not need the maintenance key table of comparisons.For convenience, arrange several sign flags: Plaintext: plaintext document in advance, Cipher: file cipher text, Username: user login name, Password: user's entry password, Hash (): hash function fortune It calculates, key: key plain (that is, first key above), KEY: key ciphertext (that is, second key above), Ek (): being encrypted using symmetric key k, Dk (): operation is decrypted using symmetric key k, | |: series connection.
In the present embodiment, for needing to carry out to encrypt the file of storage beyond the clouds, pass through one first for personal user Random key generating algorithm generates key key, and plaintext document Plaintext is converted to file by Encryption Algorithm using key Ciphertext Cipher, as shown in Figure 2.
Key key and file are subjected to binding storage, therefore key must be encrypted before storing.Pass through The Username and Password that input when to logging in system by user carry out hash (Hash) operation, using operation result data as Key encrypts key to obtain KEY, as shown in Figure 3.
In the present embodiment, the storage format of cloud file can be divided into two classes: 1. for the file of stored in clear, according to figure 4 formats are stored;2. for security consideration, the file for needing ciphertext to store is stored according to Fig. 5 format.
First bit 0 of storage format indicates file with stored in clear;If 1, indicate that file is stored with ciphertext.Work as text When part is stored with ciphertext form, need to increase encrypted secret key KEY before ciphertext, 2 bytes are used to indicate the significant figure of file According to length.
The method of the present embodiment, personal user do not need to carry the equipment (such as USB flash disk) of storage key, need to only remember The system login the user name and password of oneself setting facilitates user to access personal cloud data whenever and wherever possible.
When user needs periodically change login username and password, to the existing encryption file of personal cloud, it is only necessary to according to KEY is replaced according to newly-installed the user name and password, workload is smaller, influences on system performance little.
Correspondingly, the present embodiment additionally provides a kind of device of file storage based on cloud computing, as shown in fig. 6, this reality The device 600 for applying example may include:
First encrypting module 601 after the instruction for receiving storage file, generates the by random key generating algorithm Plaintext document is converted to file cipher text using first key by one key;
Second encrypting module 602 obtains the second key for encrypting the first key;
Memory module 603, for storing second key and file cipher text binding.
The device of the present embodiment realizes the one-time pad of file, and the first key for encrypting each file is different.Portion The leakage for dividing first key, only influences whether the file security encrypted with these first keys, does not constitute to alternative document It threatens.The embodiment of the present invention proposes a kind of device of file storage based on cloud computing, not only ensures personal data safety, but also Convenient for the management, update and maintenance of key.
In one embodiment, second encrypting module 602, encrypt the first key to obtain the second key include: The user name and user's entry password that input when by logging in system by user carry out Hash operation, using operation result data as First key described in key pair is encrypted to obtain second key.
The device of the present embodiment, personal user do not need to carry the equipment (such as USB flash disk) of storage key, need to only remember The system login the user name and password of oneself setting facilitates user to access personal cloud data whenever and wherever possible.
In one embodiment, the memory module 603 stores second key and file cipher text binding During, it can be also used for that the file cipher text is marked.
Fig. 7 is a kind of flow chart of the method for file download based on cloud computing of the embodiment of the present invention, as shown in fig. 7, The method of the present embodiment includes:
When step 701, downloading file, such as determine that file to be downloaded is file cipher text, then it will be from the file cipher text The second key is extracted, second key is decrypted to obtain first key;
Step 702 is decrypted to obtain plaintext document by the first key to the file cipher text;
Step 703 is downloaded the plaintext document.
The method of the embodiment of the present invention can not only ensure the data safety in personal cloud, and realize simple, calculation amount It is low.
In the present embodiment, when user is from cloud downloading data, the first bit of file is first determined whether, if 0, indicate text Part is stored in clear, is directly downloaded;If 1, then system extracts KEY, inverse according to Fig. 3 by Username and Password Key is obtained to decryption, then inversely decrypts Cipher according to Fig. 2 and obtains Plaintext.
In the present embodiment, the one-time pad of file is realized, the key key for encrypting each file is different.Part key Leakage, only influence whether the file security encrypted with these key, do not constitute a threat to alternative document.
Correspondingly, the embodiment of the invention also provides a kind of devices of file download based on cloud computing, as shown in figure 8, The device 800 of the present embodiment includes:
First deciphering module 801 when for downloading file, such as determines that file to be downloaded is file cipher text, then will be from institute It states and extracts the second key in file cipher text, second key is decrypted to obtain first key;
Second deciphering module 802, it is bright for being decrypted to obtain file to the file cipher text by the first key Text;
Download module 803, for being downloaded to the plaintext document.
The device of the embodiment of the present invention can not only ensure the data safety in personal cloud, and realize simple, calculation amount It is low.
In one embodiment, first deciphering module 801 is decrypted to obtain first key to second key, comprising: Second key is decrypted to obtain first key by user name and user's entry password.
The embodiment of the present invention also provides a kind of device of file storage and downloading based on cloud computing, including processor and meter Calculation machine readable storage medium storing program for executing is stored with instruction in the computer readable storage medium, wherein when described instruction is by the processing When device executes, the method that the above-mentioned file based on cloud computing is stored and downloaded is realized.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions, The computer executable instructions are performed the method for realizing the file storage and downloading based on cloud computing.
It will appreciated by the skilled person that whole or certain steps, system, dress in method disclosed hereinabove Functional module/unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment, Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non- Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other Magnetic memory apparatus or any other medium that can be used for storing desired information and can be accessed by a computer.This Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information Delivery media.

Claims (11)

1. a kind of method of the file storage based on cloud computing characterized by comprising
When storage file, first key is generated by random key generating algorithm, is converted to plaintext document using first key File cipher text;
The first key is encrypted to obtain the second key;
Second key and file cipher text binding are stored.
2. the method according to claim 1, wherein described encrypt the first key to obtain the second key, Include:
The user name and user's entry password inputted when by logging in system by user carries out Hash operation, by operation result data It is encrypted to obtain second key as first key described in key pair.
3. method according to claim 1 or 2, which is characterized in that described by second key and the file cipher text During binding is stored, further includes:
The file cipher text is marked.
4. a kind of device of the file storage based on cloud computing characterized by comprising
First encrypting module after the instruction for receiving storage file, generates first key by random key generating algorithm, Plaintext document is converted to file cipher text using first key;
Second encrypting module obtains the second key for encrypting the first key;
Memory module, for storing second key and file cipher text binding.
5. device according to claim 4, which is characterized in that
Second encrypting module, by the first key encrypt to obtain the second key include: by logging in system by user when The user name and user's entry password of input carry out Hash operation, using operation result data as first key described in key pair into Row encryption obtains second key.
6. device according to claim 4 or 5, which is characterized in that
The memory module is also used to during being stored second key and file cipher text binding to institute File cipher text is stated to be marked.
7. a kind of method of the file download based on cloud computing characterized by comprising
When downloading file, such as determine that file to be downloaded is file cipher text, then it is close to extract second from the file cipher text Key is decrypted to obtain first key to second key;
The file cipher text is decrypted to obtain plaintext document by the first key;
The plaintext document is downloaded.
8. the method according to the description of claim 7 is characterized in that it is to pass through that determination file to be downloaded, which is file cipher text, What following manner was realized:
By read carried in the file cipher text for mark whether be ciphertext label.
9. the method according to the description of claim 7 is characterized in that described decrypt to obtain first key to second key, Include:
Second key is decrypted to obtain first key by user name and user's entry password.
10. a kind of device of the file download based on cloud computing characterized by comprising
First deciphering module when for downloading file, such as determines that file to be downloaded is file cipher text, then will be close from the file The second key is extracted in text, and second key is decrypted to obtain first key;
Second deciphering module, for being decrypted to obtain plaintext document to the file cipher text by the first key;
Download module, for being downloaded to the plaintext document.
11. device according to claim 10, which is characterized in that
First deciphering module is decrypted to obtain first key to second key, comprising: is logged in by user name and user Password is decrypted to obtain first key to second key.
CN201811069596.5A 2018-09-13 2018-09-13 A kind of method and device of file storage and downloading based on cloud computing Pending CN109194663A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811069596.5A CN109194663A (en) 2018-09-13 2018-09-13 A kind of method and device of file storage and downloading based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811069596.5A CN109194663A (en) 2018-09-13 2018-09-13 A kind of method and device of file storage and downloading based on cloud computing

Publications (1)

Publication Number Publication Date
CN109194663A true CN109194663A (en) 2019-01-11

Family

ID=64911009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811069596.5A Pending CN109194663A (en) 2018-09-13 2018-09-13 A kind of method and device of file storage and downloading based on cloud computing

Country Status (1)

Country Link
CN (1) CN109194663A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553611A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 File encryption storage method and system, user terminal, cloud platform and storage medium
CN114697007A (en) * 2020-12-29 2022-07-01 华为技术有限公司 Method, corresponding device and system for managing secret key

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427554A (en) * 2001-12-19 2003-07-02 佳能株式会社 Communication system, server device, customer terminal device and corresponding control method
CN103312690A (en) * 2013-04-19 2013-09-18 无锡成电科大科技发展有限公司 System and method for key management of cloud computing platform
US20140140508A1 (en) * 2012-11-16 2014-05-22 Deepak Kamath Method, System and Program Product for Secure Storage of Content
CN104917759A (en) * 2015-05-26 2015-09-16 西安电子科技大学 Third-party-based safety file storage and sharing system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427554A (en) * 2001-12-19 2003-07-02 佳能株式会社 Communication system, server device, customer terminal device and corresponding control method
US20140140508A1 (en) * 2012-11-16 2014-05-22 Deepak Kamath Method, System and Program Product for Secure Storage of Content
CN103312690A (en) * 2013-04-19 2013-09-18 无锡成电科大科技发展有限公司 System and method for key management of cloud computing platform
CN104917759A (en) * 2015-05-26 2015-09-16 西安电子科技大学 Third-party-based safety file storage and sharing system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553611A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 File encryption storage method and system, user terminal, cloud platform and storage medium
CN114697007A (en) * 2020-12-29 2022-07-01 华为技术有限公司 Method, corresponding device and system for managing secret key
WO2022143358A1 (en) * 2020-12-29 2022-07-07 华为技术有限公司 Key management method, and corresponding apparatus and system
CN114697007B (en) * 2020-12-29 2024-01-16 华为技术有限公司 Key management method, corresponding device and system

Similar Documents

Publication Publication Date Title
CN109583217B (en) Internet e-commerce platform user privacy data encryption and decryption method
US11329962B2 (en) Pluggable cipher suite negotiation
CN104104692B (en) A kind of virtual machine encryption method, decryption method and encryption and decryption control system
US20100005318A1 (en) Process for securing data in a storage unit
CN109948322B (en) Personal cloud storage data safe box device and method for localized encryption protection
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
US10140460B2 (en) File storage system and user terminal
US20130305054A1 (en) Truly anonymous cloud key broker
US10116442B2 (en) Data storage apparatus, data updating system, data processing method, and computer readable medium
KR101648364B1 (en) Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption
KR101615137B1 (en) Data access method based on attributed
US20140281576A1 (en) Information providing system, information processing apparatus, computer readable medium, and information providing method
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN107872532B (en) Method and system for storing and downloading third-party cloud storage platform
US20160330022A1 (en) Cryptographic system, key generation apparatus, re-encryption apparatus and user terminal
CN105072134A (en) Cloud disk system file secure transmission method based on three-level key
CN103973646A (en) Method, client device and system for storing services by aid of public cloud
US10592682B2 (en) Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN109194663A (en) A kind of method and device of file storage and downloading based on cloud computing
CN108768938B (en) A kind of web data encryption and decryption method and device
Thilakanathan et al. Secure multiparty data sharing in the cloud using hardware-based TPM devices
CN106471510B (en) Compound document access
US20190305940A1 (en) Group shareable credentials
JP2017130720A (en) Ciphertext management method, ciphertext management device and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190111

RJ01 Rejection of invention patent application after publication