Distributed key management method for ciphertext storage

A key management and distributed technology, applied in the field of distributed key management of ciphertext storage, can solve problems such as difficulty in key management

Active Publication Date: 2010-12-15
江西浅蓝信息科技有限公司
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then when a large number of files need to be encrypted, a large number of k

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed key management method for ciphertext storage
  • Distributed key management method for ciphertext storage
  • Distributed key management method for ciphertext storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The inventive method is based on the following system configurations, figure 1 Shown:

[0045] 1. The data of registered users of the system are stored in different storage servers. These storage spaces together constitute the user's virtual disk space through network file sharing technology, and each piece of space is equivalent to a partition of the virtual disk;

[0046] 2. Each storage space is identified and distinguished by the IP information of the storage server where it is located and the summary value of the machine name. When the digest value of the content of the file uploaded by the user is the same as the identifier of the storage space, the file will be stored in the storage server with the identifier;

[0047] 3. Each storage space is divided into two parts: partition header and data area. The partition header stores the information of the storage space, such as the size of the data area, space directory tree information and key information. The data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed key management method for ciphertext storage. The method utilizes the uniqueness of the solution under the modulus to the congruence expression of first degree in the Chinese Remainder Theorem and the operational convenience of XOR. Due to the uniqueness of the solution of congruence expression of first degree, the encrypting information of a plurality of storage spaces of a user is finally depended on a single datum and saved by the user and corresponds to the user one by one. Such key management and user management are much easier, and a foundation is provided for the realization of distributed key management. The real keys to encrypted data are destroyed in a system after the key distribution to guarantee a high security, and the data encryption keys have to be recovered from other information. By the method, the management of secure metadata can be easily integrated with that of original normal metadata in a file system without extra system configurations; the expenses for guaranteeing the security of the system are saved, and the security of the secure metadata of the system is improved.

Description

technical field [0001] The invention belongs to the field of computer storage security, and in particular relates to a distributed key management method for ciphertext storage. This method will effectively manage the keys of each encrypted storage device in a distributed environment. It not only has the characteristics of easy scalability, availability, and key independence, but also can achieve forward and backward security and access control. Effect. Background technique [0002] Traditional data storage is generally stored in the form of files. When files need to be encrypted, different files require different keys for encryption. Then when a large number of files need to be encrypted, a large number of keys will be generated, which will cause great difficulties in key management. [0003] So we have to adopt another encrypted storage method, and the existing virtual disk technology can solve this problem very well. By virtualizing a piece of memory into a disk, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/14H04L9/08
Inventor 谢长生黄建忠曹强刘晨光孟涛
Owner 江西浅蓝信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products