Crypto-delta-transfer-based remote sharing backup recovery method

A recovery method and backup technology, which is applied in the field of network information security, can solve problems such as Rsync not working, and achieve the effects of saving bandwidth consumption, ensuring security, and improving efficiency

Active Publication Date: 2011-11-02
杭州奕锐电子有限公司
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, without encryption, Rsync's bandwidth optimization works well; but with encryption, Rsync hardly works

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Crypto-delta-transfer-based remote sharing backup recovery method
  • Crypto-delta-transfer-based remote sharing backup recovery method
  • Crypto-delta-transfer-based remote sharing backup recovery method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Encrypted incremental transfer is mainly divided into two operations: backup and restore. It is assumed that the client and the server respectively retain data of different versions of the same file.

[0064] Such as figure 1 As shown, the backup operation includes the following steps:

[0065] 1. The client performs a series of operations such as cutting and encrypting the files to be backed up, and generates plaintext blocks, hash values ​​of plaintext blocks, ciphertext blocks, hash values ​​of ciphertext blocks, blocklist_client ciphertext files, and Summary Signature files;

[0066] 2. The client compares the generated blocklist_client file with the locally stored blocklist_server file to generate a ciphertext block hash value set C_Hash_set;

[0067] 3. The client sends the ciphertext block hash value set C_Hash_set to the server;

[0068] 4. After receiving the ciphertext block hash value set C_Hash_set, the server compares it with the blockcheck table to gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a crypto-delta-transfer-based remote sharing backup recovery method. In the invention, the bandwidth consumption of data transmission, potential safety hazards of data in transmission and the potential safety hazards of data storage in a data center are comprehensively combined, and a scheme in which a backup client performs data blocking, compression and encryption before the data transmission is provided. Only incremental data is transmitted, thereby improving the transmission efficiency and optimizing transmission bandwidths. The data is transmitted and stored in form of cipher text, so only the cipher text is obtained and clear text data cannot be obtained even though the data is stolen as long as an encryption key is not leaked.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to a safe and efficient processing method for file remote sharing backup recovery. Background technique [0002] Traditional off-site backup can be called off-site exclusive backup. In this case, the backup client and the backup center belong to the same management domain and belong to the intranet, and the security requirements for the backup data (specifically confidentiality and integrity, the same below) are not high. [0003] In recent years, with the development of IT technology, the popularization of applications, and the refinement of division of labor, a dedicated third-party data service center (IDC) has emerged. As a result, off-site shared backup began to appear and developed rapidly, becoming the main development trend of off-site backup. In the remote shared backup mode, the backup client and the backup center belong to different management dom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 蒋晓宁黄军李渝川黄海峰冷阳黄怡浩王喜萍刘燕燕
Owner 杭州奕锐电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products