Cloud storage encrypting and deciphering method based on secret key pool

An encryption and decryption algorithm and encryption and decryption technology, applied in the field of Internet distributed cloud storage, can solve the problems of inapplicable encryption and decryption of large files, large amount of calculation, etc., and achieve the effect of improving reliability, ensuring security and privacy

Inactive Publication Date: 2012-07-04
XIDIAN UNIV
View PDF2 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the common problem with asymmetric encryption and decryption algorithms is that the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage encrypting and deciphering method based on secret key pool
  • Cloud storage encrypting and deciphering method based on secret key pool
  • Cloud storage encrypting and deciphering method based on secret key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Embodiment 1, generation of ciphertext key pool

[0029] The key pool generation process reference figure 1 , the specific process of key pool generation is introduced below.

[0030] (1) Take the original string x

[0031] In order to make the generated keys more disorderly and random, the key generation algorithm uses as many random parameters as possible as initial seeds. x = username (registered username) + current time (expressed as year, month, day, hour, minute, second, millisecond) + MD5 code of the user password. And de-symbolize x, that is, remove all non-alphabetic and non-numeric characters in x.

[0032] (2) Set the control factor as k (randomly generated), and k needs to satisfy:

[0033] (2a) is an integer;

[0034] (2b) 0≤k≤127

[0035] (3) Loop for each character x[i] in the string (1≤i≤length(x) is the length of the string x):

[0036] (3a) If the remainder of i modulo 2 is 1, that is, for all odd-numbered characters x[i], perform the following ...

Embodiment 2

[0049] Embodiment 2, the extraction algorithm of key

[0050] Key extraction algorithm reference figure 2. The key extraction algorithm adopts the linear extraction method, and provides a linear division method to extract the key algorithm (but not limited to this method), the formula is as follows:

[0051] x(j)=(k*j+a) mod N j=1, 2,...

[0052] Where x(j) is the serial number of the jth key, k is the linear step coefficient, a is the starting position, and N is the total number of keys. If k=7, a=66, N=100, the first extracted key number is 73, the second extracted key number is 80, and the third key number is 87.  …

[0053] The key extraction algorithm can also adopt a non-linear extraction method, providing a parabola method to extract the key algorithm (but not limited to this method), the formula is shown in the following formula:

[0054] x(j)=(k*j*j+a) mod N j=1, 2,...

[0055] Where x(j) is the number of the jth key, k is the step factor, a is the starting posi...

Embodiment 3

[0057] Example 3. Block encryption of files

[0058] The process of file block encryption refers to the attached picture image 3 , the specific process of file block encryption is introduced below.

[0059] (1) The user selects the file to be encrypted and stored in the terminal, and divides the file (FILE) into several file blocks FILEj (1≤j≤M) according to a fixed size. The last block may be smaller than the fixed size, and j is equal to 1.

[0060] (2) Take the jth (1≤j≤M) file block FILEj from the file block, the block number j of the file block is used as j in the key extraction algorithm, and the key number i=x( j).

[0061] (3) Take out the ciphertext key KEYTWOi (1≤i≤N) from the user’s ciphertext key pool, and use the private key (KEY 私钥 ) and asymmetric encryption algorithm (ECC or RSA) to decrypt KEYTWOi to generate key KEYONEi.

[0062] (4) Use KEYONEi as the key of a symmetric encryption algorithm (such as AES) to encrypt the jth file block FILEj, and store it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud storage encrypting and deciphering method based on a secret key pool. Symmetric encrypting and deciphering and asymmetric encrypting and deciphering are combined to respectively encrypt files and secret keys; a secret key pool with multiple secret keys is generated randomly, each secret key is encrypted by an asymmetric encrypting and deciphering algorithm to constitute a ciphertext secret key pool, and the ciphertext secret key pool is stored in a cloud end distribution type cloud storage server of a user; when a file is encrypted, the file is cut into a plurality of blocks at a source end; one secret key KEYTWOi is taken out in accordance to a secret key extract algorithm from the ciphertext secret key pool, and after the secret key KEYTWOi is deciphered with a private key KEY of the user and the asymmetric encrypting and deciphering algorithm, a secret key KEYONEi is obtained; and the file blocks are encrypted in a symmetric encrypting algorithm. The file blocks are encrypted and deciphered at a high security level so as to ensure the safety and privacy of the file and improve the reliability of a personal cloud storage platform. The ciphertext secret key pool of the user and a plurality of ciphertext file blocks are stored in the cloud storage platform.

Description

technical field [0001] The invention belongs to the field of security technology, relates to a file encryption method for cipher text cloud storage, and can be used for Internet distributed cloud storage. Background technique [0002] With the rapid development of social informatization and the massive increase of data, the application of distributed cloud storage based on the Internet is becoming more and more extensive. Large-capacity file transfer and storage services are playing an increasingly important role in various industries. The distributed cloud storage platform stores files in the network cloud. The security and privacy of files will be the focus of the security of the entire cloud storage platform. Therefore, encrypted storage of files has become the first choice to solve security problems. However, the encryption methods commonly used today have more or less security issues. How to implement a high security level encryption method has always been an importan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/08
Inventor 王凯东于菊珍林燕
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products