Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data access method

A data access and data storage technology, applied in the direction of digital data protection, can solve the problems of increased time cost, high user requirements, and no longer applicable, and achieve the effect of reducing the probability of leakage, enhancing privacy and high availability

Active Publication Date: 2013-04-10
ZHEJIANG UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has high requirements for users, and also increases the time cost of users, etc.
And user data often needs to be stored online for a long time. In this case, the key that currently provides sufficient security for the data may no longer be reliable after a period of time
Based on the above reasons, the security system based on explicit security policies is largely no longer applicable to online data storage services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method
  • Data access method
  • Data access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] A data access method, comprising the steps of:

[0036] data storage:

[0037] (1) Convert each byte of the data Data input by the user User into a 5-dimensional feature vector through radical splitting;

[0038] First, construct the polynomial of degree 5 as follows:

[0039] x 5 +a 4 x 4 +a 3 x 3 +a 2 x 2 +a 1 x+a 0 =0

[0040] Then, the above polynomial of degree 5 is transformed into the following expression:

[0041] (x-r 1 )(x-r 2 )(x-r 3 )(x-r 4 )(x-r 5 )=0

[0042] Among them, r 1 ~ r 5 are the k roots of the 5th degree polynomial, then r 1 ×r 2 ×r 3 ×r 4 ×r 5 =a 0 ;

[0043] Finally, let the byte value (0~255) of any byte be a 0 , and randomly generate r 1 ~ r 4 value, and then find r 5 ; make r 1 ~ r 5 is th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access method. The method comprises the following steps of: processing original data by utilizing a byte as a unit, and flexibly splitting the byte value of the data according to needs, and supposing that the data is split into k parts (k is greater than 1); and introducing a data redundancy strategy to further process the split data so as to finally convert the k parts of data into n parts of redundancy splitting data (n is greater than k) supporting distributive storage. When the original data is needed to be accessed, according to the method, any k parts of data among the n parts of split data are taken to reconstruct the original data, so that the integrity and the accuracy of the data are ensured; meanwhile, due to the existence of data redundancy, the problem that certain split data is unusable due to factors of damage to the certain split data is effectively solved; in addition, the original data is reconstructed by at least obtaining k parts of split data and learning an algorithm and relevant parameters, so that security threats caused by external attacks or storage service providers are greatly reduced; and the data access method can be used for effectively improving the privacy and the usability of data storage and is quite suitable for a current extensive distributive storage mode.

Description

technical field [0001] The invention belongs to the technical field of data access, and in particular relates to a data access method. Background technique [0002] The development of storage methods has gone through the era of built-in storage, the era of direct-connected storage, the era of network storage, and the era of cluster storage. Among them, storage technologies such as NAS (Network Attached Storage) and SAN (Storage Area Network) have emerged in the era of network storage. Clusters also have their own characteristics and advantages, and distributed storage methods are gradually becoming popular. [0003] Distributed storage methods can generally be divided into structured, semi-structured and unstructured storage according to the type of data stored; or divided into master-slave and peer-to-peer (ie P2P) storage according to the architecture of the storage system . Master-slave storage systems also include structured ones such as Oracle clusters, semi-structur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
Inventor 马然姜晓红吴朝晖
Owner ZHEJIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More