Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure data storage method and secure data read method based on distributed system infrastructure

A technology for safe data storage and distributed system, applied in the field of cryptography, it can solve the problems of difficult key management, slow encryption and decryption, and inappropriate encryption and decryption, so as to ensure integrity and confidentiality, convenient use and management, Password change convenient effect

Inactive Publication Date: 2015-03-11
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Symmetric encryption algorithm is characterized by open algorithm, small amount of calculation, fast encryption speed, and high encryption efficiency; the disadvantage is that the same key is used for encryption and decryption, the security cannot be guaranteed, and the key is difficult to manage
The disadvantage of asymmetric encryption is that the encryption and decryption speed is slow and the efficiency is very low, so it is not suitable for encrypting and decrypting a large amount of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data storage method and secure data read method based on distributed system infrastructure
  • Secure data storage method and secure data read method based on distributed system infrastructure
  • Secure data storage method and secure data read method based on distributed system infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] see figure 1 , is a flow chart of a data security storage method based on a distributed system infrastructure provided by an embodiment of the present invention. The data security storage method based on the distributed system infrastructure includes steps:

[0055] S1. Generate digest information; use a message digest algorithm to sign the data to be stored, thereby generating digest information;

[0056] S2. Encrypting data; using a random key generated by a key generation function to encrypt the data to be stored, so as to obtain corresponding ciphertext;

[0057] S3. Concealing the random key; performing concealment processing on the random key generated in step S2, so as to obtain the random key information of the ciphertext;

[0058] S4, storing the ciphertext; storing the ciphertext obtained in step S2 in the distributed file system DFS;

[0059] S5. Store relevant information; store the summary information generated in step S1 and the random key information o...

Embodiment 2

[0064] see image 3 , is a flow chart of a data security storage method based on a distributed system infrastructure provided by an embodiment of the present invention. The data security storage method based on the distributed system infrastructure of the present embodiment includes steps:

[0065] S1. Generate digest information; use a message digest algorithm to sign the data to be stored, thereby generating digest information;

[0066] In this step, it is preferable to use various attributes of the data to be stored and a random padding number to generate the summary information; wherein, the attributes include user password information, so that when the user modifies the password information, the random password The key information changes accordingly, but there is no need to re-encrypt all ciphertexts, which improves efficiency and reduces complexity. In addition, for users and systems, only key information needs to be managed, which simplifies key management. Using ra...

Embodiment 3

[0074] see Figure 5 , is a flow chart of a data security storage method based on a distributed system infrastructure provided by an embodiment of the present invention. The data security storage method based on the distributed system infrastructure of the present embodiment includes steps:

[0075] S1. Generate digest information; use a message digest algorithm to sign the data to be stored, thereby generating digest information;

[0076] In this step, preferably, the summary information is generated by using various attributes of the data to be stored and a random filling number; wherein, the attributes include user password information.

[0077] S2. Encrypting data; using a random key generated by a key generation function to encrypt the data to be stored, so as to obtain corresponding ciphertext;

[0078] S31. Adopt the SHA encryption algorithm to digest the various attributes of the data to be stored and a random padding number to obtain a digest value (byte array), and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure data storage method based on a distributed system infrastructure. The method comprises a first step of generating digest information; a second step of encrypting data; a third step of hiding a random secret key; a fourth step of storing a ciphertext; and a fifth step of storing related information. In the first step, data to be stored is signed by an information digest algorithm so as to generate the digest information; in the second step, the data to be stored is encrypted by the random secret key generated by a secret key generation function so as to acquire corresponding ciphertext; in the third step, the random secret key generated in the second step is hidden so as to acquire random secret key information of the ciphertext; in the fourth step, the ciphertext acquired in the second step is stored in a distributed file system; and in the fifth step, the digest information generated in the first step, the random secret key information acquired in the third step and file names are stored in an open source database. The invention also discloses a secure data read method based on the distributed system infrastructure.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a method for safely storing and reading data based on a distributed system infrastructure. Background technique [0002] There are two main types of encryption algorithms: symmetric encryption algorithms and asymmetric encryption algorithms. [0003] Symmetric encryption algorithm is characterized by open algorithm, small amount of calculation, fast encryption speed, and high encryption efficiency; the disadvantage is that encryption and decryption use the same key, security cannot be guaranteed, and the key is difficult to manage. [0004] Asymmetric encryption algorithms use two completely different but identical pairs of keys—a public key and a private key. When using an asymmetric encryption algorithm to encrypt a file, only a matching pair of public key and private key can be used to complete the encryption and decryption process of the plaintext. The disadvantage of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 关泽武郭晓斌许爱东蒋屹新陈华军蒙家晓杨航张福铮刑涛吴争荣
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products