Cloud storage data encryption method and cloud storage system
A technology of cloud storage system and encryption method, which is applied in the field of cloud storage, can solve problems affecting the security of data uploaded by users and imperfect protection schemes, and achieve the effect of convenient and fast sharing, solving security and high efficiency, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0050] Embodiment 1, the cloud storage data encryption method involved in the present invention, the encryption and decryption process is integrated with the file upload and download process, that is, the file is encrypted while being uploaded, and the file is decrypted while being downloaded. The encryption and decryption operations of files are all completed on the client side, and the data exists in the form of ciphertext during the transmission process, and all user data content on the WAN exists in the form of ciphertext;
[0051] File upload includes the following process:
[0052] 1.1. The client establishes a connection with the background of the cloud storage system;
[0053] 1.2. The client obtains the key factor set by the user from the background of the cloud storage system, and calculates the symmetric key;
[0054] 1.3. The client calculates the file header of the file to be uploaded and uploads it;
[0055] 1.4. The client performs block processing on the uplo...
Embodiment 2
[0068] Embodiment 2, in order to ensure the high efficiency of user use, a local automatic backup folder is set on the client side, and the local automatic backup folder is scanned every minute. If there is a change or new addition to the file, the change will be in the form of cipher text Automatically syncs to the cloud. Others are the same as in Embodiment 1.
Embodiment 3
[0069] In the third embodiment, in order to ensure the safety of the user, the encryption method adopts the SM4 national secret algorithm to encrypt and decrypt the data block. Others are the same as in Embodiment 1.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com