Encryption storage method for tampering-resistant files

A technology of encrypted storage and encryption algorithm, which is applied in the direction of public key, electrical components, and digital data protection of secure communication, which can solve problems such as server throughput bottlenecks, meet file storage requirements, meet high security requirements, and improve The effect of sensitivity

Active Publication Date: 2017-09-29
南京安链数据科技有限公司
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the popular encrypted server / client model, the throughput capacity of the server becomes the bottleneck of the whole system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption storage method for tampering-resistant files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Through the following description of the embodiments, it will be more helpful for the public to understand the present invention, but the specific embodiments given by the applicant cannot and should not be regarded as limitations on the technical solutions of the present invention, any components or technical features Changes to the definition and / or formal but not substantive changes to the overall structure should be regarded as the scope of protection defined by the technical solutions of the present invention.

[0017] The present invention mainly provides a new distributed encrypted tamper-proof storage strategy, which improves the sensitivity to tampered data from file information storage and an information fingerprint storage. At the same time, the operation authority control of the file adopts the method of partial signature.

[0018] First of all, before uploading the file to be encrypted to the distributed storage system, a user multi-signature authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption storage method for tampering-resistant files. The encryption storage method includes carrying out auditing querying in file uploading phases; storing the files which pass auditing in distributed clusters; segmenting and encrypting the files; carrying out Merkle tree Hash computation on the segmented files to obtain information fingerprints of the files; utilizing id (identification) of the files and tree roots hashRoot as key value pairs and storing the key value pairs in memory databases; carrying out decryption by the aid of encryption algorithms in file acquiring phases to obtain segmenting paths so as to obtain the original files. The encryption storage method has the technical advantages that the storage reliability of the distributed files further can be improved, file loss risks can be decentralized to multiple nodes, file management tasks are assigned to multiple users, segmenting information is briefly stored by the aid of structures of Merkle trees, accordingly, the file tampering sensitivity of systems can be improved, and file storage requirements with high safety requirements can be met.

Description

technical field [0001] The invention relates to an encrypted storage method, in particular to an encrypted storage method for files that cannot be tampered with. Background technique [0002] In real life, we always have a lot of files that need to be encrypted, such as company contracts, employee information, personal privacy information, etc. As more and more information is digitized, how to securely store digital information has become a top priority in modern society. On the one hand, while the distributed file system solves the problem of storage capacity and data backup, it also leaves hidden dangers in data security. On the other hand, the continuous evolution of encryption algorithms has significantly improved the security of files. Due to the popular encrypted server / client model, the throughput capacity of the server becomes the bottleneck of the whole system. How to improve verification efficiency in a distributed environment is a critical issue. [0003] Merk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/30H04L9/32
CPCH04L9/302H04L9/3249G06F21/6209G06F2221/2107
Inventor 郭伟黄苏豫金丹丹李刚
Owner 南京安链数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products