Supercharge Your Innovation With Domain-Expert AI Agents!

Method for carrying out RSA encryption storage on data dictionary information

A data dictionary and encrypted storage technology, applied in the field of cloud computing, can solve problems such as data information leakage, and achieve the effect of protecting sensitive data, difficult to crack, and high execution efficiency

Active Publication Date: 2018-01-19
山东新潮信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Use relational database storage. When the database is attacked illegally, its content will be easily stolen by hackers, resulting in data leakage
[0006] Therefore, if it is necessary to encrypt and store the data dictionary information in the cloud computing environment according to the personalized requirements of the business, especially if the user requests to use different keys to encrypt data to increase security, this is currently the mainstream cloud computing platform and Conventional tools cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out RSA encryption storage on data dictionary information
  • Method for carrying out RSA encryption storage on data dictionary information
  • Method for carrying out RSA encryption storage on data dictionary information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The process of initializing management node A in step b) is:

[0040] b-1) start management node A;

[0041]b-2) After the management node A starts successfully, it initializes the local embedded database engine and opens the database file, and then enters the waiting state, waiting for the data storage node D, service provider node S and log node L to register.

[0042] The so-called RSA encryption algorithm is currently the most influential public key encryption algorithm, and is generally considered to be one of the best public key schemes at present. RSA is the first algorithm that can be used for encryption and digital signature at the same time. It can resist all cryptographic attacks known so far and has been recommended by ISO as a public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is very easy to multiply two large prime numbers, but then it is extremely difficult to factorize their products, so t...

Embodiment 2

[0044] The service nodes registered with the management node A in step c) are the data storage node D, the service providing node S and the log node L. What each type of service node reports is the data dictionary information that needs to be released when the node itself provides services. The information is encrypted using the Key file information provided by management node A according to the RSA algorithm. Encrypted and uploaded to management node A.

Embodiment 3

[0046] The process of registering with management node A in step c) is:

[0047] c-1) Start the pre-registered service node. After the service node is successfully started, query the local database to obtain the configuration information of the service node and put it into the memory;

[0048] c-2) After the configuration information is obtained successfully, register with management node A. At this time, provide the service registration code and service access password provided by management node A, and send a registration request to management node A;

[0049] c-3) Management node A verifies after receiving the registration request, saves the information of the pre-registered service node in its own resource library after the verification is passed, and adds a registered service node on the management control platform of management node A.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for carrying out RSA encryption storage on data dictionary information. The method comprises the following steps that a), a cloud computing platform is set up; 2), a management node A is initialized; c), all service nodes participating in cloud computing are registered with the management node A; d), on the management node A, a key file for authentication is takenas an RSA decryption key, and moreover, decryption check is carried out on received data dictionary information sent by various service nodes; and e), after a service providing node S and a data storage node D receive the data dictionary information issued by the management node A, and through utilization of own stored key file in the management node A as the RSA decryption key, the decryption check is carried out on data dictionary ciphertexts. Complex software and hardware device and various development languages in the cloud computing environment can be adapted, the dependence on a specificdevice or software is avoided, the decryption check is carried out through a plurality of nodes in parallel, the performance of the normal business is not influenced, the performance efficiency is high, and the information can be effectively prevented from being leaked.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a method for RSA encrypted storage of data dictionary information. Background technique [0002] At present, the mainstream way of storing cloud computing node data dictionary information is still realized through traditional modes. storage. [0003] In the new cloud computing environment, the traditional model has the following problems: [0004] 1. Use TXT or XML format files to store in the operating system. It is easy for the system administrator to directly see and modify the contents of the files, and the read and write permissions of the files are affected by the directory permissions of the operating system. Easily seen by other users in the operating system. [0005] 2. Use relational database storage. When the database is attacked illegally, its content will be easily stolen by hackers, resulting in data information leakage. [0006] Therefore, if it is nece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/30H04L9/32
Inventor 段吉民崔煜华王鹏
Owner 山东新潮信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More