Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and system, and secret key server

A key server and data processing technology, which is applied in the field of data processing, can solve problems such as narrowing the prediction space of ciphertexts and cannot resist rapid violent attacks, and achieve the effect of resisting offline violent attacks and ensuring confidentiality

Inactive Publication Date: 2018-07-27
CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it cannot resist rapid brute force attacks based on file popularity, that is, cloud storage service providers and hackers can quickly reduce the plaintext prediction space of ciphertext by analyzing the popularity of recent files and the number of users of ciphertext, and then use the existing The key generation / exchange mechanism generates a key, encrypts the plaintext in the plaintext prediction space, and quickly collides the potential plaintext of the ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system, and secret key server
  • Data processing method and system, and secret key server
  • Data processing method and system, and secret key server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] In order to solve the problems in the prior art, the present invention provides a data processing system, including a client, a key server, and a storage server. The client in this embodiment is a cloud storage user, and the storage server is a cloud storage server. see figure 1 shown.

[0035] The key server is used to obtain the file identification sent by the client; use the signature key to sign the received file identification, obtain the encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and system and a secret key server; the method comprises the following steps: acquiring a file identifier sent by a user terminal; using a signature key for signing the received file identifier to obtain an encryption key; and counting the number of times of signature of the file identifier, wherein when the number of times of signature reaches an upper limit value of a preset number of times of signature, updating the signature key required by the signature; and sending the obtained encryption key to the user terminal. According to the method,the system and the secret key server in the invention, the confidentiality of the data of a storage user can be effectively guaranteed, so that a rapid violent attack based on file popularity is resisted.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data processing method, system and key server. Background technique [0002] In order to ensure the confidentiality of cloud data, cloud storage users generally use encryption to upload their own files to the cloud storage server after encrypting them. However, this method hinders the data deduplication of the cloud storage server. For example, when two users upload the same file, they will get different ciphertexts due to the different keys used. Therefore, the cloud storage server needs to provide One file stores two ciphertexts. [0003] In order to realize the confidentiality protection of user data and the data deduplication on the cloud storage server side at the same time, secure data deduplication technology came into being. Using secure data deduplication technology, cloud storage users who own the same file can obtain the same file key, and therefore, will a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3236H04L9/3247H04L63/0428H04L67/06H04L67/1097
Inventor 雷蕾杜娟
Owner CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products