Unlock instant, AI-driven research and patent intelligence for your innovation.

An Auditable Encrypted Storage Method

A technology for encrypting storage and encrypting data, which is applied to the public key and key distribution of secure communication, which can solve the problems of terminal consumption, encryption not working as expected, and remote file auditing, etc., so as to improve security and facilitate file auditing Effect

Active Publication Date: 2021-07-16
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. If the encryption algorithm used is not suitable, or the strength is relatively low, the attacker can still restore the plaintext data through brute force guessing, that is, the encryption will not achieve the desired effect
[0005] 2. If an appropriate encryption algorithm is selected, end users still cannot conveniently conduct follow-up audits on remote files
But the problem is that the user's audit requirements are still relatively cumbersome and need to consume more resources on the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Auditable Encrypted Storage Method
  • An Auditable Encrypted Storage Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0047]First, it is to be noted that the present invention relates to an inspection of questionnaire data analysis techniques, and is an application in the field of information security technology. In the implementation of the present invention, the application of multiple software function modules will be involved. Applicants believe that,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, The aforementioned software function modules include, but are not limited to, key generation modules, data processing modules, auditing modules, integrity verification modules, encrypted data restore modules, integrity certification modules, etc., all of which are mentioned in this category Applicants are no longer listed.

[0048] One auditable encryption storage method as an example, is as follows:

[0049] 1, key generation

[0050] Suppose the given security parameter λ is 2048, the user end...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to data encryption and storage technology, and aims to provide an auditable encrypted storage method and system. The system includes a client and a server that are connected based on the Internet. The client is configured with a key generation module, a data processing module, an audit initiation module, an integrity verification module, and an encrypted data restoration module, and only an integrity certification module is configured on the server. . Even if the server end of the present invention obtains the outsourced data, it cannot know its real content, and when the security parameter λ is selected with an appropriate value, it is very difficult to brute force cracking. Use a modified RSA algorithm to encrypt files, and use a relatively safe mapping function to assist. These two parts are encrypted and unreadable for the remote service, and a specific calculation formula is subsequently constructed to verify its integrity without requiring the user to download the file back and decrypt it. It can improve the security of encrypted storage and make file auditing more convenient.

Description

Technical field [0001] The present invention relates to data encryption and storage techniques, and more particularly to an auditable encryption storage method and system. Background technique [0002] In the era of Internet popularity, end users are constraints for their own calculation conditions, often choose to store files on remote servers, such as managed servers, clouds, and more. From the perspective of information security, this method alleviates the device pressure of the end user itself, but has increased security hazards to some extent. After being invaded, the remote server may be steadped and tampered, even embed malicious code; the credibility of cloud service providers cannot guarantee that the user has lost the control of its status after the user uploaded files. Especially when the user file is compared to confidentiality, the consequences become relatively serious. [0003] One of the main means to address this situation is to encrypt the file before uploading....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08H04L29/08
CPCH04L9/0869H04L9/302H04L63/0428H04L63/0442H04L63/123H04L67/06
Inventor 李铭晖范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD