Data encryption storage method for mimicry defense system

A data encryption and defense system technology, which is applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problems of indefensible data storage security issues, etc., to ensure non-tampering, increase difficulty, and improve data security. Effect

Active Publication Date: 2020-06-19
ZHEJIANG LAB
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing cloud storage platform cannot defend data storage security based on unknown loopholes and backdoors, the present invention provides a data encryption storage method oriented to a mimic defense system, which is not only compatible with the existing storage architecture, but also improves the efficiency of stored data safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption storage method for mimicry defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention.

[0025] Such as figure 1 It is a flow chart of the data storage encryption method for the mimic defense system of the present invention, the method specifically includes the following steps:

[0026] (1) When the user performs a file write operation, the following sub-steps are included:

[0027] (1.1) The user sets the storage attributes of the data files to be uploaded, including file confidentiality requirements and throughput requirements, and selects the data files to be uploaded, and the input agent module receives the storage attributes uploaded by the user and the data files to be uploaded, and sets the user settings The storage attributes and user information of the specified...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption storage method for a mimicry defense system, and the method comprises the steps that an input agent module receives a data read-write request of a user, uploads user settings to a strategy controller after the user settings are converted and packaged, and distributes the user settings to a heterogeneous cloud storage platform according to a strategy; aftercomprehensive analysis of the strategy controller, a multi-signature strategy, an encryption strategy, a fragmentation strategy and a signature authentication strategy are formulated and distributedto the heterogeneous cloud storage platform; the heterogeneous cloud storage platform performs multiple signature, fragmentation and encryption operation or recombination, decryption and authentication operation on the data according to the issuing strategy and uploads the data to the decision device; the decision device decides the signature authentication and uploads the signature authenticationto the strategy scheduler; and the output agent module processes and converts the operation information and reports the operation information to a user. According to the method, the data security isimproved, different security policies can be reasonably formulated according to different data security requirements, and the requirements of users on the data storage performance are met.

Description

technical field [0001] The invention relates to the technical field of encrypted storage, in particular to a data encrypted storage method oriented to a mimic defense system. Background technique [0002] Traditional data encryption storage services focus on the functionality of cloud storage, with the main goal of increasing storage capacity and throughput. For the security of data in the cloud storage platform, traditional defense technologies are the mainstay. Lack of inherent security features that prevent intruders from exploiting the platform's own vulnerabilities and backdoors to crack and tamper with data. The targeted cloud storage platform is also a traditional cloud storage platform with a fixed technical architecture, which cannot be applied to a cloud storage platform with mimic defense features. Contents of the invention [0003] Aiming at the problem that the existing cloud storage platform cannot defend data storage security based on unknown loopholes and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/60G06F21/64
CPCG06F21/78G06F21/602G06F21/64G06F2221/2107
Inventor 梁元邱启仓吴春明邬江兴
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products