Full-secret retrieval research of big data security

A big data and security technology, applied in the fields of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems such as the inability to retrieve data content, and the problem of key management and storage.

Inactive Publication Date: 2021-04-23
纬领(青岛)网络安全研究院有限公司 +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although users can encrypt it by themselves and upload it to the cloud disk, as the number of files increases, key management and storage will become a problem
At the same time, the encrypted data content cannot be retrieved
These problems affect more and more people who are using cloud disks and want to use cloud disks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The system is divided into client and server:

[0025] The client and the server interact through channel encryption to perform file encryption and retrieval services (including document retrieval and image retrieval); the server stores the ciphertext index of the file, and the retrieval is performed on the server, and the data storage server only stores encrypted files. This prevents the data server from scanning and detecting the user's privacy. The data storage server supports private cloud OpenStack and FTP servers.

[0026] 1. Client technology implementation

[0027] By interacting with the server and the cloud disk, the client can realize functions such as user login, encrypted upload and download of files, and retrieval of documents and pictures. Document retrieval is searched by inputting keywords, and image retrieval needs to select images to search; its main technical implementation has the following aspects:

[0028] 1. Document content extraction

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses full-secret retrieval research of big data security, which is high-security file storage software aiming at solving the problems that secret files in enterprises are illegally stolen, the transmission process is captured, sensitive files are safely stored and the like. Functions of file security storage, file transmission channel encryption, document full ciphertext retrieval, picture retrieval, file sharing, authority hierarchical access and the like can be realized. The system is mainly divided into a client and a server, and file encryption and retrieval services (including document retrieval and picture retrieval) are performed through channel encryption interaction; the server side stores the ciphertext index of the file, retrieval is carried out in the server, and the data storage server only stores the encrypted file. In this way, privacy scanning and detection of the data server on the user are eradicated. And the data storage server supports a private cloud OpenStack and an FTP server.

Description

technical field [0001] A software product designed to solve the field of big data security and implement full secret retrieval of documents under encrypted conditions. This software is a high-security document processing software that realizes functions such as safe storage of files, encryption of file transmission channels, sharing of files by role, hierarchical access of permissions, and retrieval of full ciphertext of documents, effectively solving the problem of illegal theft of confidential files within the enterprise It perfectly realizes the safe storage of sensitive documents and the safe retrieval of encrypted documents. Background technique [0002] With the popularity of cloud disks, more and more users will choose to use them to store data; in general, all operations on any client connected to the server can be recorded by the server; all uploaded documents can also be Transparent to the server, even if many cloud disks have encryption functions; search records ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06G06F21/60
CPCH04L67/06H04L67/1097H04L63/104H04L63/105G06F21/602G06F21/604G06F2221/2141G06F2221/2107
Inventor 李彦江孙晓梅于东生周龙王金波
Owner 纬领(青岛)网络安全研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products