Data storage method for privacy protection based on encryption password and data fractionation

A data and password technology, applied in the field of data security, can solve the problems of easy enumeration of keys and leakage of user privacy, and achieve the effect of protecting data privacy and facilitating system deployment and user use.

Inactive Publication Date: 2015-11-25
INST OF INFORMATION ENG CAS +1
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this avoids the trouble of generating and storing keys, such keys are easy to be exhausted; the administrator of the data storage server or a hacker who

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method for privacy protection based on encryption password and data fractionation
  • Data storage method for privacy protection based on encryption password and data fractionation
  • Data storage method for privacy protection based on encryption password and data fractionation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0032] In the present invention, the user disperses the ciphertext c of data m into n parts and stores them on n servers as an example for illustration, wherein the key derivation function f used is SHA-256, and the encryption and decryption algorithm is AES-256, (n , t) The data splitting algorithm is the Shamir secret sharing algorithm, and the corresponding data descriptor of m is dd (such as the file name, etc.).

[0033] An application scenario during the specific implementation of the present invention is that the application program (APP) on the mobile smart terminal realizes all client functions, and the processes of storing data and restoring data are as follows: figure 1 with figure 2 shown.

[0034] figure 1 In the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data storage method for privacy protection based on an encryption password and data fractionation. A user specifies data to be operated on a client and inputs the encryption password, the client converts the encryption password into a key for encrypting a plaintext and converts the plaintext into a ciphertext by use of an encryption algorithm, then the client divides the ciphertext into n parts by use of a (n, t) data fractionation algorithm and respectively stores the n parts of the ciphertext on a plurality of servers; when the user needs to recover the data, the clients takes back t parts of the n parts of ciphertext sub-blocks and recovers the ciphertext by use of a recovering algorithm corresponding to the data fractionation algorithm; and the client converts the encryption password input by the user into a key and coverts the ciphertext into a plaintext by use of a corresponding decryption algorithm. The data storage method provided by the invention can be used for effectively protecting the data privacy of the user without adding additional equipment, thereby facilitating system deployment and user application.

Description

technical field [0001] The invention relates to the field of data security, in particular to a privacy-protected data storage method based on encrypted passwords and data splitting. Background technique [0002] In the era of cloud computing, people have more and more data. In order to facilitate data acquisition, mobile office, etc., people often store data on servers. If the data is not encrypted and stored, it will lead to the leakage of user privacy. And if the data is encrypted and stored, the generation and storage of the key is not a simple matter. The key can be generated by extracting biometric features such as user fingerprints through special equipment, or it can be randomly generated and then stored with tokens and other devices. Although this solves the problem of key generation and storage, it also introduces additional special equipment, so it is not convenient for system deployment and user use. Then people thought that the password that the user could re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/062H04L67/1097
Inventor 朱文涛王展杨玲潘适然
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products