Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data encryption storage method for mimic defense system

A data encryption and defense system technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as the inability to defend against data storage security issues, and achieve the goal of ensuring non-tampering, increasing difficulty, and improving data security. Effect

Active Publication Date: 2022-07-15
ZHEJIANG LAB
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing cloud storage platform cannot defend data storage security based on unknown loopholes and backdoors, the present invention provides a data encryption storage method oriented to a mimic defense system, which is not only compatible with the existing storage architecture, but also improves the efficiency of stored data safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption storage method for mimic defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be described clearly and completely below with reference to the accompanying drawings of the present invention.

[0025] like figure 1 It is a flow chart of the data storage and encryption method for the mimic defense system of the present invention, and the method specifically includes the following steps:

[0026] (1) When the user performs a file write operation, the following sub-steps are included:

[0027] (1.1) The user sets the storage attributes of the data files to be uploaded, including file security level requirements and throughput requirements, and selects the data files to be uploaded. The input proxy module receives the storage attributes uploaded by the user and the data files to be uploaded, and sets the user settings The storage attributes and user information of the predetermin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption storage method oriented to a mimetic defense system. The method includes: an input proxy module receives a user's data read and write request, converts and encapsulates user settings, sends it to a policy controller, and distributes it to a heterogeneous cloud according to the policy Storage platform; after comprehensive analysis by the policy controller, formulate and distribute multi-signature policies, encryption policies, fragmentation policies, and signature authentication policies to heterogeneous cloud storage platforms; Fragmentation, encryption operation or reorganization, decryption, authentication operation and send it to the arbiter; the arbiter decides the signature authentication and sends it to the policy scheduler; the output agent module processes and converts the operation information and reports it to the user. This method improves data security, and can also reasonably formulate different security policies for different data security requirements, so as to meet users' requirements for data storage performance.

Description

technical field [0001] The invention relates to the technical field of encrypted storage, in particular to a data encryption storage method oriented to a mimic defense system. Background technique [0002] Traditional data encryption storage services focus on the functionality of cloud storage, with the main goal of improving storage capacity and throughput. For the security of data in the cloud storage platform, traditional defense technologies are the mainstay. There is a lack of endogenous security features that prevent intruders from exploiting the platform's own vulnerabilities and backdoors for data cracking and tampering. The oriented cloud storage platform is also a traditional cloud storage platform with a fixed technical architecture, which cannot be applied to a cloud storage platform with mimetic defense characteristics. SUMMARY OF THE INVENTION [0003] Aiming at the problem that the existing cloud storage platform cannot defend against the data storage secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F21/60G06F21/64
CPCG06F21/78G06F21/602G06F21/64G06F2221/2107
Inventor 梁元邱启仓吴春明邬江兴
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products