CN101808095A - Encryption copy organization method under distributed storage environment - Google Patents
Encryption copy organization method under distributed storage environment Download PDFInfo
- Publication number
- CN101808095A CN101808095A CN 201010128240 CN201010128240A CN101808095A CN 101808095 A CN101808095 A CN 101808095A CN 201010128240 CN201010128240 CN 201010128240 CN 201010128240 A CN201010128240 A CN 201010128240A CN 101808095 A CN101808095 A CN 101808095A
- Authority
- CN
- China
- Prior art keywords
- data
- read
- client
- file
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000008520 organization Effects 0.000 title claims abstract description 11
- 230000008569 process Effects 0.000 claims description 6
- 230000008859 change Effects 0.000 claims description 2
- 239000012634 fragment Substances 0.000 claims 3
- 230000011218 segmentation Effects 0.000 claims 1
- 238000007726 management method Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 239000000872 buffer Substances 0.000 description 3
- 241001441724 Tetraodontidae Species 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
本发明公开了一种分布式存储环境下的加密副本组织方法,该方法将系统数据的管理单位数据块分成多个大小相等数据段,系统仍以块为单位进行管理,客户端以数据段为单位对数据进行加密,这样就能对数据块提供更细粒度的控制。由于数据块是被分段加密的,故各个密文数据段之间不具有相关性,可以被并行的加解密,避免了小数据量的读写就对整个数据块进行加解密带来的巨大开销;对于大数据量的读,将读请求进行分组,将不同的分组请求并行的发送到维护着被请求文件数据块副本的各个存储节点,并行读取各个分组,提高读数据的效率。本发明实现了在分布式存储环境下应用加密技术和副本技术,所提出的加密副本组织方法极大的提高了读写数据的效率。
The invention discloses a method for organizing encrypted copies in a distributed storage environment. The method divides a management unit data block of system data into multiple data segments of equal size. Units encrypt data, which provides finer-grained control over data blocks. Since the data block is encrypted by segments, there is no correlation between each ciphertext data segment, which can be encrypted and decrypted in parallel, avoiding the huge cost of encrypting and decrypting the entire data block when reading and writing a small amount of data. Overhead; for reading large amounts of data, read requests are grouped, and different group requests are sent in parallel to each storage node that maintains a copy of the requested file data block, and each group is read in parallel to improve the efficiency of reading data. The invention realizes the application of the encryption technology and the copy technology in the distributed storage environment, and the proposed encryption copy organization method greatly improves the efficiency of reading and writing data.
Description
技术领域technical field
本发明属于计算机分布式存储安全领域,具体涉及一种分布式存储系统环境下加密副本的组织方法。该方法通过将用户数据以分块的形式分散到多个存储节点,各个块的数据被分段进行加密,同时为了提高系统的可用性,每个加密的块在多个存储节点中维护多个副本,从而保证用户数据的高安全性和高可用性,所有的数据组织信息由单独的元数据服务器负责维护。The invention belongs to the field of computer distributed storage security, and in particular relates to an organization method of encrypted copies in a distributed storage system environment. This method distributes user data to multiple storage nodes in the form of blocks, and the data of each block is segmented for encryption. At the same time, in order to improve the availability of the system, each encrypted block maintains multiple copies in multiple storage nodes. , so as to ensure high security and high availability of user data, and all data organization information is maintained by a separate metadata server.
背景技术Background technique
加密技术通常用来保证用户数据的机密性,将用户的隐私数据通过某种加密算法进行加密,用户只需保护加密密钥的安全就能保证隐私数据不被泄露,即使恶意攻击者获得了数据的密文,也无法得知其原始内容。Encryption technology is usually used to ensure the confidentiality of user data. The user's private data is encrypted by a certain encryption algorithm. The user only needs to protect the security of the encryption key to ensure that the private data will not be leaked, even if a malicious attacker obtains the data. ciphertext, and its original content cannot be known.
加密技术在单机存储环境下应用已经非常普遍,有基于应用程序级的加密产品,基于文件系统级的加密产品,基于磁盘块级的数据产品,还有直接集成加密功能的磁盘产品,但加密技术在分布式存储环境中的应用还没有成熟的实施方法。Encryption technology has been widely used in stand-alone storage environments. There are application-level encryption products, file system-level encryption products, disk block-level data products, and disk products that directly integrate encryption functions. However, encryption technology There is no mature implementation method for the application in the distributed storage environment.
近年来,有一些关于分布式存储系统安全性的研究,但主要集中在认证,访问控制方面,一旦攻击者突破了这一关卡,就能获取所有的用户数据。分布式存储系统通常使用数据块来组织用户文件数据,数据块是指一定长度的文件数据的集合,通常为了减少客户端与服务器的交互次数,数据块的长度一般较大。一些分布式存储系统以数据块为单位对数据进行加密,当用户请求的数据属于这个数据块时,这个数据块就需要整块的被加解密,而很多加密的模式又不利于并行计算,故加解密开销很大,并且当恶意攻击者毁坏某个数据块时,整个文件的数据也随着被破坏,这种方式不利于系统的扩展,且文件数据的可用性很低。In recent years, there have been some researches on the security of distributed storage systems, but they mainly focus on authentication and access control. Once an attacker breaks through this level, all user data can be obtained. Distributed storage systems usually use data blocks to organize user file data. Data blocks refer to a collection of file data of a certain length. Usually, in order to reduce the number of interactions between the client and the server, the length of the data block is generally larger. Some distributed storage systems encrypt data in units of data blocks. When the data requested by the user belongs to this data block, this data block needs to be encrypted and decrypted in its entirety, and many encryption modes are not conducive to parallel computing, so The overhead of encryption and decryption is very high, and when a malicious attacker destroys a data block, the data of the entire file is also destroyed. This method is not conducive to the expansion of the system, and the availability of file data is very low.
副本技术指在分布式存储系统多个地理位置分散的位置维护某一数据的完全拷贝,从而当某一份数据被毁坏时,系统仍然能从数据的其它副本来获取到正确的数据,从而提高系统的可用性,解决恶意用户破坏某一部分数据就导致整个文件数据不可恢复。Copy technology refers to maintaining a complete copy of a certain data in multiple geographically dispersed locations in a distributed storage system, so that when a certain piece of data is destroyed, the system can still obtain correct data from other copies of the data, thereby improving The availability of the system solves the problem of malicious users destroying a certain part of the data, which will cause the entire file data to be unrecoverable.
一些研究者将加密技术与副本技术进行结合,对系统文件的数据块进行加密,并将加密的数据备份到近线或离线的备份服务器,这种方法提高了数据的安全性和可用性,但在系统某些数据遭到破坏时,备份的数据不能立即投入使用,需要从备份服务器进行迁移,从而导致系统不能保证及时的应用服务。Some researchers combine encryption technology with copy technology, encrypt data blocks of system files, and back up encrypted data to near-line or offline backup servers. This method improves data security and availability, but in When some data in the system is damaged, the backup data cannot be put into use immediately, and needs to be migrated from the backup server, resulting in the system not being able to guarantee timely application services.
发明内容Contents of the invention
为了弥补现有分布式存储系统中数据安全性保护的不足,本发明提出一种分布式存储系统中加密副本的组织方法,该方法可以避免小数据量的读写就对整个块的数据进行加解密带来的巨大开销,同时也可提高大数据量的读请求的效率。In order to make up for the lack of data security protection in the existing distributed storage system, the present invention proposes a method for organizing encrypted copies in the distributed storage system. The huge overhead caused by decryption can also improve the efficiency of read requests with large amounts of data.
本发明提供的一种分布式存储环境下的加密副本组织方法,其特征在于,该方法包括写请求中组织副本的过程(A1)~(A7):A method for organizing encrypted copies in a distributed storage environment provided by the present invention is characterized in that the method includes the process (A1)-(A7) of organizing copies in a write request:
(A1)元数据服务器收客户端的写请求,包含文件名、写请求的起始位置O和写请求长度L;(A1) The metadata server receives the write request from the client, including the file name, the starting position O of the write request and the length L of the write request;
(A2)令M为(O+L)和原始文件的长度中的较大值,检查原始文件已有存储空间是否大于等于M,如果是,将已有存储空间用于存储待写入的数据,否则,元数据服务器读取管理员的配置信息或使用默认值,确定文件副本个数R、分块大小B、分段大小S和加密算法类型;元数据服务器根据存储节点总负载,选取R个负载最小的存储节点作为新的存储空间,将已有存储空间用于存储待写入的数据的前一部分,新的存储空间用于存储写入的数据的剩余数据,共计R个存储节点;(A2) Let M be the larger value in (O+L) and the length of the original file, check whether the existing storage space of the original file is greater than or equal to M, if so, use the existing storage space to store the data to be written , otherwise, the metadata server reads the configuration information of the administrator or uses the default value to determine the number of file copies R, the block size B, the segment size S and the encryption algorithm type; the metadata server selects R according to the total load of the storage node A storage node with the smallest load is used as a new storage space, the existing storage space is used to store the first part of the data to be written, and the new storage space is used to store the remaining data of the written data, a total of R storage nodes;
将写请求需要的相关的数据包括分块大小B,分段大小S,加密算法类型以安全的方式返回给客户端;Relevant data required by the write request, including block size B, segment size S, and encryption algorithm type, are returned to the client in a secure manner;
(A3)客户端计算出写请求起始位置所在的块号O/B,计算出写请求在数据块内起始位置P1及结束位置P2;(A3) The client calculates the block number O/B where the start position of the write request is located, and calculates the start position P1 and the end position P2 of the write request in the data block;
(A4)判断起始位置P1和结束位置P2是否在段的边界,如果是,转入步骤(A5),否则,起始位置P1或结束位置P2在某个段的中间,则读取该段原来的信息,并解密,进入步骤(A5);(A4) Determine whether the start position P1 and the end position P2 are at the boundary of the segment, if yes, go to step (A5), otherwise, the start position P1 or the end position P2 is in the middle of a certain segment, then read the segment Original information, and decipher, enter step (A5);
(A5)将该块内待写的数据进行分段加密,并写入到R个存储节点;(A5) segmentally encrypt the data to be written in the block, and write it to R storage nodes;
(A6)如果是第一次执行到该步骤,并且写请求结束位置与起始位置不在同一个块内,则计算出写请求在第二个块内的起始位置P1和结束位置P2,然后转到步骤(A4);否则,转到步骤(A7);(A6) If this step is executed for the first time, and the end position and start position of the write request are not in the same block, then calculate the start position P1 and end position P2 of the write request in the second block, and then Go to step (A4); otherwise, go to step (A7);
(A7)客户端向元数据服务器发送写请求完成反馈信息,元数据服务器根据系统配置信息以及文件请求信息填充文件元数据信息。(A7) The client sends the write request completion feedback information to the metadata server, and the metadata server fills the file metadata information according to the system configuration information and the file request information.
读取上述过程中所形成的加密副本:Read the encrypted copy formed in the above process:
(B1)元数据服务器接收客户端的读请求,包含文件名,读请求起始位置O,读请求长度L;(B1) The metadata server receives the read request from the client, including the file name, the read request starting position O, and the read request length L;
(B2)令W为待读文件长度,检查O是否超过待读文件的大小,如果超过,则转入步骤(B8),否则进入步骤(B3);(B2) make W be the file length to be read, check whether O exceeds the size of the file to be read, if exceed, then proceed to step (B8), otherwise enter step (B3);
(B3)检查O+L是否超过待读文件的大小,如果是,令L=W-O,将读请求的结束位置修改为待读文件的位置,否则,将O+L作为读请求的结束位置;(B3) check whether O+L exceeds the size of the file to be read, if so, make L=W-O, modify the end position of the read request to the position of the file to be read, otherwise, use O+L as the end position of the read request;
元数据服务器根据待读文件的元数据信息,将读请求需要的相关的数据包括文件基本属性、分块大小B,分段大小S,加密算法类型以安全的方式返回给客户端;According to the metadata information of the file to be read, the metadata server returns the relevant data required by the read request, including the basic attributes of the file, the block size B, the segment size S, and the type of encryption algorithm to the client in a safe manner;
(B4)客户端计算出起始位置所在的块号O/B,计算出读请求在数据块内起始位置P3及结束位置P4;(B4) The client calculates the block number O/B where the start position is located, and calculates the start position P3 and the end position P4 of the read request in the data block;
(B5)客户端首先将需要读取的段分成R个组,每个组包含的段数尽量相等;然后客户端向R个维护该块副本的存储节点同时发送请求,并行读取R个组的数据;(B5) The client first divides the segments that need to be read into R groups, and the number of segments contained in each group is as equal as possible; then the client sends requests to R storage nodes that maintain copies of the block at the same time, and reads the R groups in parallel. data;
(B6)客户端获取所有需要段的数据后,对这些段的数据进行分别解密,并将P3,P4范围之外的数据丢弃,即得到所要读取的实际数据;(B6) After the client obtains the data of all required sections, the data of these sections are decrypted respectively, and the data outside the range of P3 and P4 are discarded, that is, the actual data to be read is obtained;
(B7)如果第一次执行到该步骤,并且读请求结束位置与起始位置不在一个块内,则计算出读请求在第二个块内的起始位置P3和结束位置P4,然后转到步骤(B5);否则,转到步骤(B8);(B7) If this step is executed for the first time, and the end position and start position of the read request are not in a block, then calculate the start position P3 and end position P4 of the read request in the second block, and then go to Step (B5); otherwise, go to step (B8);
(B8)客户端向元数据服务器发送读请求完成或者请求超出范围的反馈信息。(B8) The client sends feedback information that the read request is completed or the request exceeds the range to the metadata server.
本发明方法提出一种新的加密副本组织方法,将系统数据的管理单位数据块分成多个大小相等数据段,系统仍以块为单位进行管理,客户端以段为单位对数据进行加密,这样就能对数据块提供更细粒度的控制,且避免了小量的读写就对整个数据块进行加解密带来的巨大开销;对大的读请求,可将读请求进行分组,将不同的分组请求并行的发送到维护着请求文件数据块副本的各个存储节点,并行读取各个分组,从而极大的提高读数据的效率。The method of the present invention proposes a new encrypted copy organization method, which divides the management unit data block of the system data into a plurality of equal-sized data segments, the system still manages with the block as the unit, and the client encrypts the data with the segment as the unit, like this It can provide finer-grained control over the data block, and avoid the huge overhead caused by encrypting and decrypting the entire data block for a small amount of reading and writing; for large read requests, the read requests can be grouped, and different Group requests are sent in parallel to each storage node that maintains a copy of the requested file data block, and each group is read in parallel, thereby greatly improving the efficiency of reading data.
附图说明Description of drawings
图1为存储节点管理结构示意图;FIG. 1 is a schematic diagram of a storage node management structure;
图2为文件元数据结构示意图;FIG. 2 is a schematic diagram of file metadata structure;
图3为加密副本组织示意图;Figure 3 is a schematic diagram of the organization of encrypted copies;
图4为加密副本的生成过程示意图;Fig. 4 is a schematic diagram of the generation process of an encrypted copy;
图5为加密副本的提取过程示意图;Fig. 5 is a schematic diagram of the extraction process of the encrypted copy;
图6为客户端写请求处理流程图;Fig. 6 is a flow chart of client write request processing;
图7为客户端读请求处理流程图。FIG. 7 is a flowchart of client read request processing.
具体实施方式Detailed ways
在大规模存储系统中,数据量通常是巨大的,大量的数据通过元数据来组织和管理,元数据是描述其他数据的信息,即数据的数据。In a large-scale storage system, the amount of data is usually huge, and a large amount of data is organized and managed through metadata, which is information describing other data, that is, data of data.
本发明的应用环境为典型的分布式存储系统环境,其由客户端,元数据服务器,存储节点三个部分组成,其中元数据服务器主要负责存储节点的文件元信息管理,用户信息管理,文件分块信息管理,系统安全信息,副本信息的管理,存储节点负载均衡管理等;存储节点作为数据的存储仓库,存储系统中文件的实际数据;客户端负责为用户提供一个透明的存储系统访问接口,以为用户提供系统服务。The application environment of the present invention is a typical distributed storage system environment, which consists of three parts: client, metadata server, and storage node, wherein the metadata server is mainly responsible for file metadata management of storage nodes, user information management, file classification Block information management, system security information, copy information management, storage node load balancing management, etc.; storage nodes are used as data storage warehouses to store actual data of files in the system; clients are responsible for providing users with a transparent storage system access interface, To provide users with system services.
下面结合附图和实例对本发明作进一步详细的说明。Below in conjunction with accompanying drawing and example the present invention is described in further detail.
元数据服务器针对客户端的请求,按存储节点的负载情况来分配新的存储节点给客户端,存储节点通过动态的给元数据服务器发送负载信息以让元数据服务器能及时获知其负载情况,元数据服务器按照负载由小到大维护一个存储节点信息链,如图1所示,存储节点信息主要包括以下字段:存储节点IP地址,存储节点管理数据块数,存储节点总负载,CPC负载及权值,存储负载及权值,网络负载及权值等信息,其中CPU负载,存储负载,网络负载所占的权重默认设置为:网络负载权重为0.3,存储负载权重为0.4,CPU负载权重为0.3,可由系统管理员根据系统需求进行动态配置,即将权重值写入相应的配置文件,要求三个权重值都在0~1范围内,并且三者的总和为1,存储节点在计算总负载时读取配置文件获取这些值。The metadata server allocates new storage nodes to the client according to the load of the storage nodes according to the client's request, and the storage nodes dynamically send load information to the metadata server so that the metadata server can know its load in time. The server maintains a storage node information chain according to the load from small to large. As shown in Figure 1, the storage node information mainly includes the following fields: storage node IP address, storage node management data block number, storage node total load, CPC load and weight , storage load and weight, network load and weight and other information, among which the weights of CPU load, storage load, and network load are set by default: network load weight is 0.3, storage load weight is 0.4, CPU load weight is 0.3, It can be dynamically configured by the system administrator according to the system requirements, that is, write the weight value into the corresponding configuration file. It is required that the three weight values are all in the range of 0 to 1, and the sum of the three is 1. When the storage node calculates the total load, it reads Fetch the config file to get these values.
每次客户端需要请求新的数据块进行写操作时,元数据服务器选择存储节点信息链中链头的多个存储节点即可,随着系统的不断运行,存储节点的负载会动态更新,通过该方法可有效的实现系统负载均衡。Every time the client needs to request a new data block for write operation, the metadata server only needs to select multiple storage nodes at the head of the storage node information chain. As the system continues to run, the load of the storage nodes will be dynamically updated. Through This method can effectively realize system load balancing.
客户端的写请求完成后,元数据服务器对所写的文件会生成如图2所示的文件元数据信息。文件元数据信息包括下述字段:文件名、文件名MD5值、文件基本属性、分块数、分块大小、分段大小、加密算法类型、加密密钥、文件副本个数和副本位置链。其中部分信息可由系统管理员进行配置,如分块大小,默认设置为8MB,该值根据不同的应用需求应设置为8-64MB范围内,以保证对于任意读写请求,请求最多涉及到两个数据块,从而简化对客户端读写请求的处理;分段大小,默认值设置为4KB,应设置在1-16KB范围内;加密算法类型,默认使用AES算法,可配置的加密算法包括DES,AES,BlowFish算法;文件副本个数,默认维护3个副本,副本个数应设置在1-5范围内;这些值由管理员在系统启动前写入相应配置文件,当元数据服务器需要时从配置文件读取。其他的信息包括文件名,文件名MD5值,文件基本属性,分块数,副本位置链等则是在用户的写请求下生成,并随着文件的改变而动态变化。当客户端发来读请求时,元数据服务器则根据该结构来提供请求文件的相关信息,从而满足客户端的请求。After the client's write request is completed, the metadata server will generate file metadata information as shown in FIG. 2 for the written file. File metadata information includes the following fields: file name, file name MD5 value, file basic attributes, number of blocks, block size, segment size, encryption algorithm type, encryption key, number of file copies, and copy location chain. Some of the information can be configured by the system administrator, such as the block size, which is set to 8MB by default. This value should be set within the range of 8-64MB according to different application requirements, so as to ensure that for any read and write requests, the request involves at most two Data block, so as to simplify the processing of client read and write requests; Segment size, the default value is set to 4KB, and should be set within the range of 1-16KB; Encryption algorithm type, AES algorithm is used by default, and the configurable encryption algorithm includes DES, AES, BlowFish algorithm; the number of file copies, 3 copies are maintained by default, and the number of copies should be set in the range of 1-5; these values are written by the administrator to the corresponding configuration file before the system starts, and are read from the metadata server when needed The configuration file is read. Other information including file name, file name MD5 value, file basic attributes, number of blocks, copy location chain, etc. are generated under the user's write request and change dynamically as the file changes. When the client sends a read request, the metadata server provides relevant information of the requested file according to the structure, so as to satisfy the client's request.
本发明对系统的加密副本进行分段组织,并提出在该组织情形下读写的改进方法。加密副本最终在存储节点中的组织形式如图3所示,每个文件的数据按照配置的数据块的大小分成多个数据块,数据块是元数据管理的单位。对于每个数据块,将其分为多个数据段,段作为数据加密的单位,客户端对各个数据段分别进行加密,使得各个段之间的数据不具有相关性,即各个段的数据能并行的加解密,这样有利于并行处理,从而提高系统的效率。该方式相比传统针对整块数据的加密,仅仅需要额外记录分段的相关信息,不会给元数据服务器增加很大的负担。The invention organizes the encrypted copy of the system in segments, and proposes an improved method for reading and writing in the context of the organization. The final organizational form of the encrypted copy in the storage node is shown in Figure 3. The data of each file is divided into multiple data blocks according to the size of the configured data block, and the data block is the unit of metadata management. For each data block, it is divided into multiple data segments, the segment is used as the unit of data encryption, and the client encrypts each data segment separately, so that the data between each segment has no correlation, that is, the data of each segment can Parallel encryption and decryption, which is conducive to parallel processing, thereby improving the efficiency of the system. Compared with the traditional encryption for the whole block of data, this method only needs to additionally record the relevant information of the segment, and will not add a great burden to the metadata server.
加密副本的生成决定于客户端的写请求,下面针对客户端写文件时加密副本的生成过程作详细的说明。写文件时加密副本的生成及组织主要包括以下步骤:The generation of an encrypted copy depends on the write request of the client. The following is a detailed description of the generation process of the encrypted copy when the client writes a file. The generation and organization of encrypted copies when writing files mainly includes the following steps:
(A1)元数据服务器收到客户端的写请求,包含文件名,写请求的起始位置O(新建文件时起始位置为0),写请求长度L。(A1) The metadata server receives the write request from the client, including the file name, the start position O of the write request (the start position is 0 when creating a new file), and the length L of the write request.
(A2)令T为(O+L)和文件原始长度中的较大值,检查待写文件已有存储空间是否大于等于T,如果是,将已有存储空间用于存储待写入的数据,否则,为该文件分配新的存储空间,将已有存储空间用于存储待写入的数据的前一部分,新的存储空间用于存储写入的数据的剩余数据;(A2) Let T be the larger value of (O+L) and the original length of the file, check whether the existing storage space of the file to be written is greater than or equal to T, if so, use the existing storage space to store the data to be written , otherwise, allocate a new storage space for the file, use the existing storage space to store the previous part of the data to be written, and use the new storage space to store the remaining data of the written data;
分配新的存储空间时需要寻找新的存储节点,元数据服务器根据存储节点总负载,选取R个负载最小的存储节点来存储R个副本,其中R代表文件副本个数,是文件元数据信息的一个字段。When allocating new storage space, it is necessary to find new storage nodes. According to the total load of storage nodes, the metadata server selects R storage nodes with the smallest load to store R copies. a field.
元数据服务器根据管理员的配置信息,将写请求需要的相关的数据包括分块大小B,分段大小S,加密算法类型以安全的方式返回给客户端。According to the configuration information of the administrator, the metadata server returns the relevant data required by the write request, including block size B, segment size S, and encryption algorithm type, to the client in a secure manner.
(A3)客户端计算出写请求起始位置所在的块号O/B,计算出写请求在数据块内起始位置P1及结束位置P2,P1等于O除以B的余数,P2等于(P1+L)除以B的余数。(A3) The client calculates the block number O/B where the start position of the write request is located, and calculates the start position P1 and the end position P2 of the write request in the data block. P1 is equal to the remainder of O divided by B, and P2 is equal to (P1 +L) is divided by the remainder of B.
(A4)P1,P2为写请求在块内的起始和结束位置,首先需要计算P1,P2是否在段的边界,可通过使用段大小S去除位置P1,P2,如果能整除,则该说明位置刚好在段的边界,即该位置所在的段完全覆盖;否则,该位置在某个段的中间,即该段被部分覆盖。因为数据以段为单位的密文方式存储,故对于被部分覆盖的段,整个段不是完全被新的加密数据覆盖,故在更新这些段的数据之前,需要读取该段原来的信息,并解密,然后修改部分数据,再重新加密。P1/S,P2/S为写请求在块内的起始和结束位置所在的段号。(A4) P1 and P2 are the start and end positions of the write request in the block. First, it is necessary to calculate whether P1 and P2 are at the boundary of the segment. The position P1 and P2 can be removed by using the segment size S. If they can be divisible, then the description The position is just at the boundary of the segment, that is, the segment where the position is located is completely covered; otherwise, the position is in the middle of a segment, that is, the segment is partially covered. Because the data is stored in ciphertext in units of segments, for partially covered segments, the entire segment is not completely covered by new encrypted data, so before updating the data of these segments, it is necessary to read the original information of the segment, and Decrypt, then modify some data, and re-encrypt. P1/S, P2/S are the segment numbers where the start and end positions of the write request are located in the block.
如图4所示,P1在段S1的中间,P2在段S3的中间,则更新P1与P2之间的数据(对于超过原来文件大小范围的数据,原来的数据被认为是0组成的序列),需要先读取S1,S3两个段的数据。P1将段S1分成S1-1及S1-2两个部分,P2将S3分成S3-1,S3-2两个部分。客户端需要分配3个段大小的缓冲区来存储新的数据,缓冲区的数据依次包含S1-1部分的数据,请求写入的数据,S3-2部分的数据。As shown in Figure 4, P1 is in the middle of segment S1, and P2 is in the middle of segment S3, then update the data between P1 and P2 (for data exceeding the original file size range, the original data is considered to be a sequence composed of 0) , you need to read the data of the two segments S1 and S3 first. P1 divides segment S1 into two parts, S1-1 and S1-2, and P2 divides segment S3 into two parts, S3-1 and S3-2. The client needs to allocate 3 segment-sized buffers to store new data. The data in the buffer includes the data of S1-1, the data requested to be written, and the data of S3-2.
(A5)客户端对缓冲区进行分段加密,并将加密后的多个密文段写入到相应的R个存储节点,从而产生该部分数据的R个副本;当P1和P2都在段的边界时,则不需要读取原来的数据;当P1,P2有一个位置在某个段的中间,则需要读取该段的数据。即写请求最多需要读取两个段的数据,相比传统对整个块进行加密的方式效率上有很大的提高。(A5) The client encrypts the buffer in segments, and writes the encrypted multiple ciphertext segments to the corresponding R storage nodes, thereby generating R copies of the data; when both P1 and P2 are in the segment When the boundary of the segment is reached, the original data does not need to be read; when P1 and P2 have a position in the middle of a certain segment, the data of the segment needs to be read. That is, a write request needs to read at most two segments of data, which is much more efficient than the traditional method of encrypting the entire block.
(A6)如果是第一次执行到该步骤,并且写请求结束位置与起始位置不在同一个块内,则计算出写请求在第二个块内的起始位置P1和结束位置P2,P1等于0,P2等于(O+L)除以B的余数,然后转到(A4);否则,转到(A7)。(A6) If this step is executed for the first time, and the end position and start position of the write request are not in the same block, calculate the start position P1 and end position P2, P1 of the write request in the second block Equal to 0, P2 is equal to the remainder of dividing (O+L) by B, then go to (A4); otherwise, go to (A7).
(A7)客户端的写请求的内容已经写到了各个存储节点,存储节点中各个块的数据也按照本发明中提出的加密副本组织方式存储,客户端向元数据服务器发送写请求完成反馈信息,元数据服务器根据系统配置信息以及文件请求信息填充文件元数据信息。(A7) The content of the write request of the client has been written to each storage node, and the data of each block in the storage node is also stored according to the encrypted copy organization method proposed in the present invention, and the client sends the write request completion feedback information to the metadata server. The data server fills file metadata information according to system configuration information and file request information.
客户端的读请求提取加密副本中的数据,因数据存在多个副本,并且是分段加密,则可将读请求分成多个组,组数等于文件副本数,每个组包含数目尽量相等的段,客户端并行的到多个存储节点读取各个组,从而提高读请求的效率。客户端读请求的处理主要包括以下步骤:The client's read request extracts the data in the encrypted copy. Because there are multiple copies of the data and it is segmented encryption, the read request can be divided into multiple groups. The number of groups is equal to the number of file copies, and each group contains as many segments as possible. , the client reads each group from multiple storage nodes in parallel, thereby improving the efficiency of read requests. The processing of client read requests mainly includes the following steps:
(B1)元数据服务器接收客户端的读请求,包含文件名,读请求起始位置O,读请求长度L;(B1) The metadata server receives the read request from the client, including the file name, the read request starting position O, and the read request length L;
(B2)令W为待读文件长度,检查O是否超过待读文件的大小,如果超过,则转入步骤(B8),否则进入步骤(B3);(B2) make W be the file length to be read, check whether O exceeds the size of the file to be read, if exceed, then proceed to step (B8), otherwise enter step (B3);
(B3)检查O+L是否超过待读文件的大小,如果是,令L=W-O,将读请求的结束位置修改为待读文件的位置,否则,将O+L作为读请求的结束位置;(B3) check whether O+L exceeds the size of the file to be read, if so, make L=W-O, modify the end position of the read request to the position of the file to be read, otherwise, use O+L as the end position of the read request;
元数据服务器根据待读文件的元数据信息,将读请求需要的相关的数据包括文件基本属性、分块大小B,分段大小S,加密算法类型以安全的方式返回给客户端;According to the metadata information of the file to be read, the metadata server returns the relevant data required by the read request, including the basic attributes of the file, the block size B, the segment size S, and the type of encryption algorithm to the client in a safe manner;
(B4)客户端计算出起始位置所在的块号O/B,计算出读请求在数据块内起始位置P3及结束位置P4,P3等于O除以B的余数,P4等于(P3+L)除以B的余数;(B4) The client calculates the block number O/B where the start position is located, calculates the start position P3 and the end position P4 of the read request in the data block, P3 is equal to the remainder of O divided by B, and P4 is equal to (P3+L ) divided by B;
(B5)如图5所示,P3,P4为读请求在块内的起始位置和结束位置,客户端需要读取P3,P4所跨越的所有段T1,T2,T3。客户端首先将需要读取的段分成R个组,每个组包含的段数尽量相等。然后客户端向R个维护该块副本的存储节点同时发送请求,并行读取R个组的数据,从而提高读的效率;(B5) As shown in Figure 5, P3 and P4 are the start and end positions of the read request in the block, and the client needs to read all the segments T1, T2 and T3 spanned by P3 and P4. The client first divides the segments to be read into R groups, and each group contains as many segments as possible. Then the client sends requests to R storage nodes that maintain the copy of the block at the same time, and reads the data of R groups in parallel, thereby improving the efficiency of reading;
(B6)客户端获取所有需要段的数据后,对这些段的数据进行分别解密,并将P3,P4范围之外的数据丢弃,即得到所要读取的实际数据。(B6) After the client obtains the data of all required segments, it decrypts the data of these segments respectively, and discards the data outside the range of P3 and P4, that is, obtains the actual data to be read.
(B7)如果第一次执行到该步骤,并且读请求结束位置与起始位置不在一个块内,则计算出读请求在第二个块内的起始位置P3和结束位置P4,P3等于0,P4等于(O+L)除以B的余数,然后转到(B5);否则,转到(B7);(B7) If this step is executed for the first time, and the end position and start position of the read request are not in the same block, calculate the start position P3 and end position P4 of the read request in the second block, and P3 is equal to 0 , P4 is equal to the remainder of (O+L) divided by B, then go to (B5); otherwise, go to (B7);
(B8)客户端向元数据服务器发送读请求完成或者请求超出范围的反馈信息。(B8) The client sends feedback information that the read request is completed or the request exceeds the range to the metadata server.
本发明不仅局限于上述具体实施方式,本领域一般技术人员根据实施例和附图公开的内容,可以采用其它多种具体实施方式实施本发明,因此,凡是采用本发明的设计结构和思路,做一些简单的变化或更改的设计,都落入本发明保护的范围。The present invention is not limited to the above-mentioned specific embodiments, and those skilled in the art can implement the present invention by using other various specific embodiments according to the disclosed content of the embodiments and accompanying drawings. Some simple changes or modified designs all fall within the protection scope of the present invention.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101282401A CN101808095B (en) | 2010-03-22 | 2010-03-22 | Encryption copy organization method under distributed storage environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101282401A CN101808095B (en) | 2010-03-22 | 2010-03-22 | Encryption copy organization method under distributed storage environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101808095A true CN101808095A (en) | 2010-08-18 |
CN101808095B CN101808095B (en) | 2012-08-15 |
Family
ID=42609715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101282401A Active CN101808095B (en) | 2010-03-22 | 2010-03-22 | Encryption copy organization method under distributed storage environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101808095B (en) |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103346998A (en) * | 2013-05-18 | 2013-10-09 | 北京凯锐立德科技有限公司 | File breaking encryption-based file security protection method |
CN103731505A (en) * | 2014-01-17 | 2014-04-16 | 中国联合网络通信集团有限公司 | Data distributed storage method and system |
CN104144186A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Data uploading method and system based on Web browser in cloud computing environment |
CN104166823A (en) * | 2014-09-12 | 2014-11-26 | 罗满清 | Intelligent medical data safety guarantee system |
CN104200177A (en) * | 2014-09-12 | 2014-12-10 | 罗满清 | Mobile medical sensitive data encryption method |
CN104571957A (en) * | 2014-12-29 | 2015-04-29 | 成都致云科技有限公司 | Data reading method and assembling device |
CN105205369A (en) * | 2015-08-20 | 2015-12-30 | 青岛三链锁业有限公司 | Palm vein image data processing method |
CN105205411A (en) * | 2015-09-21 | 2015-12-30 | 北京元心科技有限公司 | Method and system for randomly storing symmetrical encryption file |
US9237014B2 (en) | 2013-05-28 | 2016-01-12 | Hong Kong Applied Science & Technology Research Institute Company, Limited | Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks |
CN105471930A (en) * | 2014-07-28 | 2016-04-06 | 浙江大华技术股份有限公司 | Method, system and equipment for reading distributed data |
CN105653469A (en) * | 2015-12-30 | 2016-06-08 | 深圳Tcl数字技术有限公司 | Data writing method and device |
WO2016101554A1 (en) * | 2015-06-04 | 2016-06-30 | 于志 | System architecture and method for ensuring network information security |
CN105791274A (en) * | 2016-02-24 | 2016-07-20 | 四川长虹电器股份有限公司 | Distributed encrypted storage and authentication method based on local area network |
CN103346998B (en) * | 2013-05-18 | 2016-11-30 | 连山管控(北京)信息技术有限公司 | A kind of document security guard method crushing encryption based on file |
CN106257858A (en) * | 2015-06-19 | 2016-12-28 | 中兴通讯股份有限公司 | The data ciphering method of a kind of remote storage device, Apparatus and system |
CN106788982A (en) * | 2017-02-22 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of sectional encryption transmission method and device |
CN107659401A (en) * | 2017-10-09 | 2018-02-02 | 华中科技大学 | The secure data duplicate removal encryption method that a kind of similitude perceives |
CN107729495A (en) * | 2017-10-18 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of file metadata browsing method and device |
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
CN109597811A (en) * | 2018-11-26 | 2019-04-09 | 湖南节点新火信息安全有限公司 | A kind of distributed security data basd link block storage method |
CN110427156A (en) * | 2019-07-16 | 2019-11-08 | 华中科技大学 | A kind of parallel reading method of the MBR based on fragment |
CN110633580A (en) * | 2019-09-20 | 2019-12-31 | 徐州医科大学附属医院 | A Safe Distributed Storage Method Oriented to XML Data |
CN111078153A (en) * | 2019-12-20 | 2020-04-28 | 同方知网(北京)技术有限公司 | Distributed storage method based on files |
CN111277655A (en) * | 2020-01-21 | 2020-06-12 | 山东公链信息科技有限公司 | Distributed storage system based on intelligent loudspeaker box |
CN111427860A (en) * | 2019-01-09 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Distributed storage system and data processing method thereof |
CN111651521A (en) * | 2020-05-27 | 2020-09-11 | 山大地纬软件股份有限公司 | Electronic contract block chain structure, electronic contract signing device and method |
CN112199338A (en) * | 2019-07-08 | 2021-01-08 | 华为技术有限公司 | File reading and writing method and device |
CN112306395A (en) * | 2019-07-30 | 2021-02-02 | 索尼互动娱乐有限责任公司 | Using variable-size cell patching applications |
CN113220237A (en) * | 2021-05-17 | 2021-08-06 | 北京青云科技股份有限公司 | Distributed storage method, device, equipment and storage medium |
CN113312069A (en) * | 2020-02-27 | 2021-08-27 | 美光科技公司 | Firmware loading for memory controller |
CN114647383A (en) * | 2022-03-29 | 2022-06-21 | 重庆紫光华山智安科技有限公司 | Data access method, device, storage node and storage medium |
CN117473538A (en) * | 2023-12-27 | 2024-01-30 | 成都智慧锦城大数据有限公司 | Method and system for improving service data storage security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1341240A (en) * | 1999-12-20 | 2002-03-20 | 大日本印刷株式会社 | Distributed data archive device and system |
CN1960372A (en) * | 2006-11-09 | 2007-05-09 | 华中科技大学 | Encrypting read / write method in use for NAS storage system |
WO2007133791A2 (en) * | 2006-05-15 | 2007-11-22 | Richard Kane | Data partitioning and distributing system |
CN101594227A (en) * | 2008-05-30 | 2009-12-02 | 华为技术有限公司 | Data encryption and decryption method, device and communication system |
-
2010
- 2010-03-22 CN CN2010101282401A patent/CN101808095B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1341240A (en) * | 1999-12-20 | 2002-03-20 | 大日本印刷株式会社 | Distributed data archive device and system |
WO2007133791A2 (en) * | 2006-05-15 | 2007-11-22 | Richard Kane | Data partitioning and distributing system |
CN1960372A (en) * | 2006-11-09 | 2007-05-09 | 华中科技大学 | Encrypting read / write method in use for NAS storage system |
CN101594227A (en) * | 2008-05-30 | 2009-12-02 | 华为技术有限公司 | Data encryption and decryption method, device and communication system |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144186A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Data uploading method and system based on Web browser in cloud computing environment |
CN104144186B (en) * | 2013-05-10 | 2017-12-01 | 中国电信股份有限公司 | Data uploading method and system based on Web browser in cloud computing environment |
CN103346998A (en) * | 2013-05-18 | 2013-10-09 | 北京凯锐立德科技有限公司 | File breaking encryption-based file security protection method |
CN103346998B (en) * | 2013-05-18 | 2016-11-30 | 连山管控(北京)信息技术有限公司 | A kind of document security guard method crushing encryption based on file |
US9237014B2 (en) | 2013-05-28 | 2016-01-12 | Hong Kong Applied Science & Technology Research Institute Company, Limited | Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks |
CN103731505A (en) * | 2014-01-17 | 2014-04-16 | 中国联合网络通信集团有限公司 | Data distributed storage method and system |
CN105471930B (en) * | 2014-07-28 | 2019-03-26 | 浙江大华技术股份有限公司 | A kind of method, system and equipment reading distributed data |
CN105471930A (en) * | 2014-07-28 | 2016-04-06 | 浙江大华技术股份有限公司 | Method, system and equipment for reading distributed data |
CN104200177A (en) * | 2014-09-12 | 2014-12-10 | 罗满清 | Mobile medical sensitive data encryption method |
CN104166823A (en) * | 2014-09-12 | 2014-11-26 | 罗满清 | Intelligent medical data safety guarantee system |
CN104571957A (en) * | 2014-12-29 | 2015-04-29 | 成都致云科技有限公司 | Data reading method and assembling device |
WO2016101554A1 (en) * | 2015-06-04 | 2016-06-30 | 于志 | System architecture and method for ensuring network information security |
US10050956B2 (en) | 2015-06-04 | 2018-08-14 | Zhi Yu | System architecture and method for guaranteeing network information security |
CN106257858A (en) * | 2015-06-19 | 2016-12-28 | 中兴通讯股份有限公司 | The data ciphering method of a kind of remote storage device, Apparatus and system |
CN105205369A (en) * | 2015-08-20 | 2015-12-30 | 青岛三链锁业有限公司 | Palm vein image data processing method |
CN105205411A (en) * | 2015-09-21 | 2015-12-30 | 北京元心科技有限公司 | Method and system for randomly storing symmetrical encryption file |
CN105653469A (en) * | 2015-12-30 | 2016-06-08 | 深圳Tcl数字技术有限公司 | Data writing method and device |
CN105653469B (en) * | 2015-12-30 | 2018-11-02 | 深圳Tcl数字技术有限公司 | Method for writing data and device |
CN105791274B (en) * | 2016-02-24 | 2018-12-04 | 四川长虹电器股份有限公司 | A kind of distributed cryptographic storage and method for authenticating based on local area network |
CN105791274A (en) * | 2016-02-24 | 2016-07-20 | 四川长虹电器股份有限公司 | Distributed encrypted storage and authentication method based on local area network |
CN106788982A (en) * | 2017-02-22 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of sectional encryption transmission method and device |
CN107659401A (en) * | 2017-10-09 | 2018-02-02 | 华中科技大学 | The secure data duplicate removal encryption method that a kind of similitude perceives |
CN107659401B (en) * | 2017-10-09 | 2019-08-30 | 华中科技大学 | A similarity-aware secure data deduplication encryption method |
CN107729495A (en) * | 2017-10-18 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of file metadata browsing method and device |
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
CN108664223B (en) * | 2018-05-18 | 2021-07-02 | 百度在线网络技术(北京)有限公司 | Distributed storage method and device, computer equipment and storage medium |
CN109597811A (en) * | 2018-11-26 | 2019-04-09 | 湖南节点新火信息安全有限公司 | A kind of distributed security data basd link block storage method |
CN111427860A (en) * | 2019-01-09 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Distributed storage system and data processing method thereof |
CN111427860B (en) * | 2019-01-09 | 2023-05-02 | 阿里巴巴集团控股有限公司 | Distributed storage system and data processing method thereof |
CN112199338A (en) * | 2019-07-08 | 2021-01-08 | 华为技术有限公司 | File reading and writing method and device |
CN110427156B (en) * | 2019-07-16 | 2020-09-08 | 华中科技大学 | Partition-based MBR (Membrane biological reactor) parallel reading method |
CN110427156A (en) * | 2019-07-16 | 2019-11-08 | 华中科技大学 | A kind of parallel reading method of the MBR based on fragment |
CN112306395A (en) * | 2019-07-30 | 2021-02-02 | 索尼互动娱乐有限责任公司 | Using variable-size cell patching applications |
CN110633580A (en) * | 2019-09-20 | 2019-12-31 | 徐州医科大学附属医院 | A Safe Distributed Storage Method Oriented to XML Data |
CN111078153A (en) * | 2019-12-20 | 2020-04-28 | 同方知网(北京)技术有限公司 | Distributed storage method based on files |
CN111277655A (en) * | 2020-01-21 | 2020-06-12 | 山东公链信息科技有限公司 | Distributed storage system based on intelligent loudspeaker box |
CN113312069A (en) * | 2020-02-27 | 2021-08-27 | 美光科技公司 | Firmware loading for memory controller |
US11714757B2 (en) | 2020-02-27 | 2023-08-01 | Micron Technology, Inc. | Firmware loading for a memory controller |
CN111651521A (en) * | 2020-05-27 | 2020-09-11 | 山大地纬软件股份有限公司 | Electronic contract block chain structure, electronic contract signing device and method |
CN111651521B (en) * | 2020-05-27 | 2023-10-17 | 山大地纬软件股份有限公司 | Electronic contract block chain structure, electronic contract signing device and method |
CN113220237A (en) * | 2021-05-17 | 2021-08-06 | 北京青云科技股份有限公司 | Distributed storage method, device, equipment and storage medium |
CN114647383A (en) * | 2022-03-29 | 2022-06-21 | 重庆紫光华山智安科技有限公司 | Data access method, device, storage node and storage medium |
CN117473538A (en) * | 2023-12-27 | 2024-01-30 | 成都智慧锦城大数据有限公司 | Method and system for improving service data storage security |
CN117473538B (en) * | 2023-12-27 | 2024-03-12 | 成都智慧锦城大数据有限公司 | Method and system for improving service data storage security |
Also Published As
Publication number | Publication date |
---|---|
CN101808095B (en) | 2012-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101808095B (en) | Encryption copy organization method under distributed storage environment | |
Wang et al. | Secure and efficient access to outsourced data | |
Goodrich et al. | Oblivious RAM simulation with efficient worst-case access overhead | |
US9215066B2 (en) | Method and system for making information in a data set of a copy-on-write file system inaccessible | |
Song et al. | A cloud secure storage mechanism based on data dispersion and encryption | |
CN102664928A (en) | Data secure access method used for cloud storage and user terminal system | |
Baracaldo et al. | Reconciling end-to-end confidentiality and data reduction in cloud storage | |
Rizomiliotis et al. | ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes | |
CN110650191A (en) | Data read-write method of distributed storage system | |
US10284534B1 (en) | Storage system with controller key wrapping of data encryption key in metadata of stored data item | |
CN106919348A (en) | Distributed memory system and storage method that anti-violence is cracked | |
CN118536140A (en) | Data protection method, data protection device, computer equipment and storage medium | |
Wang et al. | A policy-based deduplication mechanism for securing cloud storage | |
CN117454414A (en) | Dynamic searchable encryption method and system based on distributed storage | |
Zhang et al. | Encrypted and compressed key-value store with pattern-analysis security in cloud systems | |
Kumar et al. | A study on data de-duplication schemes in cloud storage | |
CN113626836A (en) | Symmetric searchable encryption method and system based on LSM | |
KC et al. | Optimizing data retrieval for enhanced data integrity verification in cloud environments | |
Raj et al. | Efficient mechanism for sharing private data in a secured manner | |
Kadu et al. | A Hybrid Cloud Approach for Secure Authorized Deduplication | |
Shu et al. | Secure storage system and key technologies | |
Feng et al. | BLESS: Object level encryption security for object-based storage system | |
Prathima et al. | A survey on efficient data deduplication in data analytics | |
Tian et al. | Loco-store: Locality-based oblivious data storage | |
Kanakamedala et al. | Attribute-based storage supporting secure deduplication of encrypted data in cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170822 Address after: Qixia District of Nanjing City, Jiangsu province 210000 Yao Jia Lu No. 7 city scenery Beiyuan 16 room 1203 Patentee after: NANJING SUPERSTACK INFORMATION TECHNOLOGY LTD. Address before: 430074 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 1037 Patentee before: Huazhong University of Science and Technology |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210720 Address after: 335000 no.67-1, Zhichuang street, high tech Industrial Development Zone, Yingtan City, Jiangxi Province Patentee after: Jiangxi diejia Information Technology Co.,Ltd. Address before: Room 1203, building 16, shangchengjingjing Beiyuan, No.7 Yaojia Road, Qixia District, Nanjing City, Jiangsu Province, 210000 Patentee before: NANJING SUPERSTACK INFORMATION TECHNOLOGY Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221116 Address after: No. 32-3, Zhichuang 1st Street, Juneng Road, Yingtan Hi tech Industrial Development Zone, Jiangxi Province, 335000 Patentee after: Jiangxi Shalan Information Technology Co.,Ltd. Address before: 335000 no.67-1, Zhichuang street, high tech Industrial Development Zone, Yingtan City, Jiangxi Province Patentee before: Jiangxi diejia Information Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |