A kind of safe and reliable cloud storage systemTechnical field
The present invention relates to data security, refer to especially the fail safe in the data of cloud stores service storage, for data security and the data integrity of secure data area.
Background technology
Along with the continuous progress of information technology, people's daily routines more and more launch round electronic data, for example send and receive e-mail, and appreciate electronic audio frequency or video, write work report with computer, record sale and customer data etc.Become the inevitable and very important thing of individual and enterprise for this a series of data storage and management.But along with the amount of the data that need storage administration is day by day cumulative, slowly, individual or enterprise with tired in or unable going bear for huge data storage and management.Still more, many data of storing can need and can be accessed to anywhere or anytime.Under such background, the cloud storage forms an important technological trend, it provides very huge memory space to allow the user use as required, pay as required, the user can store data in the server in long-range high in the clouds by the Internet, then just can come the data of storage are carried out long-range controlling by the Internet anywhere or anytime, such as access, copy the operations such as deletion.Now at home with the company that the cloud storage occurred in the world much providing, such as Sina, Kingsoft, 115 net dishes, Amazon, IBM, Microsoft etc.
But, clearly, in case local data are transferred to long-range high in the clouds, also just having lost for the control of data, the supplier that any protection for data must depend on the cloud storage fully provides, and this has inevitably brought a lot of potential safety hazards.In the data of storage, it can be the important sensitive information of individual or enterprise even country that a lot of data are arranged, can attract unavoidably the artificial attack of each side, leakage of information for example, steal, distort, delete and add etc., the loss that this a series of attack can allow involved individual or enterprise and even country suffer very large economy and an aspect.Exist the data of cloud stores service all to be faced with the while from the outside of cloud and inner potential threat, outside threat refers to attack from computer hacker's intrusion, and inner threat refers to that the supplier's of cloud stores service internal work personnel utilize the facility of position to visit or revise user's data to obtain interests.In fact, leakage that there are some researches show most significant data is finished or is cooperated by the internal staff and finishes.
Because this a series of potential safety hazard, the user group is difficult to trust cloud stores service provider can actively effectively protect the significant data that is stored in high in the clouds.In fact, there are some researches show that the provider of a lot of cloud stores service comprises the major company that some are well-known, is very limited for the safeguard measure of user data.If the user thinks initiatively protection and is stored in the data in high in the clouds; only have with the manual data that need protection of encrypting of encryption software and then be sent to high in the clouds; the technological know-how that this action need is relevant; and need the user properly to manage the secret key that is used for encrypting, because in a single day secret key is leaked or is lost all and will cause very large loss to the user.This problem has had a strong impact on individual or enterprise for the admittance degree of cloud stores service, is also suppressing the fast development of this technology of cloud stores service simultaneously.
Summary of the invention
Purpose of the present invention is exactly in order to solve the safety problem of above-mentioned existing significant data in cloud stores service storage, and provides a kind of conveniently secure cloud storage system that the user can effectively be protected for the significant data that is stored on the cloud stores service.
Realize that technical measures of the present invention are: the cryptographic keys that the cryptographic keys service that utilizes a side to provide generates and stores, encrypt that needs on the local terminal are uploaded the significant data that is stored in the cloud stores service that the opposing party provides and for the ciphertext after encrypting generates signature, then ciphertext is stored in the cloud stores service together with corresponding signature.The processing mutual and data encryption of all of user and secret key service and cloud stores service can easily be finished by the secure cloud data memory module on the local terminal.
The secure cloud data memory module only needs the user that the password of logining of itself and cryptographic keys service and the registration of cloud stores service is provided, and just can finish for the user:
1) upload file: cutting data is part size fragment file at random extremely at random, the index information of mapping original and fragment file can be integrated and write an index file, then the different secret key that generates from the cryptographic keys service acquisition is encrypted every part of fragment file and index file generating ciphertext file, come for cryptograph files produces digital signature with different secret keys, last secret key is stored in the cryptographic keys service end and cryptograph files can be transferred into cloud stores service end with corresponding digital signature again.
2) download file: the ciphertext of index file is downloaded from the cloud stores service first, thereby find and download the cryptograph files of the fragment file that needs download file and the digital signature of their correspondence, whether examine cryptograph files with digital signature first is tampered, decipher and go back the primary fragment file, the last integrated original that is reduced into of fragment file by asking for corresponding cryptographic keys from the cryptographic keys service after examining.
The invention has the advantages that data are after being cut at random fragment and encrypting with different secret keys, cloud stores service end can't be from the size of the file stored, kind, and name and content go to understand the data of storing.Also mean simultaneously if the attacker attempts to reduce a piece of data; he can need to crack a plurality of cryptograph files; moreover which cryptograph files belongs to a certain divided data and does not also know; this will improve the protection to data greatly, and the possibility that the cryptograph files of decoding all fragments by violence obtains former data is very little.The password of logining that relies on cryptographic keys service and cloud stores service fully comes protected data to mean that the user not be used in the local storage any enciphered message of keeping or secret key; the restriction of logining the number of attempt of password can substantially be stopped the attacker and be learnt password by the mode that makes repeated attempts; the hacker also will need to break through simultaneously two or more service side (cryptographic keys service; the cloud stores service) restoring data smoothly, effective so fully or the containment of absolutely large degree a series of attack pattern.The user can pass through the simple upload and download data of visual user interface, and complicated data are processed and all carried out on the backstage by system with the data interaction of individual service end.
Description of drawings
Fig. 1 is structural representation of the present invention
Fig. 2 is mounted in the structural representation of the secure cloud storage data processing module on the LUT
Reference numeral: LUT 1, cryptographic keys service 2,cloud stores service 3, secure cloud storagedata processing module 4, secretkey service interface 5, cloudstores service interface 6, dataintegrity validating module 7, encryption and decryption module 8, the datacutting merges module 9,visual user interface 10.
Embodiment
The present invention is described in detail below in conjunction with specific embodiment
Embodiment: the personal user protects the private data that has the cloud stores service with the present invention on PC
LUT (1) is PC, and the user need install on computers secure cloud storage data processing module (4) and come to carry out data interaction with cryptographic keys service (2) and cloud stores service (3).
The user need to be provided by his selected cryptographic keys service (2) and the cloud stores service (3) that is provided by difference side, this process comprises: arrange and login password, provide required personal information to be used for recovering the later on password of losing, select way of paying etc.
In the present embodiment, cryptographic keys service (2) provides the generation of secret key and basic secret key management service, and management service comprises the storage of secret key, inquiry, backup and deletion.Cloud stores service (3) provides basic data management service, and management service comprises the storage of data, downloads backup and deletion.Need provide correct separately for these two kinds of service-users and login the operation that password just can carry out a class, the service side can limit the number of attempt that the user logins, repeatedly can freeze this user account in the failed situation, the personal information that provides when then initiatively the contact user inquiry is registered is come again open-minded.
The user can login this two sides service at the password of logining of visual user interface (10) input cryptographic keys service (2) and cloud stores service (3).In case login, the cryptograph files of index file and the corresponding digital signature of this cryptograph files can be downloaded from the cloud stores service, after examining its integrality, secure cloud storage data processing module (4) can obtain corresponding cryptographic keys from cryptographic keys service (2) and reduce index file.Come to show that at visual user interface (10) user is stored in the data file of cloud stores service by resolving the user data that records in the index file.
In the present embodiment, the operating process of user's upload file comprises:
The user dilatory or copy need be uploaded to the cloud stores service file to visual user interface (10), this document can be merged module (9) by the data cutting at once and cut into the at random size fragment file at random of part, then can come to obtain newly-generated different secret keys from cryptographic keys service (2) by secret key service interface (5), a part is used for encrypting these fragment files and generates cryptograph files, and remaining part is used for generating the digital signature of these cryptograph files.The filename of cryptograph files generates at random, the filename of the cryptograph files after the information of original and its fragment are encrypted and the digital signature of these cryptograph files can together be kept in the index file (or to be replaced existing, if the original of same filename exists), this index file is recording the source file of other all files of uploading and the information of cryptograph files and cryptograph files digital signature simultaneously, then this index file also can be encrypted in the same way is uploaded to the cloud stores service and replaces original out-of-date index file, and the cryptograph files of index file has specific filename so that convenient inquiry.At last, the cryptograph files of fragment file can be uploaded to cloud stores service (3), and simultaneously, the secret key that uses in the said process all has been stored in cryptographic keys service (2).
In the present embodiment, the operating process of user's download file comprises:
The file that has cloud stores service (3) that the user need to download in visual user interface (10) selection, secure cloud storage data processing module (4) can find the filename of the corresponding cryptograph files of this document then to download from cloud stores service (3) from index file.After cryptograph files is downloaded to this locality, data integrity validating module (7) is used the integrality that the digital signature to should cryptograph files in the index file is examined this cryptograph files, can decipher from the cryptographic keys that this cryptograph files is asked in cryptographic keys service (2) by examining rear encryption and decryption module (8), then data cuttings merges modules (10) and can merge the fragment file that generates after the deciphering and reduce original, original after the reduction can be stored in local position by user's appointment, and corresponding application can be unlocked to open this document (for example open text edit software and come editing text file).
The present invention can be by the individual, and enterprise and government organs are applied in the significant data that the cloud stores service that is provided by other party is provided the various needs of protection widely.The invention has the advantages that, support various cryptographic algorithm, encrypt same piece of data with a plurality of cryptographic keys at random, greatly strengthened the protection of employed cryptographic algorithm.And the present invention is easy to use, and the user need not manage any cryptographic keys or initiatively carry out the operation of any encryption and decryption.The user can obtain to be stored in any place that the Internet arranged the data of cloud stores service (3), has been stored in the cloud stores service (3) but these data all are forms with ciphertext.