Movatterモバイル変換


[0]ホーム

URL:


CN119945679A - A storage encryption gateway and encryption and decryption method - Google Patents

A storage encryption gateway and encryption and decryption method
Download PDF

Info

Publication number
CN119945679A
CN119945679ACN202510446757.1ACN202510446757ACN119945679ACN 119945679 ACN119945679 ACN 119945679ACN 202510446757 ACN202510446757 ACN 202510446757ACN 119945679 ACN119945679 ACN 119945679A
Authority
CN
China
Prior art keywords
check value
packet
protocol packet
private protocol
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202510446757.1A
Other languages
Chinese (zh)
Other versions
CN119945679B (en
Inventor
谭学军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xingchi Zhiyuan Technology Co ltd
Original Assignee
Beijing Xingchi Zhiyuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xingchi Zhiyuan Technology Co ltdfiledCriticalBeijing Xingchi Zhiyuan Technology Co ltd
Priority to CN202510446757.1ApriorityCriticalpatent/CN119945679B/en
Publication of CN119945679ApublicationCriticalpatent/CN119945679A/en
Application grantedgrantedCritical
Publication of CN119945679BpublicationCriticalpatent/CN119945679B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

Translated fromChinese

本发明涉及数据安全存储领域,公开了一种存储加密网关及加解密方法,解决了现有加密网关存在的数据安全性问题,其技术方案要点是包括:接收计算模块,接收请求数据包并解析,为存储卷ID分配密钥,再将原数据包内容和存储卷ID对应密钥封装成第一私有协议包;还对第四私有协议包解析,再封装成标准协议包;加密模块,用存储密钥;对第一私有协议包解析,根据请求类型,直接进行封装,或使用密钥加密后封装,得到第二私有协议包;还对第三私有协议包解析,并根据请求类型,直接封装或使用密钥解密后封装得到第四私有协议包;发送计算模块,对第二私有协议包解析后重封装成数据包;还对存储器返回的应答数据包解析,重封装成第三私有协议包。

The present invention relates to the field of data security storage, discloses a storage encryption gateway and an encryption and decryption method, solves the data security problem existing in the existing encryption gateway, and the key points of the technical solution include: a receiving calculation module, receiving and parsing a request data packet, allocating a key to a storage volume ID, and then encapsulating the original data packet content and the key corresponding to the storage volume ID into a first private protocol packet; also parsing a fourth private protocol packet, and then encapsulating it into a standard protocol packet; an encryption module, using a storage key; parsing the first private protocol packet, directly encapsulating it according to the request type, or encrypting it with a key and then encapsulating it, to obtain a second private protocol packet; also parsing the third private protocol packet, and directly encapsulating it according to the request type, or decrypting it with a key and then encapsulating it, to obtain a fourth private protocol packet; a sending calculation module, parsing the second private protocol packet and re-encapsulating it into a data packet; and also parsing a response data packet returned by the storage device, and re-encapsulating it into a third private protocol packet.

Description

Storage encryption gateway and encryption and decryption method
Technical Field
The invention relates to the field of data security storage, in particular to a storage encryption gateway and an encryption and decryption method.
Background
The IP SAN is a centralized data storage device based on an ethernet network, and is widely used in data centers and information system construction due to the high-speed development of the ethernet network and the versatility of the ethernet network.
To protect data security in IP SAN devices, storage encryption gateways have been developed to cryptographically protect the data to be stored. As shown in fig. 5, in the current IP SAN encryption gateway product, the original IP SAN storage space is remapped mainly by simulating IP SAN storage service on gateway equipment, and data is encrypted and decrypted by block equipment driving in the remapping process.
As shown in fig. 6, the service remapping method needs to implement complete iSCSI and SCSI protocol stacks and virtual disk encryption modules, which has the problems of high system resource consumption, low encryption efficiency and great influence on performance.
As shown in fig. 7, the conventional encryption method adopts a call encryption and decryption mode, and transmits data to an encryption card in the same computing device, and the encryption card returns the data to a system memory after completing data encryption, and then writes the data into an IP SAN storage space. This encryption mode presents a security risk that data is not sent to the encryption card for encryption but stored directly onto the IP SAN.
Disclosure of Invention
The invention aims to provide a storage encryption gateway and an encryption and decryption method, wherein a receiving end and a sending end of a dual-computing environment are isolated, one end is responsible for receiving data, an encryption module is responsible for encrypting the data, the other end is responsible for sending the data, the data can be written or read only by the encryption module, the encryption process can not be bypassed, the risk that the data is sent out after being received in the same computing environment without encryption can be avoided, and the data security is improved.
The technical aim of the invention is realized by the following technical scheme that the storage encryption gateway comprises a receiving calculation module, an encryption module and a sending calculation module;
The receiving and calculating module is used for receiving and analyzing a request data packet sent by the application server, distributing a key for a storage volume ID in the request data packet, packaging the content of the original data packet and the corresponding key of the storage volume ID into a first private protocol packet and sending the first private protocol packet to the encryption module;
The system comprises a receiving computing module, an encryption module, a first private protocol packet, a second private protocol packet, a third private protocol packet, a fourth private protocol packet and a receiving computing module, wherein the receiving computing module is used for receiving a request type of a first private protocol packet;
The sending calculation module is used for analyzing the second private protocol packet and then repackaging the second private protocol packet into a data packet and then sending the data packet to the memory, and is also used for analyzing the response data packet returned by the memory, repackaging the response data packet into a third private protocol packet and sending the third private protocol packet to the encryption module.
The storage encryption gateway comprises a storage encryption gateway, a PUF module, a target end PUF module, a storage encryption gateway and a storage encryption gateway, wherein the storage encryption gateway comprises a PUF module, the PUF module is used for generating an initiating end PUF fingerprint value and a target end PUF fingerprint value before the storage encryption gateway is applied and importing the initiating end PUF fingerprint value and the target end PUF fingerprint value into the encryption module;
The system comprises a receiving and calculating module, a PUF module, a first private protocol packet, a second private protocol packet, a third private protocol packet, a fourth private protocol packet, a fifth private protocol packet, a sixth private protocol packet, a third private protocol packet, a fourth private protocol packet, a fifth private protocol packet, a sixth private protocol packet, a seventh PUF packet and a sixth PUF packet, wherein the receiving and calculating module is used for initiating a challenge to the PUF module after analyzing a request data packet, obtaining an initiating end PUF fingerprint value, calculating a first check value for an analyzed protocol header, and packaging the analyzed first private protocol packet into a first private protocol packet;
The encryption module is also used for storing an imported initiating end PUF fingerprint value and a target end PUF fingerprint value, calculating a second check value by using the imported initiating end PUF fingerprint value after analyzing the first private protocol packet, comparing the analyzed protocol header with the first check value, if the analyzed protocol header is inconsistent with the first check value, performing special processing, if the analyzed protocol header is consistent with the first check value, calculating a third check value by using the imported target end PUF fingerprint value, packaging the third check value in the second private protocol packet, analyzing the third private protocol packet, calculating a fifth check value by using the imported target end PUF fingerprint value, comparing the protocol header with the fourth check value, and performing special processing if the analyzed protocol header is inconsistent with the fourth check value, calculating a sixth check value by using the imported initiating end PUF fingerprint value, and packaging the sixth check value in the fourth private protocol packet;
the sending calculation module is used for initiating a challenge to the PUF module to obtain a PUF fingerprint value after analyzing the second private protocol packet, calculating a fourth check value for the analyzed protocol header, comparing the fourth check value with the third check value, packaging the third check value in the target protocol packet if the third check value is consistent with the target protocol packet, and performing special processing if the third check value is inconsistent with the target protocol packet, and initiating the challenge to the PUF module to obtain the PUF fingerprint value after analyzing the corresponding response data packet, and packaging the fourth check value in the third private protocol packet.
As a preferred technical solution of the present invention, after obtaining the PUF fingerprint value, the check value calculated for the protocol header is an integrity check value.
The invention is characterized in that the invention discards the current data, records the alarm log and returns the alarm log to the application server.
As a preferred embodiment of the present invention, the request packet is an iSCSI protocol packet.
The invention is characterized in that the request type of the request data packet comprises a write request and a non-write request, wherein when the request data packet is the non-write request, the request data packet is directly packaged to obtain a second private protocol packet;
The request type of the response data packet comprises a read request and a non-read request, when the request data packet is the non-read request, the request data packet is directly packaged to obtain a fourth private protocol packet, and when the request data packet is the read request, the request data packet is decrypted by using a secret key and then packaged to obtain the fourth private protocol packet.
An encryption and decryption method of a storage encryption gateway comprises the following steps:
s1, acquiring a secret key and importing the secret key into an encryption module;
S2, responding to a data transmission instruction, receiving and analyzing a request data packet from an application server through a receiving and calculating module, distributing a key for a storage volume ID in the request data packet, packaging the content of the original data packet and the corresponding key of the storage volume ID into a first private protocol packet, and sending the first private protocol packet to an encryption module;
S3, analyzing the first private protocol packet through the encryption module, directly packaging according to the request type, or packaging after encryption by using a secret key to obtain a second private protocol packet and sending the second private protocol packet to the sending calculation module;
s4, analyzing the second private protocol packet through the sending calculation module, repackaging the second private protocol packet into a data packet, and sending the data packet to the memory;
S5, analyzing the response data packet returned by the memory through the sending calculation module, repackaging the response data packet into a third private protocol packet and sending the third private protocol packet to the encryption module;
s6, analyzing the third private protocol packet through the encryption module, directly packaging or decrypting by using a secret key according to the request type, packaging to obtain a fourth private protocol packet, and sending the fourth private protocol packet to the receiving calculation module;
s7, analyzing the fourth private protocol packet through the receiving and calculating module, packaging the fourth private protocol packet into a standard protocol packet and sending the standard protocol packet to the application server.
In S1, before a key is imported for an encryption module, the IP address mapping relationship and access right information of a memory and an application server are acquired and configured in a memory encryption gateway.
In S1, the encryption module is controlled to interact with the PUF module to generate an initiating end PUF fingerprint value and a target end PUF fingerprint value, and the initiating end PUF fingerprint value and the target end PUF fingerprint value are imported into the encryption module;
the method comprises the steps of S2, receiving data packet contents obtained by analysis of a calculation module, namely, a protocol header and a protocol load, after the calculation module distributes a secret key for a storage volume ID, initiating a challenge to a PUF module to obtain a PUF fingerprint value, calculating a first check value for the protocol header by using the PUF fingerprint value, packaging the analyzed protocol header, the protocol load, a key seal corresponding to the storage volume ID and the first check value into a first private protocol packet, and sending the first private protocol packet to an encryption module;
s3, the encryption module analyzes the protocol header, the protocol load, the key seal corresponding to the storage volume ID and the first check value from the first private protocol packet, calculates a second check value for the protocol header analyzed from the first private protocol packet by using the imported initiating end PUF fingerprint value, compares the second check value with the first check value, if the second check value is inconsistent with the first check value, carries out special processing, calculates a third check value for the protocol header analyzed from the first private protocol packet by using the imported target end PUF fingerprint value if the second check value is consistent with the first check value, and directly packages or decrypts the second check value by using the key and packages the second check value in the second private protocol packet;
S4, the sending calculation module analyzes the protocol header, the protocol load, the storage volume ID corresponding key and the third check value from the second private protocol packet, initiates a challenge to the PUF module to acquire a PUF fingerprint value, calculates a fourth check value from the protocol header analyzed from the second private protocol packet by using the PUF fingerprint value, compares the fourth check value with the third check value, encapsulates the fourth check value in the target protocol packet if the fourth check value is consistent with the third check value, and performs special treatment if the fourth check value is inconsistent with the third check value;
S5, the sending calculation module analyzes the response data packet to obtain a protocol header, a protocol load and a storage volume ID corresponding key, initiates a challenge to the PUF module to obtain a PUF fingerprint value, calculates a fourth check value for the protocol header by using the PUF fingerprint value, and encapsulates the fourth check value in a third private protocol packet;
S6, the encryption module analyzes the third private protocol packet to obtain a protocol header, a protocol load, a storage volume ID corresponding key and a fourth check value, calculates the protocol header to obtain a fifth check value by using the imported target end PUF fingerprint value, compares the fifth check value with the fourth check value, carries out special processing if the fifth check value is inconsistent with the fourth check value, calculates a sixth check value by using the imported initiating end PUF fingerprint value if the fifth check value is consistent with the fourth check value, and directly packages or decrypts by using the key and packages the sixth check value in the fourth private protocol packet;
In S7, the receiving calculation module analyzes the fourth private protocol packet to obtain a protocol header, a protocol load, a key corresponding to the storage volume ID, and a sixth check value, initiates a challenge to the PUF module to obtain a PUF fingerprint value, calculates a seventh check value for the protocol header by using the PUF fingerprint value, compares the seventh check value with the sixth check value, encapsulates the sixth check value into a standard protocol packet if the third check value is consistent with the sixth check value, and sends the standard protocol packet to the application server, and performs special processing if the third check value is inconsistent with the sixth check value.
In summary, the invention has the following beneficial effects:
The receiving end and the sending end of the dual-computing environment are isolated, one end is responsible for receiving data, the encryption module is responsible for encrypting the data, the other end is responsible for sending the data, the data can not be written in or read through the encryption module, the encryption process can not be bypassed, the risk that the data is sent out after being received in the same computing environment without encryption can be avoided, and the data safety is improved.
The encryption module is respectively interconnected with the receiving end and the sending end through the private protocol, so that the transmission efficiency is effectively improved, and meanwhile, the risk of illegal invasion caused by using conventional communication modes such as Ethernet and the like is avoided.
And the identity of the receiving end, the sending end and the encryption module is legally authenticated through a PUF unique fingerprint value and an integrity checking mechanism of the iSCSI protocol header, so that the data security is ensured.
The receiving calculation module, the transmitting calculation module and the encryption module verify the integrity of the iSCSI protocol header through the unique fingerprint value of the PUF, ensure that the data packet is processed by the encryption and decryption module, and avoid the data which is not encrypted and decrypted from being transmitted by mistake.
The receiving calculation module, the sending calculation module, the storage end and the encryption and decryption module are integrated equipment, and compared with the calculation and encryption separated equipment, the system is easier to manage and maintain and has higher safety.
Drawings
FIG. 1 is a schematic diagram of a storage encryption gateway of the present invention;
FIG. 2 is a flow chart of the encryption and decryption method of the present invention;
FIG. 3 is a schematic diagram of the encryption and decryption process of the present invention;
FIG. 4 is a schematic diagram of a storage encryption gateway, application server, IP SAN array connection of the present invention;
FIG. 5 is a schematic diagram of a prior art encryption gateway product;
FIG. 6 is a schematic diagram of a prior art encryption server;
Fig. 7 is a schematic diagram of a conventional encryption mode.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in FIG. 1, the invention provides a storage encryption gateway, which is based on an iSCSI protocol and aims at storing data in an IP SAN array, and comprises a receiving calculation module, an encryption module and a sending calculation module;
The receiving and calculating module is connected with an Initiator end of the application server;
the sending calculation module is connected with the Target end of the IP SAN array.
The receiving and calculating module is used for receiving and analyzing a request data packet sent by the application server, distributing a key for a storage volume ID in the request data packet, packaging the content of the original data packet and the corresponding key of the storage volume ID into a first private protocol packet and sending the first private protocol packet to the encryption module, and analyzing a fourth private protocol packet, packaging the fourth private protocol packet into a standard protocol packet and sending the standard protocol packet to the application server, wherein the request data packet is an iSCSI protocol packet.
The system comprises a receiving computing module, an encryption module, a first private protocol packet, a second private protocol packet, a third private protocol packet, a fourth private protocol packet and a receiving computing module, wherein the receiving computing module is used for receiving a request type of a first private protocol packet;
The sending calculation module is used for analyzing the second private protocol packet and then repackaging the second private protocol packet into a data packet and then sending the data packet to the memory, and is also used for analyzing the response data packet returned by the memory, repackaging the response data packet into a third private protocol packet and sending the third private protocol packet to the encryption module.
Embodiment 1, as shown in fig. 2, the specific implementation of the red and black isolated data encryption method based on the iSCSI protocol layer is as follows:
An iSCSI protocol encryption gateway is deployed, a sending calculation module of the encryption gateway is connected to an IP SAN disk array through an Ethernet, and a receiving calculation module of the encryption gateway is connected to an application server through the Ethernet;
creating ISCSI TARGET on the IP SAN array and configuring an output storage volume to provide a data storage space for a user, and configuring access control authority of an application server;
introducing IP SAN array address information and access authority information on an iSCSI encryption gateway, and initializing an encryption key;
the application server initiates a connection request to the IP SAN array ISCSI TARGET through the iSCSI Initiator, and establishes iSCSI session connection;
The receiving calculation module captures the iSCSI protocol packet interacted by the application server and the IP SAN array, obtains the storage volume identification by analyzing the protocol packet, distributes the encryption key for the volume according to the storage volume identification, locks the encryption key by the application server Initiator name, the IP SAN array end ISCSI TARGET and the volume ID three elements, interacts with the iSCSI encryption gateway in plaintext, encrypts and decrypts the iSCSI data load by using the key in the iSCSI session protocol interaction, transmits data between the iSCSI encryption gateway and the IP SAN array in ciphertext,
As shown in fig. 3, a specific encryption process is as follows:
a1, a receiving and calculating module receives and analyzes an iSCSI protocol packet transmitted by an application server iSCSI Initiator;
A2, encapsulating the parsed iSCSI protocol header and the iSCSI load into a private protocol and sending the private protocol to an encryption module;
a3, the encryption module receives the private protocol packet of the receiving calculation module to unpack and check whether the private protocol packet is an iSCSI legal command word;
A4, the encryption module forwards the private protocol packet of the iSCSI protocol header to the sending calculation module, encrypts the iSCSI protocol load by using the secret key M, encapsulates the encrypted iSCSI protocol load into the private protocol packet and sends the private protocol packet to the sending calculation module;
and A5, the sending calculation module receives the private protocol packet sent by the encryption module to unpack, encapsulates the private protocol packet into an iSCSI protocol packet and sends the iSCSI protocol packet to the IP SAN array ISCSI TARGET.
As shown in fig. 3, a specific decryption process is as follows:
b1, a sending calculation module receives and analyzes an iSCSI protocol packet sent by the IP SAN array ISCSI TARGET;
B2, encapsulating the parsed iSCSI protocol header and the iSCSI load into a private protocol and sending the private protocol to an encryption module;
b3, the encryption module receives the private protocol packet of the sending calculation module to unpack and check whether the private protocol packet is an iSCSI legal command word;
The encryption module forwards the private protocol packet of the iSCSI protocol header to the receiving calculation module, decrypts the iSCSI protocol load by using the secret key M, encapsulates the decrypted iSCSI protocol load into the private protocol packet and sends the private protocol packet to the receiving calculation module;
And B5, the receiving and calculating module receives the private protocol packet sent by the encryption module to unpack, packages the private protocol packet into an iSCSI protocol packet and sends the iSCSI protocol packet to the application server iSCSI Initiator.
As shown in fig. 4, in this embodiment, the iSCSI encryption gateway is connected to the application server and the IP SAN array through ethernet networks, respectively. The IP SAN array is used for providing an original data storage volume, the application server accesses data to the storage volume of the IP SAN array through the iSCSI protocol, the iSCSI encryption gateway captures the iSCSI protocol packet, encrypts and decrypts the iSCSI load data after analysis, and rewacks the iSCSI load data into the iSCSI protocol packet and sends the iSCSI protocol packet, thereby ensuring that the data on the IP SAN array is stored in a ciphertext form.
In embodiment 2, a PUF module is also introduced into the storage encryption gateway, and the specific application process is as follows:
The system comprises a receiving end, a transmitting end, a PUF module, a receiving end, a transmitting end and a transmitting end, wherein the receiving end is used for receiving a challenge of an initiator;
The system comprises a receiving and calculating module, a PUF module, a third private protocol packet, a fourth private protocol packet, a fifth private protocol packet, a sixth private protocol packet and a standard protocol packet, wherein the receiving and calculating module is used for initiating a challenge to the PUF module after analyzing a request data packet to obtain a receiving end PUF fingerprint value, calculating a first check value for an analyzed protocol header and packaging the first check value into the first private protocol packet;
The encryption module is also used for storing an imported receiving end PUF fingerprint value and a transmitting end PUF fingerprint value, calculating a second check value by using the imported receiving end PUF fingerprint value after analyzing the first private protocol packet, comparing the analyzed protocol header with the first check value, if the analyzed protocol header is inconsistent with the first check value, performing special processing, if the analyzed protocol header is consistent with the first check value, calculating a third check value by using the imported transmitting end PUF fingerprint value, and packaging the third check value in the second private protocol packet;
The sending calculation module is used for initiating a challenge to the PUF module to obtain a PUF fingerprint value after analyzing the second private protocol packet, calculating a fourth check value for the analyzed protocol header, comparing the fourth check value with the third check value, packaging the third check value in the target protocol packet if the third check value is consistent with the target protocol packet, and performing special processing if the third check value is inconsistent with the target protocol packet
Specifically, after obtaining the PUF fingerprint value, the verification value calculated for the protocol header is an integrity verification value
The special processing is that the current data is discarded, the alarm log is recorded, and the alarm log is returned to the application server.
The invention also provides an encryption and decryption method of the storage encryption gateway corresponding to the storage encryption gateway, comprising the following steps:
s1, acquiring a secret key and importing the secret key into an encryption module;
Specifically, before a key is imported for the encryption module, the memory and the application server, that is, the IP address mapping relationship and access right information of the IP SAN array Target and the server-side Initiator IP address are obtained and configured in the memory encryption gateway.
When a secret key is imported, the encryption module is also controlled to interact with the PUF module, a receiving end PUF fingerprint value and a transmitting end PUF fingerprint value are generated, and the receiving end PUF fingerprint value and the transmitting end PUF fingerprint value are imported into the encryption module;
in this step, after a key, a receiving end PUF fingerprint value, and a transmitting end PUF fingerprint value are imported for the encryption module, the encryption module is initialized.
S2, responding to the data transmission instruction, receiving a request data packet, namely an iSCSI protocol packet, from an application server through a receiving calculation module, analyzing the request data packet, distributing a key for a storage volume ID in the request data packet, packaging the content of the original data packet and the corresponding key of the storage volume ID into a first private protocol packet, and sending the first private protocol packet to an encryption module;
S2, the data packet content obtained by the analysis of the receiving and calculating module comprises an iSCSI protocol header and an iSCSI load, wherein after the receiving and calculating module distributes a secret key for a storage volume ID, the receiving and calculating module initiates a challenge to a PUF module to obtain a PUF fingerprint value, and calculates a first check value for the protocol header by using the PUF fingerprint value;
S3, analyzing the first private protocol packet through the encryption module, directly packaging according to the request type, or packaging after encryption by using a secret key to obtain a second private protocol packet and sending the second private protocol packet to the sending calculation module;
S3, the encryption module analyzes a protocol header, a protocol load, a key seal corresponding to a storage volume ID and a first check value from a first private protocol packet, calculates a second check value from the protocol header analyzed from the first private protocol packet by using an imported receiving end PUF fingerprint value, compares the second check value with the first check value, carries out special processing if the protocol header is inconsistent with the first check value, namely discarding data, recording an alarm log and returning the alarm log;
The request type of the request data packet comprises a write request and a non-write request, wherein when the request data packet is the non-write request, the request data packet is directly packaged to obtain a second private protocol packet;
s4, analyzing the second private protocol packet through the sending calculation module, then repackaging the second private protocol packet into a data packet, and then sending the data packet to a memory, namely an IP SAN array end;
S4, the sending calculation module analyzes the protocol header, the protocol load, the storage volume ID corresponding key and the third check value from the second private protocol packet, initiates a challenge to the PUF module to acquire a PUF fingerprint value, calculates a fourth check value from the protocol header analyzed from the second private protocol packet by using the PUF fingerprint value, compares the fourth check value with the third check value, encapsulates the fourth check value in the target protocol packet if the fourth check value is consistent with the third check value, and performs special treatment if the fourth check value is inconsistent with the third check value;
S5, analyzing the response data packet returned by the memory through the sending calculation module, repackaging the response data packet into a third private protocol packet and sending the third private protocol packet to the encryption module;
S5, the sending calculation module analyzes the response data packet to obtain a protocol header, a protocol load and a storage volume ID corresponding key, initiates a challenge to the PUF module to obtain a PUF fingerprint value, calculates a fourth check value for the protocol header by using the PUF fingerprint value, and encapsulates the fourth check value in a third private protocol packet;
s6, analyzing the third private protocol packet through the encryption module, directly packaging or decrypting by using a secret key according to the request type, packaging to obtain a fourth private protocol packet, and sending the fourth private protocol packet to the receiving calculation module;
S6, the encryption module analyzes the third private protocol packet to obtain a protocol header, a protocol load, a storage volume ID corresponding key and a fourth check value, calculates the protocol header to obtain a fifth check value by using the imported PUF fingerprint value of the transmitting end, compares the fifth check value with the fourth check value, carries out special processing if the fifth check value is inconsistent with the fourth check value, calculates a sixth check value by using the imported PUF fingerprint value of the receiving end if the fifth check value is consistent with the fourth check value, and directly packages or decrypts by using the key and packages the sixth check value in the fourth private protocol packet;
The request type of the response data packet comprises a read request and a non-read request, when the request data packet is the non-read request, the request data packet is directly packaged to obtain a fourth private protocol packet, and when the request data packet is the read request, the request data packet is decrypted by using a secret key and then packaged to obtain the fourth private protocol packet.
S7, analyzing the fourth private protocol packet through the receiving and calculating module, packaging the fourth private protocol packet into a standard protocol packet and sending the standard protocol packet to the application server.
In S7, the receiving calculation module analyzes the fourth private protocol packet to obtain a protocol header, a protocol load, a key corresponding to the storage volume ID, and a sixth check value, initiates a challenge to the PUF module to obtain a PUF fingerprint value, calculates a seventh check value for the protocol header by using the PUF fingerprint value, compares the seventh check value with the sixth check value, encapsulates the sixth check value into a standard protocol packet if the third check value is consistent with the sixth check value, and sends the standard protocol packet to the application server, and performs special processing if the third check value is inconsistent with the sixth check value.
According to the scheme, the software stack level of the encryption gateway can be reduced, the processing performance is effectively improved, the identity authentication validity of the red and black ends is carried out by combining a PUF (Physical Unclonable Functions, physical unclonable function) technology, meanwhile, the encryption method that data can not be bypassed and can not be bypassed after being transmitted to the IP SAN array end through the encryption module is ensured, and therefore the data security is effectively ensured.
The encryption and decryption method of the storage encryption gateway has the advantages that:
1) The linear encryption and decryption of the data is directly realized at the iSCSI protocol layer on the network path, the remapping of the IP SAN storage volume is not needed, the construction processes of iSCSI and SCSI protocol software stacks and encryption and decryption drivers are reduced, the encryption and decryption efficiency of the data is effectively improved, the data storage performance is improved, and the read-write delay caused by encryption and decryption to the storage is reduced.
2) The protocol layer is transparent in encryption and decryption, compatible with the native iSCSI protocol and supports the MPIO deployment mode of the IP SAN storage volume. Each iSCSI path between the application server and the IP SAN storage volume can be connected to the encryption gateway, so that multipath load balancing and fault taking over are realized.
3) The receiving end and the sending end of the dual-computing environment are isolated, one end is responsible for receiving data, the encryption module is responsible for encrypting the data, the other end is responsible for sending the data, the data can not be written in or read through the encryption module, the encryption process can not be bypassed, the risk that the data is sent out after being received in the same computing environment without encryption can be avoided, and the data safety is improved.
4) The encryption module is respectively interconnected with the receiving end and the sending end through the private protocol, so that the transmission efficiency is effectively improved, and meanwhile, the risk of illegal invasion caused by using conventional communication modes such as Ethernet and the like is avoided.
5) And the identity of the receiving end, the sending end and the encryption module is legally authenticated through a PUF unique fingerprint value and an integrity checking mechanism of the iSCSI protocol header, so that the data security is ensured.
6) The receiving calculation module, the transmitting calculation module and the encryption module verify the integrity of the iSCSI protocol header through the unique fingerprint value of the PUF, ensure that the data packet is processed by the encryption and decryption module, and avoid the data which is not encrypted and decrypted from being transmitted by mistake.
7) The receiving calculation module, the sending calculation module, the storage end and the encryption and decryption module are integrated equipment, and compared with the calculation and encryption separated equipment, the system is easier to manage and maintain and has higher safety.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the present invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.

Claims (9)

The encryption module is also used for storing an imported initiating end PUF fingerprint value and a target end PUF fingerprint value, calculating a second check value by using the imported initiating end PUF fingerprint value after analyzing the first private protocol packet, comparing the analyzed protocol header with the first check value, if the analyzed protocol header is inconsistent with the first check value, performing special processing, if the analyzed protocol header is consistent with the first check value, calculating a third check value by using the imported target end PUF fingerprint value, packaging the third check value in the second private protocol packet, analyzing the third private protocol packet, calculating a fifth check value by using the imported target end PUF fingerprint value, comparing the protocol header with the fourth check value, and performing special processing if the analyzed protocol header is inconsistent with the fourth check value, calculating a sixth check value by using the imported initiating end PUF fingerprint value, and packaging the sixth check value in the fourth private protocol packet;
s3, the encryption module analyzes the protocol header, the protocol load, the key seal corresponding to the storage volume ID and the first check value from the first private protocol packet, calculates a second check value for the protocol header analyzed from the first private protocol packet by using the imported initiating end PUF fingerprint value, compares the second check value with the first check value, if the second check value is inconsistent with the first check value, carries out special processing, calculates a third check value for the protocol header analyzed from the first private protocol packet by using the imported target end PUF fingerprint value if the second check value is consistent with the first check value, and directly packages or decrypts the second check value by using the key and packages the second check value in the second private protocol packet;
CN202510446757.1A2025-04-102025-04-10Storage encryption gateway and encryption and decryption methodActiveCN119945679B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510446757.1ACN119945679B (en)2025-04-102025-04-10Storage encryption gateway and encryption and decryption method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510446757.1ACN119945679B (en)2025-04-102025-04-10Storage encryption gateway and encryption and decryption method

Publications (2)

Publication NumberPublication Date
CN119945679Atrue CN119945679A (en)2025-05-06
CN119945679B CN119945679B (en)2025-06-17

Family

ID=95545059

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510446757.1AActiveCN119945679B (en)2025-04-102025-04-10Storage encryption gateway and encryption and decryption method

Country Status (1)

CountryLink
CN (1)CN119945679B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20040104766A (en)*2003-06-032004-12-13주식회사 케이티System for managing Internet Protocol - Asymmetric/Very high data rate Digital Subscriber Line divice
US20060136724A1 (en)*2004-12-022006-06-22Yoshiteru TakeshimaRelay method of encryption communication, gateway server, and program and program memory medium of encryption communication
WO2022041186A1 (en)*2020-08-312022-03-03华为技术有限公司Security protection method and device and storage medium
US20240048541A1 (en)*2022-08-082024-02-08International Business Machines CorporationDistribution of private session key and offloading a protocol stack to a network communication device for secured communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20040104766A (en)*2003-06-032004-12-13주식회사 케이티System for managing Internet Protocol - Asymmetric/Very high data rate Digital Subscriber Line divice
US20060136724A1 (en)*2004-12-022006-06-22Yoshiteru TakeshimaRelay method of encryption communication, gateway server, and program and program memory medium of encryption communication
WO2022041186A1 (en)*2020-08-312022-03-03华为技术有限公司Security protection method and device and storage medium
US20240048541A1 (en)*2022-08-082024-02-08International Business Machines CorporationDistribution of private session key and offloading a protocol stack to a network communication device for secured communications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张玉俊: "基于国密算法的高性能IPSec VPN网关的研究与实现", 硕士论文, 15 April 2024 (2024-04-15)*

Also Published As

Publication numberPublication date
CN119945679B (en)2025-06-17

Similar Documents

PublicationPublication DateTitle
US11841985B2 (en)Method and system for implementing security operations in an input/output device
CN114244508B (en)Data encryption method, device, equipment and storage medium
CN110249332A (en)Credible performing environment is addressed using encryption key
US9306916B2 (en)System and a method for a remote direct memory access over converged ethernet
US20160261592A1 (en)Method and device for the secure authentication and execution of programs
CN107846396B (en) Memory system and binding method between it and the host
US10691619B1 (en)Combined integrity protection, encryption and authentication
US11126567B1 (en)Combined integrity protection, encryption and authentication
US11722467B2 (en)Secured communication from within non-volatile memory device
CN114448624A (en) Transparent Internet of Things Secure Transmission Method and Device Based on White Box Cryptographic Service
US9438569B2 (en)Secured embedded data encryption systems
US11797717B2 (en)Bus encryption for non-volatile memories
CN118869917B (en) Network video recorder and data encryption storage method
CN116248265A (en)Execution method and device of data transmission protocol
CN114679299A (en)Communication protocol encryption method, device, computer equipment and storage medium
CN119696769A (en) An encrypted communication system and method for dynamically generating keys based on multiple information
CN119945679B (en)Storage encryption gateway and encryption and decryption method
CN111105777B (en)Voice data acquisition and playing method and device, key package updating method and device and storage medium
CN115189969B (en)Network encryption communication method, device, medium and equipment
CN118200917B (en) A method, system and medium for securely accessing protected applications in a mobile network environment
CN116980110B (en)Block cipher operation method, device, system, equipment and storage medium
US11469890B2 (en)Derived keys for connectionless network protocols
CN115544583B (en)Data processing method and device of server cipher machine
US20250272008A1 (en)Storage system improving encryption integrity of data and operating method thereof
CN112688953B (en)Data processing method and device, electronic equipment and computer readable storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp