This application claims priority of Taiwan Patent Application No. 103130201, filed on Sep. 2, 2014, the entirety of which is incorporated by reference herein.
Technical Field
The present invention relates to data storage, and in particular, to methods for accessing data in cloud storage space and apparatuses using the same.
Description of the Related Art
Cloud storage is a model of data storage where the digital data is stored in logical pools. The physical storage spans across multiple servers (and often locations) and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. However, users are typically concerned about the data security of the cloud storage. For example, data is intercepted when being passed over a digital network to the cloud storage space, data of the storage space is lost when the physical storage system crashes, or is stolen when the cloud storage providers cannot provide rigid protection. Thus, it is desirable to have methods for accessing data in cloud storage space and apparatuses using the same to improve data security.
An embodiment of the invention introduces a method for accessing data in cloud storage space, which contains at least the following steps. A file is obtained. File uploads are generated, where each file upload contains partial data of the file. The file uploads are stored in storage servers of the cloud storage space, where the storage servers are governed by different cloud storage providers.
An embodiment of the invention introduces an apparatus for accessing data in cloud storage space, which contains at least a communications interface and a processing unit. The processing unit, coupled to the communications interface, obtains a first file; generates file uploads, where each file upload contains partial data of the first file. The processing unit further stores the file uploads in storage servers of the cloud storage space via the communications interface, where the storage servers are governed by different cloud storage providers
A detailed description is given in the following embodiments with reference to the accompanying drawings.
The present invention can be fully understood by reading the subsequent detailed description and examples with references made to the accompanying drawings, wherein:
The following description is of the best-contemplated mode of carrying out the invention. This description is made for the purpose of illustrating the general principles of the invention and should not be taken in a limiting sense. The scope of the invention is best determined by reference to the appended claims.
The present invention will be described with respect to particular embodiments and with reference to certain drawings, but the invention is not limited thereto and is only limited by the claims. It should be understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Use of ordinal terms such as “first”, “second”, “third”, etc., in the claims to modify a claim element does not by itself connote any priority, precedence, or order of one claim element over another or the temporal order in which acts of a method are performed, but are used merely as labels to distinguish one claim element having a certain name from another element having the same name (but for use of the ordinal term) to distinguish the claim elements.
An embodiment of the invention introduces network architecture containing multiple storage servers owned by different cloud storage providers, and a client capable of distributing data to the storage servers.
The processing unit 210 then encrypts data of the file (step S320). In step S320, the processing unit may employ DES (Data Encryption Standard), AES (Advanced Encryption Standard), or other algorithms to perform the encryption. DES is an algorithm that takes a fixed-length string of plaintext bits and transforms it through a series of complicated operations into another ciphertext bitstring of the same length. In the case of DES, the block size is 64 bits. DES uses a key to customize the transformation, so that decryption can supposedly only be performed by those who know the particular key used to encrypt. AES is based on a design principle known as a substitution-permutation network, combination of both substitution and permutation. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. Conversely, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits. In alternative embodiments, the processing unit 210 may omit the step S320 to perform subsequent steps with plaintext of the file, and the invention should not be limited thereto. Next, the processing unit 210 divides the ciphered data into parts, in which the total number of divided parts may equal the total number of storage servers storing the divided parts, and generates file uploads to be transmitted to the storage servers 110 to 130, each of which is formed by assembling several parts (step S330). In an example, the processing unit 210 divides the ciphered data into three parts and, for each storage server, assembles two of them into a file upload, where only the half content of one file upload is the same as that of another file upload.
The processing unit 210 disguises the file uploads to modify their original file types with other file types (step S340). For example, the three word-processing file uploads (.docx) can pretend to be image file uploads (.jpg) named “AAA_001.jpg”, “AAA_002.jpg” and “AAA_003.jpg” respectively. In step S340, the processing unit 210 may employ a file binding method to combine the file uploads into image files. In alternative embodiments, the processing unit 210 may omit step S340 to perform subsequent steps with the original file uploads (i.e. the undisguised ones) generated in step S330. The processing unit 210 stores the disguised file uploads in designated storage servers via the communications interface 260 (step S350). For example, the disguised file uploads “AAA_001.jpg”, “AAA_002.jpg” and “AAA_003.jpg” are stored in the storage servers 110 to 130 respectively. It should be noted that, before the file uploads, the processing unit 210 needs to obtain the necessary sets of login accounts and passwords from the memory 250 and accordingly pass the authentications made by the designated storage servers. The processing unit 210 produces file-division-and-upload records each storing information indicating the content of each file upload and which storage server in the cloud storage space stores the file upload (step S360). With reference made to
Table 1 describes how the disguised file upload “AAA_001.jpg” is stored in the Google Drive server, which contains two parts of ciphered data 500a and 500b of a word-processing file “AAA.docx”, the disguised file upload “AAA_002.jpg” is stored in the Dropbox server, which contains two parts of ciphered data 500a and 500c of the word-processing file “AAA.docx”, and the disguised file upload “AAA_003.jpg” is stored in the SugarSync server, which contains two parts of ciphered data 500b and 500c of the word-processing file “AAA.docx”. Moreover, with reference made to
Table 2 describes how the disguised file upload “AAA_001.jpg” is stored in the Google Drive server, which contains two parts of ciphered data 600a and 600c of a word-processing file “AAA.docx” and one piece of parity information 610c, the disguised file upload “AAA_002.jpg” is stored in the Dropbox server, which contains two parts of ciphered data 600b and 600e of the word-processing file “AAA.docx” and one piece of parity information 610b, and the disguised file upload “AAA_003.jpg” is stored in the SugarSync server, which contains two parts of ciphered data 600d and 600f of the word-processing file “AAA.docx” and one piece of parity information 610a. Finally, the processing unit 210 stores the file-division-and-upload records for downloading divided files and recovering the original file in the future (step S370). In step S370, the file-division-and-upload records may be enclosed in the manner of a text file or a data table and stored in the storage device 240 or one of the storage servers 110 to 130 via the communications interface 260.
The processing unit 210 uncovers the disguised files (step S730). In step S730, the processing unit 210 may extract the actual files from the disguised files using a file split method. For example, the word-processing files “AAA_001.docx”, “AAA_002.docx” and “AAA_003.docx” are extracted from disguised image files “AAA_001.jpg”, “AAA_002.jpg” and “AAA_003.jpg”. In alternative embodiments, when the downloaded files have no cover, the processing unit 210 may omit step S730 to perform the subsequent steps with the downloaded files directly. The processing unit 210 combines data of the uncovered files according to the file-division-and-upload records (step S740). Taking examples as shown in
Although the embodiment has been described as having specific elements in
While the invention has been described by way of example and in terms of the preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. On the contrary, it is intended to cover various modifications and similar arrangements (as would be apparent to those skilled in the art). Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements.
| Number | Date | Country | Kind |
|---|---|---|---|
| 103130201 A | Sep 2014 | TW | national |
| Number | Name | Date | Kind |
|---|---|---|---|
| 6922781 | Shuster | Jul 2005 | B1 |
| 7908302 | Nagaralu | Mar 2011 | B1 |
| 8234372 | Knapp | Jul 2012 | B2 |
| 8719223 | Knapp | May 2014 | B2 |
| 9418072 | Calkowski | Aug 2016 | B2 |
| 20070260609 | Tulyani | Nov 2007 | A1 |
| 20140007250 | Stefanov et al. | Jan 2014 | A1 |
| 20140052706 | Misra | Feb 2014 | A1 |
| 20150186668 | Whaley | Jul 2015 | A1 |
| 20150381736 | Seltzer | Dec 2015 | A1 |
| 20160065547 | Heinrich | Mar 2016 | A1 |
| 20160072889 | Jung | Mar 2016 | A1 |
| 20160224548 | Massand | Aug 2016 | A1 |
| 20170013045 | Predmore, II | Jan 2017 | A1 |
| Number | Date | Country |
|---|---|---|
| 201317823 | May 2013 | TW |
| 201339884 | Oct 2013 | TW |
| Number | Date | Country | |
|---|---|---|---|
| 20160063041 A1 | Mar 2016 | US |