WO2014117649A1 - 一种数据共享的方法及装置 - Google Patents
一种数据共享的方法及装置 Download PDFInfo
- Publication number
- WO2014117649A1 WO2014117649A1 PCT/CN2014/070724 CN2014070724W WO2014117649A1 WO 2014117649 A1 WO2014117649 A1 WO 2014117649A1 CN 2014070724 W CN2014070724 W CN 2014070724W WO 2014117649 A1 WO2014117649 A1 WO 2014117649A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- file
- key
- temporary
- shared file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Definitions
- the present invention relates to the field of network technologies, and in particular, to a method and an apparatus for data sharing. Background technique
- Cloud service providers can easily handle many things for users, such as data sharing, data backup, and more.
- security is one of the most concerned issues for users, and it is also the biggest challenge facing cloud service providers. If the user does not trust the cloud service provider, the data will be encrypted before being uploaded to the cloud. Therefore, in the cloud environment, how to securely share data on the cloud server to other users will be the problem to be solved.
- the first aspect provides a method of data sharing, including: [09] receiving, by the second user, a user key of the shared file of the first user by using a uniform resource locator URL, wherein the second user is a legitimate user authorized to access the shared file by the first user through the trust center
- the shared file is a shared file encrypted by using the user key
- the obtaining, by the URL, the file description of the shared file from the cloud server further includes:
- the sending the user key to the second user specifically includes: [19] sending the temporary URL and the temporary key to the second user.
- the second aspect provides a method of data sharing, the method comprising -
- the second user acquires the shared file and the user key according to the URL; and decrypts the shared file by using the user key, specifically including
- the second user acquires the user key of the shared file from the trust center according to the URL, and acquires the shared file from the cloud server, and decrypts the user by using the user key The shared file.
- the second user acquires the shared file and the user key according to the URL; and decrypts the shared file by using the user key, which specifically includes:
- the second user requests the trust center to request the user key of the shared file corresponding to the URL;
- a third aspect provides a method of data sharing, the method comprising -
- a fourth aspect provides a method of data sharing, the method comprising -
- the fifth aspect provides a device for data sharing, including:
- the first receiving unit is configured to receive, by the second user, a user key that requests the shared file of the first user by using the uniform resource locator URL, where the second user is authorized to access the first user by using the trusted center.
- a legal user of the shared file is a shared file encrypted by using a user key of the first user;
- an obtaining unit configured to acquire, according to the URL, a file description of the corresponding shared file from a cloud server;
- the file is described as a file description after the user key is encrypted by using the public key of the trust center;
- a first decryption unit configured to decrypt the file description by using a private key corresponding to the public key of the trust center, to obtain a user key of the first user;
- the first sending unit is configured to send the user key to the second user.
- the acquiring unit is further configured to: when the file description of the shared file is obtained from the cloud server according to the URL, the shared file corresponding to the URL is further acquired; the device further includes:
- a second decryption unit configured to decrypt the acquired shared file by using the user key obtained by the first decryption unit, to obtain an original shared file of the first user
- an encryption unit configured to encrypt the original shared file by using a temporary key to obtain a temporary file
- a second sending unit configured to upload the temporary file to the cloud server
- a second receiving unit configured to send, by the cloud server, a temporary URL corresponding to the temporary file
- the first sending unit is further configured to send the temporary URL and the temporary key to the second user.
- the sixth aspect provides a device for data sharing, including -
- an encryption unit configured to encrypt a file to be uploaded to the cloud server by using a user key, obtain an encrypted shared file, and encrypt the user key by using a public key of the trust center, and encrypt the user key User key as a file description;
- a first sending unit configured to upload the encrypted shared file and file description to the cloud server
- a first receiving unit configured to receive a uniform resource locator URL corresponding to the shared file sent by the cloud server
- an authorization unit configured to authorize a second user to access the shared file by using the trust center
- a second sending unit configured to send the URL to the second user, so that the second user acquires the shared file and the user key according to the URL; and utilizes the user The key decrypts the shared file.
- the seventh aspect provides a device for data sharing, including: [73] a first receiving unit, configured to receive a shared file and a corresponding file description sent by the first user, where the shared file is a shared file encrypted by using a user key of the first user; The file description after encrypting the user key by using the public key of the trust center;
- a storage unit configured to store the shared file and a corresponding file description
- a first sending unit configured to send, to the first user, a uniform resource locator URL corresponding to the shared file
- a second receiving unit configured to receive a request sent by the trust center to obtain a file description corresponding to the URL
- a second sending unit configured to send a response including the file description to the trust center, so that the trust center decrypts the file description by using a private key corresponding to the public key, to obtain the user secret a key, and the trust center sends the user key to the second user;
- a third receiving unit configured to receive, by the second user, a shared file that is requested by the URL, where the second user is authorized by the first user to access the shared file by using the trusted center;
- the third sending unit is configured to send the shared file corresponding to the URL to the second user, so that the second user decrypts the shared file according to the received user key.
- the eighth aspect provides a device for data sharing, including -
- the first receiving unit is configured to receive a shared file sent by the first user and a corresponding file description, where the shared file is a shared file encrypted by using a user key of the first user;
- the file description after encrypting the user key by using the public key of the trust center;
- a first storage unit configured to store the shared file and a corresponding file description
- a first sending unit configured to send, to the first user, a uniform resource locator URL corresponding to the shared file and the file description;
- a second receiving unit configured to receive a request sent by the trust center to obtain a shared file and a file description corresponding to the URL;
- a second sending unit configured to send, to the trust center, a response including the shared file and the file description, so that the trust center decrypts the file description by using a private key corresponding to the public key, and obtains a Describe a user key, and decrypt the shared file by using the user key, and then re-encrypt with a temporary key to obtain a temporary file;
- a third receiving unit configured to receive a temporary file sent by the trust center
- a second storage unit configured to store the temporary file
- a third sending unit configured to send, to the trust center, a temporary URL corresponding to the temporary file, where the trust center sends the temporary key and the temporary URL to the second user;
- a fourth receiving unit configured to receive, by the second user, a request for acquiring a temporary file corresponding to the temporary URL
- the fourth sending unit is configured to send a response including the temporary file to the second user, so that the second user decrypts the temporary file according to the temporary key.
- the user data (that is, the shared file) is encrypted before being uploaded to the cloud server, and the first user is authorized to access the user to upload to the cloud through the trust center.
- the user data is authenticated, the security problem of the shared file on the shared cloud server is solved, the user terminal's confidence in cloud security is improved, and the user can conveniently share the shared data stored in the cloud server.
- FIG. 1 is a flowchart of a method for data sharing according to an embodiment of the present invention
- FIG. 2 is another flowchart of a method for data sharing according to an embodiment of the present invention
- FIG. 3 is still another flowchart of a method for data sharing according to an embodiment of the present invention.
- FIG. 4 is still another flowchart of a method for data sharing according to an embodiment of the present invention.
- FIG. 5 is still another flowchart of a method for data sharing according to an embodiment of the present invention.
- FIG. 6 is still another flowchart of a method for data sharing according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a data sharing apparatus according to an embodiment of the present invention.
- FIG. 8 is a schematic diagram of another structure of a data sharing apparatus according to an embodiment of the present invention.
- FIG. 9 is still another schematic structural diagram of a data sharing apparatus according to an embodiment of the present invention.
- FIG. 10 is still another schematic structural diagram of a data sharing apparatus according to an embodiment of the present disclosure
- FIG. 11 is still another schematic structural diagram of a data sharing apparatus according to an embodiment of the present disclosure
- FIG. 12 is a schematic diagram of still another structure of a data sharing apparatus according to an embodiment of the present invention.
- FIG. 13 is a first application example of a data sharing method according to an embodiment of the present invention.
- FIG. 14 is a second application example of a data sharing method according to an embodiment of the present invention;
- FIG. 15 is a third application example of a data sharing method according to an embodiment of the present invention.
- FIG. 1 is a flowchart of a method for sharing according to an embodiment of the present invention; in this embodiment, a user terminal (consumer) and a cloud server (a server of a cloud service provider) A trust center (i.e., a third party) is introduced between them, and in this embodiment, it is assumed that the cloud service provider is not trusted.
- the Trust Center Certificate Authority, CA
- the Key Distribution Center KDC
- the communication channel between the default user terminal and the trust center is generally secure. Therefore, key negotiation between the user terminal and the trust center is also secure.
- CA Certificate Authority
- KDC Key Distribution Center
- Step 101 Receive a second user to request a user key of the shared file of the first user by using a uniform resource locator URL, where the second user of the leg is a legitimate user authorized by the trust center to access the fiber shared file through the trust center. ; m shared file is a shared file encrypted by using the first user's user key;
- the first user first encrypts the shared file to be uploaded using its own user key, obtains the encrypted shared file, and encrypts the user key using the trust center's own public key. And the encrypted user key is used as the file description of the shared file, and then the first user uploads the file description and the encrypted shared file to the cloud server, and receives the feedback from the cloud server.
- a uniform resource locator (URL) corresponding to the shared file, after the first user authorizes the second user to access the encrypted URL of the shared file through the trust center, and after the second user of the trusted center leg is a legitimate user, Send the fiber URL to the second user.
- the trust center receives the user key of the shared file of the second user requesting to acquire the fiber URL.
- Step 102 Obtain a file description of the fiber shared file from the cloud server according to the fiber URL; where the fiber file is described as a file description after the user key is encrypted by using a public key of the trust center; [114] On the basis of the step 101, the trust center requests the cloud server to obtain a file description corresponding to the URL, and receives the file description fed back by the cloud server.
- Step 103 Decrypt the file description by using a private key corresponding to the public key of the trust center to obtain a user key of the first user;
- the file description is decrypted by using the private key corresponding to the fiber public key to obtain the user key of the first user.
- Step 104 Send the user key to the second user, so that the second user decrypts the obtained shared file by using the user key to obtain the original shared file of the first user.
- the trust center may send the leg user key to the second user through the secure channel, and the second user first obtains the corresponding shared file from the cloud server according to the URL, and then uses the The user key decrypts the obtained shared file to obtain the original shared file of the first user.
- the user data (that is, the shared file) is encrypted before being uploaded to the cloud server, and the user is authorized by the trust center to authorize other users to access the user data uploaded to the cloud.
- the security problem of shared files on the shared cloud server is solved, the user terminal's confidence in cloud security is improved, and the user can conveniently share the shared data stored in the cloud server.
- the embodiment may further include: the trust center acquiring the file description of the shared file from the cloud server according to the URL, according to the foregoing embodiment. And acquiring the shared file corresponding to the URL; and then decrypting the obtained shared file by using the user key to obtain an original shared file of the first user; and then using the temporary key to encrypt the file
- the first user's original shared file is obtained, and the temporary file is obtained; and the temporary file is stored in the cloud server, and the temporary URL corresponding to the temporary file delivered by the cloud server is obtained;
- the user-key is sent to the second user, so that the second user decrypts the obtained shared file by using the user key, and the original shared file of the first user is specifically: Sending the temporary URL and the temporary key to the second user, so that the second user decrypts the obtained temporary file by using the temporary key to obtain the original shared file of the first user.
- the trust center decrypts the file description by using the private key corresponding to the public key, and obtains the corresponding user key. Then, the shared file is decrypted by using the user key to obtain the original shared file, and then the original shared file is re-encrypted, and the re-encrypted shared file (ie, temporary file) is re-uploaded to the cloud server, and Obtaining a corresponding temporary URL by the cloud server, and then sending the temporary URL and the temporary key to the second user, so as to facilitate the second The user obtains the corresponding temporary file according to the temporary URL, and decrypts the temporary file by using the temporary key to obtain the original shared file of the first user.
- the trusted center re-encrypts the obtained original shared file and re-uploads it to the cloud server, so as to authenticate the first user to authorize other users to access the user data uploaded to the cloud, and solve the problem. Sharing the security of shared files on the cloud server, and also facilitating users to share shared data stored in the cloud server.
- FIG. 2 is another flowchart of a method for data sharing according to an embodiment of the present invention, where the method includes:
- Step 201 Encrypt the file to be uploaded to the cloud server by using the user key, obtain the encrypted shared file, and encrypt the user key by using the public key of the trust center, and encrypt the encrypted user key.
- the user who uploads the shared file encrypts the shared file with its own key (ie, the user key) before uploading the shared file, and then utilizes the trust center itself.
- the public key encrypts the user key and uses the encrypted user key as a file description for the shared file.
- Step 202 Upload the shared file and file description to the cloud server
- the first user uploads the encrypted shared file and file description to the cloud server through the secure channel.
- the default user and the cloud server are secure.
- Step 203 Receive a uniform resource locator URL corresponding to the shared file sent by the cloud server, that is, URL1;
- the first user receives the URL (ie, URL1) corresponding to the shared file sent by the cloud server through a secure channel.
- Step 204 Authorize the second user to access the URL of the shared file through the trust center;
- the first user first authenticates the identity of the authorized second user through the trust center, that is, whether the second user is a legitimate user, and if the second user is a legitimate user, step 205 is performed;
- Step 205 Send the URL to the second user; to facilitate the second user to acquire the shared file and the user key according to the URL; and decrypt the location by using the user key
- the shared file is obtained, and the original shared file of the first user is obtained.
- the process in which the second user obtains the original shared file of the first user mainly includes two cases -
- the second user acquires a user key of the shared file from the trust center according to the URL, and acquires the shared file from a cloud server, and decrypts by using the user key.
- the shared file obtains the original shared file of the first user.
- the second user requests the trust center for the user key of the shared file corresponding to the URL; the second user receives the temporary URL sent by the trust center in response to the request And a temporary key, wherein the temporary key is a key for re-encrypting the obtained original file of the shared file by the trust center, and the temporary URL is a URL corresponding to the temporary file returned by the cloud server, where The temporary file is used by the trust center to re-encrypt the original file of the shared file by using the temporary key pair; the second user acquires the temporary file corresponding to the temporary URL from the cloud server; The temporary key decrypts the temporary file to obtain the original shared file of the first user.
- FIG. 3 is a flowchart of a method for data sharing according to an embodiment of the present invention, which includes:
- Step 301 Receive a shared file sent by the first user and a corresponding file description, where the shared file is a shared file encrypted by using a user key of the first user; and the file is described as using a trust center. a file description after the public key encrypts the user key;
- the cloud server (or the server of the cloud service provider) stores the shared file and the corresponding file description sent by the user, and feeds back the Uniform Resource Locator URL of the corresponding shared file to the user, that is, step 302.
- Step 302 storing the shared file and a corresponding file description
- Step 303 Send, to the first user, a Uniform Resource Locator URL corresponding to the shared file.
- the cloud server sends the URL of the shared file to the corresponding first user through a secure channel.
- the first user can authorize the second user to access the URL of the shared file through the trust center, and when the trusted center verifies that the second user is a legitimate user, the first user sends the URL of the shared file to the second user.
- the second user requests the user key of the shared file from the trust center according to the URL, and the trust center requests the corresponding file description from the cloud server according to the URL.
- Step 304 Receive a request sent by the trust center to obtain a file description corresponding to the URL;
- Step 305 Send a response including the file description to the trust center; so that the trust center decrypts the file description by using a private key corresponding to the public key, and obtains a user key, and the trust center will Sending the user key to the second user;
- the cloud server sends the file description to the trust center through a secure channel.
- Step 306 Receive a second user to send a shared file corresponding to the URL; the second user is a user who is authorized by the first user to access the shared file through the trust center;
- Step 307 Send the shared file corresponding to the URL to the second user, so that the second user decrypts the shared file according to the received user key, and obtains the original shared file of the first user.
- FIG. 4 is a flowchart of a method for data sharing according to an embodiment of the present invention, where the method includes:
- Step 401 Receive a shared file and a corresponding file description sent by the first user, where the shared file is a shared file encrypted by using a user key of the first user; and the file is described as using a trust center. a file description after the public key encrypts the user key;
- the cloud server receives the shared file sent by the first user and the corresponding file description through the secure channel.
- Step 402 storing the shared file and a corresponding file description;
- Step 403 Send, to the first user, a Uniform Resource Locator URL corresponding to the shared file.
- the cloud server sends the URL corresponding to the shared file to the first user through a secure channel.
- Step 404 Receive a request sent by the trust center to obtain a shared file and a file description corresponding to the URL;
- Step 405 Send a response including the shared file and file description to the trust center; so that the trust center decrypts the file description by using a private key corresponding to the public key, obtains a user key, and uses the Decoding the shared file by the user key to obtain the original file; and the trust center encrypts the original file by using a temporary key to obtain a temporary file;
- the cloud server, the file description and the shared file are sent to the trust center, and the trust center decrypts the file description according to the private key corresponding to the public key, obtains the user key, and then uses the user key pair to share
- the file is decrypted to obtain the original shared file, and after the original shared file of the first user is obtained, the original shared file is re-encrypted to obtain a temporary file.
- Step 406 Receive a temporary file sent by the trust center;
- Step 407 Send the temporary URL corresponding to the temporary file to the trust center; so that the trust center sends the temporary key and the temporary URL to the second user;
- the trust center uploads the re-encrypted temporary file to the cloud server, and obtains a temporary URL corresponding to the temporary file sent by the cloud server, and then the trust center sends the temporary key and the temporary URL to the second user.
- Step 408 Receive a request sent by the second user to obtain a temporary file corresponding to the temporary URL;
- Step 409 Send a response including the temporary file to the second user, so that the second user decrypts the temporary file according to the temporary key to obtain an original shared file.
- FIG. 5 is a flowchart of a method for data sharing according to an embodiment of the present invention. The method includes:
- Step 501 Receive a key sent by the trust center, and an authentication certificate
- the first user receives the key sent by the trust center through the secure channel and the authentication certificate for authenticating the user.
- Step 502 Encrypt the shared file to be uploaded by using the key, to obtain the encrypted first shared file
- step 503 After the first user uses the key to encrypt the shared file to be uploaded, and obtains the encrypted first shared file, step 503 is performed;
- Step 503 Send the first shared file to the cloud server, so that the cloud server uses the first shared file as the source file of the first user;
- Step 504 Encrypt the shared file by using a temporary key to obtain an encrypted second shared file.
- Step 505 Send the second shared file to the cloud server, so that the cloud server uses the second shared file as the temporary file of the first user;
- Step 506 Receive a uniform resource locator URL corresponding to the second shared file sent by the cloud server;
- Step 507 After confirming that the second user is a legitimate user by using the authentication certificate, sending the URL and the temporary key to the second user, so that the second user requests the second corresponding to the URL. Sharing the file, and decrypting the second shared file by using the temporary key to obtain an original shared file of the first user.
- FIG. 6 is still another flowchart of a method for data sharing according to an embodiment of the present invention, where the method includes:
- Step 601 Receive a first shared file sent by the first user, where the first shared file is a file encrypted by using a key delivered by the trust center; and the first shared file is used as a source of the first user.
- Step 602 Receive a second shared file sent by the first user, where the second shared file is a file encrypted by using a temporary key, and use the second shared file as a temporary of the first user.
- Step 603 storing the first shared file and the second shared file
- the cloud server may store the first shared file and the second shared file in a URL, or may be stored in a different URL, which is not limited in this embodiment.
- Step 604 Send, to the first user, a Uniform Resource Locator URL corresponding to the second shared file.
- Step 605 Receive a request for the second user to obtain a second shared file corresponding to the URL, where the second user is a user that is authenticated by the first user, and receives the first user.
- Step 606 Send the second shared file to the second user, so that the second user decrypts the second shared file according to the temporary key, to obtain an original shared file of the first user.
- the embodiment of the present invention further provides a device for data sharing, and a schematic structural diagram thereof is shown in FIG. 7.
- the device includes: a first receiving unit 71, an obtaining unit 72, and a first decryption.
- the unit 73 and the first sending unit 74, the first receiving unit 71 is configured to receive, by the second user, a user key of the shared file of the first user by using the uniform resource locator URL, where the second user Authorizing the first user to access the shared file of the shared file through the trust center;
- the shared file is a shared file encrypted by using the user key of the first user;
- the obtaining unit 72 is configured to use the URL according to the URL Obtaining, from the cloud server, a file description of the corresponding shared file; wherein the file is described as a file description after the user key is encrypted by using a public key of the trust center;
- the first decrypting unit 73 is configured to utilize The private key corresponding to the public key decrypts the file description to obtain a user key of the first user;
- the first sending unit 74 The shared file of the user key is transmitted to the second user, the second user so that the user using the acquired decryption key to obtain the original user's first shared document.
- the obtaining unit may be further configured to: acquire the file description corresponding to the URL, and obtain the shared file corresponding to the URL, while acquiring the file description of the shared file from the cloud server according to the URL;
- the device may further include: a second decryption unit, an encryption unit, a second transmission unit, and a second receiving unit, where [183]
- the second decrypting unit is configured to decrypt the obtained shared file by using a user key obtained by the first decrypting unit, to obtain an original shared file of the first user, and the encrypting unit is configured to utilize the temporary Encrypting the original shared file of the first user to obtain a temporary file
- the second sending unit is configured to upload the temporary file to the cloud server
- the second receiving unit is configured to receive the a temporary URL corresponding to the temporary file that is sent by the cloud server;
- the first sending unit is further configured to send the temporary URL and the temporary key to the second user, so as to facilitate the second user Decrypting the obtained temporary file by using the temporary key to obtain an original shared
- the device may be integrated in the trust center or deployed independently. This embodiment is not limited.
- FIG. 8 is another schematic structural diagram of an apparatus for data sharing according to an embodiment of the present invention.
- the apparatus includes: an encryption unit 81, a first sending unit 82, a first receiving unit 83, and an authorization.
- Unit 84 and second transmitting unit 85 wherein
- the encryption unit 81 is configured to encrypt a file to be uploaded to the cloud server by using a user key, obtain an encrypted shared file, and encrypt the user key by using a public key of the trust center, and encrypt the file.
- the user ID is used as a file description;
- the first sending unit 82 is configured to upload the encrypted shared file and file description to the cloud server;
- the first receiving unit 83 is configured to receive the a uniform resource locator URL corresponding to the shared file sent by the cloud server;
- the authorization unit 84 is configured to authorize the second user to access the URL of the shared file by using the trust center;
- the second sending unit 85 is configured to: Sending the URL to the second user; so that the second user acquires the shared file and the user key according to the URL; and decrypts the shared file by using the user key, to obtain a The original shared file of a user.
- the device can be integrated in a user terminal.
- FIG. 9 is still another schematic structural diagram of an apparatus for data sharing according to an embodiment of the present invention.
- the apparatus includes: a first receiving unit 91, a storage unit 92, and a first sending unit 93. a receiving unit 94, a second transmitting unit 95, a third receiving unit 96 and a third transmitting unit 97, wherein
- the first receiving unit 91 is configured to receive a shared file sent by the first user and a corresponding file description, where the shared file is a shared file encrypted by using a user key of the first user; The file is described as a file description after the user key is encrypted by using the public key of the trust center; the storage unit 92 is configured to store the shared file and the pair
- the first sending unit 93 is configured to send, to the first user, a Uniform Resource Locator URL corresponding to the shared file
- the second receiving unit 94 is configured to receive the sending by the Trust Center.
- the second sending unit 95 is configured to send a response including the file description to the trust center, so that the trust center uses a private key corresponding to the public key Decrypting the file description, obtaining a user key, and the trust center transmitting the user key to the second user;
- the third receiving unit 96 configured to receive, by the second user, the request to share the URL
- the second user is a user who is authorized to access the shared file by the first user through the trust center;
- the third sending unit 97 is configured to send the shared file corresponding to the URL to the second user, so as to facilitate The second user decrypts the shared file according to the received user key, and obtains the original shared file of the first user.
- the device may be integrated in the cloud server, or may be deployed independently. This embodiment is not limited.
- FIG. 10 is another schematic structural diagram of an apparatus for data sharing according to an embodiment of the present invention.
- the apparatus includes: a first receiving unit 11, a first storage unit 12, and a first sending unit 13. a second receiving unit 14, a second transmitting unit 15, a third receiving unit 16, a second storing unit 17, a third transmitting unit 18, a fourth receiving unit 19, and a fourth transmitting unit 120, wherein
- the first receiving unit 11 is configured to receive a shared file sent by the first user and a corresponding file description, where the shared file is a shared file encrypted by using a user key of the first user;
- the file is described as a file description after the user key is encrypted by using the public key of the trust center;
- the first storage unit 12 is configured to store the shared file and the corresponding file description;
- the first sending unit 13 is configured to The first user sends a uniform resource locator URL corresponding to the shared file and the file description;
- the second receiving unit 14 is configured to receive a request sent by the trust center to obtain a shared file and a file description corresponding to the URL.
- the second sending unit 15 is configured to send a response including the shared file and the file description to the trust center, so that the trust center decrypts the file description by using a private key corresponding to the public key, to obtain a user secret. Key, and decrypting the shared file by using the user key to obtain an original file; and the trust center encrypting the original file by using a temporary key
- the third receiving unit 16 is configured to receive the temporary file sent by the trust center, the second storage unit 17 is configured to store the temporary file, and the third sending unit 18 is configured to receive the temporary file.
- the fourth receiving unit 19 is configured to send the temporary URL corresponding to the temporary file to be sent to the trust center, so that the trust center sends the temporary key and the temporary URL to the second user; a request for acquiring a temporary file corresponding to the temporary URL sent by the second user; the fourth sending unit 120, sending a response including the temporary file to the second user, so that the second user is configured according to the second user
- the temporary key decrypts the temporary file to obtain the original shared file.
- the device may be integrated in the cloud server, or may be deployed independently. This embodiment is not limited.
- FIG. 11 is a schematic diagram of still another structure of an apparatus for data sharing according to an embodiment of the present invention.
- the apparatus includes: a first receiving unit 111, a first encrypting unit 112, and a first sending unit 113. a second encryption unit 114, a second transmission unit 115, a second reception unit 116, and a third transmission unit 117, where
- the first receiving unit 111 is configured to receive a key sent by the trust center, and an authentication certificate.
- the first encryption unit 112 is configured to encrypt the shared file to be uploaded by using the key. Obtaining the encrypted first shared file; the first sending unit 113, configured to send the first shared file to the cloud server, so that the cloud server uses the first shared file as the first user
- the second encryption unit 114 is configured to encrypt the shared file by using a temporary key to obtain an encrypted second shared file, and the second sending unit 115 is configured to use the second shared unit
- the file is sent to the cloud server, so that the cloud server uses the second shared file as the temporary file of the first user, and the second receiving unit 116 is configured to receive the second shared file that is sent by the cloud server.
- the third sending unit 117 is configured to: after confirming that the second user is a legitimate user by using the authentication certificate, The temporary URL and the temporary key are sent to the second user; the second user is requested to request the second shared file corresponding to the temporary URL, and the second shared file is decrypted by using the temporary key to obtain the first The original shared file of a user.
- the device can be integrated in a user terminal.
- FIG. 12 is still another schematic structural diagram of an apparatus for data sharing according to an embodiment of the present invention.
- the apparatus includes: a first receiving unit 121, a second receiving unit 122, and a storage unit 123. a transmitting unit 124, a third receiving unit 125 and a second transmitting unit 126, wherein
- the first receiving unit 121 is configured to receive a first shared file sent by the first user, where the first shared file is a file encrypted by using a key delivered by the trust center; and the first share is The file is a source file of the first user; the second receiving unit 122 is configured to receive a second shared file sent by the first user, where the second shared file is a file encrypted by using a temporary key; The second shared file is used as the temporary file of the first user; the storage unit 123 is configured to store the first shared file and the second shared file respectively; the first sending unit 124 is configured to The user sends a temporary uniform resource locator URL corresponding to the second shared file, and the third receiving unit 125 is configured to receive a second total corresponding to the temporary URL sent by the second user.
- the second user is the user that is authenticated by the first user; and receiving the temporary key and the temporary URL sent by the first user; the second sending unit 126 is configured to: Sending the second shared file to the second user, so that the second user decrypts the second shared file according to the temporary key, to obtain an original shared file of the first user.
- the device may be integrated on the cloud server, or may be deployed independently. This embodiment is not limited.
- FIG. 13 is a first application example of a method for data sharing according to an embodiment of the present invention.
- the embodiment is applied to implement user data sharing in a cloud environment, and the method includes:
- Step 1301 User A encrypts the shared file to be uploaded to the cloud server using his own user key keyl, and encrypts the user key keyl as a file description using the public key of the trust center.
- the user A uses the public key of the trust center, which is obtained by querying the trust center by a third party institution.
- Step 1302 User A uploads the encrypted shared file and file description to the cloud server.
- Step 1303 The cloud server returns the Uniform Resource Locator URL corresponding to the uploaded shared file to User A.
- Step 1304 User A authorizes User B through the Trust Center to access the URL of the shared file.
- Step 1305 User A sends the URL of the shared file returned by the cloud server to user B.
- Step 1306 The trust center authenticates the user B, and after the authentication is passed, step 1307 is performed.
- the trust center verifies whether user B is a legitimate user, that is, authenticates the identity of user B.
- Step 1307 User B requests the user key of the shared file (ie, keyl) from the trust center through the URL. That is, user B requests the trust center to correspond to the user key of the shared file.
- Step 1308 The trust center requests the corresponding description of the file from the cloud server according to the URL in the request of the user B.
- Step 1309 The cloud server returns a file description corresponding to the URL to the trust center.
- Step 1310 The trust center decrypts the file description by using the private key corresponding to the public key (ie, the private key corresponding to the public key of the trust center used by the user A), and obtains the user key key1 of the user A.
- Step 1311 The trust center sends the user key key1 of the user A to the user B.
- the security channel between the trust center and the user B may be used, or the other channel may be used. limit.
- Step 1312 User B requests the cloud server for the shared file corresponding to the URL.
- Step 1313 The cloud server returns the shared file corresponding to the URL to the user B.
- Step 1314 The user B decrypts the received shared file by using the received user key key1 of the user A to obtain the original shared file of the user A.
- the user data is encrypted before being uploaded to the cloud server, and the user authorized by the trust center can access the data uploaded to the cloud server, thereby solving the security problem of the shared cloud file. Increased user confidence in cloud security and made it easy for users to share data stored in the cloud.
- FIG. 14 is a second application example of a method for data sharing according to an embodiment of the present invention.
- the embodiment is applied to implement user data sharing in a cloud environment, and the method includes:
- Step 1401 User A encrypts the shared file to be uploaded to the cloud server using his own user key keyl, and encrypts the user key keyl as a file description using the public key of the trust center.
- Step 1402 User A uploads the encrypted shared file and file description to the cloud server.
- Step 1403 The cloud server returns the URL corresponding to the uploaded shared file to the user A.
- this embodiment is defined as URL1.
- Step 1404 User A authorizes User B through the Trust Center to access URL1 of the shared file.
- Step 1405 User A sends URL1 of the shared file to User B.
- Step 1406 The trust center authenticates the user B, and after the authentication is passed, step 1407 is performed;
- Step 1407 User B requests the user key of the shared file (ie, keyD o) from the trust center through the URL1.
- Step 1408 The trust center requests the cloud server for the shared file and file description uploaded by the user A according to the URL1 in the user B request.
- Step 1409 The cloud server returns the shared file and file description uploaded by the user A to the trust center.
- Step 1410 The trust center decrypts the file description by using the private key corresponding to the public key, obtains the user key key1 of the user A, and decrypts the shared file by using the key1 to obtain the original shared file of the user A. ;
- Step 1411 The trust center encrypts the original shared file using the temporary key key2 to obtain the temporary file file2.
- Step 1412 The trust center uploads the temporary file file2 to the cloud server.
- Step 1413 The cloud server returns a temporary URL corresponding to the temporary file file2 to the trust center. For convenience of description, this embodiment defines URL2.
- Step 1414 The trust center sends the URL2 and the temporary key key2 to the user B through the secure channel.
- Step 1415 User B requests the cloud server for the temporary file file2 corresponding to the URL2.
- Step 1416 The cloud server returns the temporary file file2 corresponding to the URL2 to the user B.
- Step 1417 User B receives the temporary file file2, and decrypts the received temporary file file2 using the temporary key key2 returned by the trust center to obtain the original shared file of User A.
- the user data is encrypted before being uploaded to the cloud server, and after the original shared file is obtained in the trust center, the original shared file is re-encrypted and re-encrypted.
- the shared file is uploaded to the cloud server, so that the authorized user can access the data uploaded to the cloud server, and the security problem of the shared cloud file is solved. Increased user confidence in cloud security and made it easy for users to share data stored in the cloud.
- FIG. 15 is a third application example of a data sharing method according to an embodiment of the present invention.
- the embodiment is applied to implement user data sharing in a cloud environment, and the method includes:
- Step 1501 The Trust Center distributes the key keyl to User A.
- Step 1502 User A encrypts the file to be uploaded to the cloud server by using the key key1, and obtains the encrypted file filel.
- Step 1503 User A uploads the encrypted file filel to the cloud server.
- Step 1504 The cloud server stores the received file filel, and uses the file filel as the source file of user A.
- Step 1505 User A randomly selects the temporary key key2, and encrypts the file using the temporary key key2 to obtain the file file2.
- step 1504 and step 1505 are performed in time, or simultaneously.
- Step 1506 User A uploads the encrypted file f ile2 to the cloud server.
- Step 1507 The cloud server stores the received file file2, and uses the file f ile2 as the temporary file of user A, which is called the temporary file file2.
- Step 1508 The cloud server sends the temporary URL corresponding to the temporary file f ile2 to the user A;
- Step 1509 User A authenticates (authenticates) user B through the authentication certificate issued by the trust center, and after confirming that the other party is a legitimate user, step 1510 is performed;
- step 1508 and the step 1509 are not sequential in time, and may be performed simultaneously. This embodiment is not limited.
- Step 1510 User A sends the temporary URL and temporary key key2 to User B.
- Step 1511 User B requests the cloud server for the temporary file corresponding to the temporary URL, f ile2.
- Step 1512 The cloud server returns the temporary file file2 corresponding to the temporary URL to the user B.
- Step 1513 User B receives the temporary file file2, and decrypts the temporary file file2 using the temporary key key2 to obtain the original shared file of User A.
- the user receives the key of the trust center in advance, encrypts the file to be shared by using the key, obtains filel, and uploads the filel to the cloud server, and the cloud server uses the file as the The user's source file. After that, the user encrypts the file to be shared with the temporary key, obtains file2, and uploads the fil2 to the cloud server.
- the cloud server will use the file2 as a temporary file, and the temporary file will be used.
- the file solves the security problem of sharing cloud files, and also facilitates authorized users to share data stored on the cloud server.
- the embodiment of the present invention further provides a trust center, where the trust center includes: a transceiver and a processor, where [267]
- the transceiver is configured to receive, by the second user, a user key of the shared file of the first user by using a uniform resource locator URL, where the second user is authorized to access the first user through the trust center.
- a shared file of the shared file is a shared file encrypted by using the user key; and a file description of obtaining the corresponding shared file from the cloud server according to the URL; wherein the file Described as a file description after encrypting the user key by using a public key of the trust center;
- the processor decrypts the file description by using a private key corresponding to the public key of the trust center, to obtain the user key of the first user;
- the transceiver is further configured to send the user key to the second user.
- the transceiver obtains the file description of the shared file from the cloud server according to the URL, and further includes: acquiring and Said shared file corresponding to the URL;
- the processor is further configured to: decrypt the acquired shared file by using the user key to obtain an original shared file of the first user; and encrypt the original shared file by using a temporary key to obtain a temporary Document
- the transceiver is further configured to upload the temporary file to the cloud server, and obtain a temporary URL corresponding to the temporary file delivered by the cloud server;
- the transceiver sends the user key to the second user, specifically: sending the temporary URL and the temporary key to the second user.
- the embodiment of the present invention further provides a user terminal, including: a transceiver and a processor, where
- the processor is configured to encrypt, by using a user key, a file to be uploaded to the cloud server, obtain an encrypted shared file, and encrypt the user key by using a public key of the trust center, and The encrypted user key is described as a file;
- the transceiver is configured to upload the encrypted shared file and file description to the cloud server, and receive a uniform resource locator URL corresponding to the shared file sent by the cloud server;
- the processor is configured to authorize a second user to access the shared file by using the trust center;
- the transceiver is further configured to send the URL to the second user; to facilitate the second user according to the Deriving the URL to obtain the user key; and decrypting the shared file with the user key.
- the embodiment of the present invention further provides a cloud server, including: a transceiver and a memory, where
- the transceiver is configured to receive a shared file and a corresponding file description sent by the first user, where the shared file is a shared file encrypted by using a user key of the first user; The file description after encrypting the user key by using the public key of the trust center;
- the memory is configured to store the shared file and a corresponding file description
- the transceiver is further configured to send, to the first user, a Uniform Resource Locator URL corresponding to the shared file, and receive a request sent by the Trust Center to obtain a file description corresponding to the URL;
- the trust center sends a response including the file description; so that the trust center decrypts the file description by using a private key corresponding to the public key, obtains the user key, and the trust center uses the user key Sending to the second user; receiving, by the second user, the shared file corresponding to the URL; the second user is the user who is authorized by the trust center to access the shared file;
- the user sends the shared file corresponding to the URL, so that the second user decrypts the shared file according to the received user key.
- the embodiment of the present invention further provides a cloud server, including: a transceiver and a memory, where
- the transceiver is configured to receive a shared file and a corresponding file description sent by the first user, where the shared file is a shared file encrypted by using a user key of the first user; The file description after encrypting the user key by using the public key of the trust center;
- the memory is configured to store the shared file and a corresponding file description
- the transceiver is further configured to send, to the first user, a uniform resource locator URL corresponding to the shared file and a corresponding file description, and receive a shared file sent by the trust center and obtain the shared file corresponding to the URL. a request for describing the file; sending a response including the shared file and the file description to the trust center; so that the trust center decrypts the file description by using a private key corresponding to the public key, to obtain the user key, And decrypting the shared file by using the user key, and re-encrypting with a temporary key to obtain a temporary file; receiving a temporary file sent by the trust center; [290] the memory is further configured to store the temporary file;
- the server is further configured to send a temporary URL corresponding to the temporary file to the trust center, so that the trust center sends the temporary key and the temporary URL to the second user; Transmitting, by the second user, a request for acquiring a temporary file corresponding to the temporary URL; transmitting, to the second user, a response including the temporary file, so that the second user decrypts the temporary according to the temporary key file.
- the present invention can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases the former is more Good implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product, which may be stored in a storage medium such as a ROM/RAM, a disk. , an optical disk, etc., includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention or portions of the embodiments.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
一种方法包括:接收第二用户通过统一资源定位符URL请求第一用户的共享文件的用户密钥,其中,所述第二用户为所述第一用户通过信任中心授权访问所述共享文件的合法用户;所述共享文件为利用第一用户的用户密钥加密后的共享文件;根据所述URL从云端服务器中获取对应的所述共享文件的文件描述;其中,所述文件描述为利用信任中心的公钥加密用户密钥后的文件描述;利用信任中心的所述公钥对应的私钥解密所述文件描述,得到第一用户的用户密钥;将所述用户密钥发送给所述第二用户。
Description
一种数据共享的方法及装置
[01] 本申请要求于 2013年 1月 30日提交中国专利局、 申请号为 201310035962. 6、 发明名称为 "一种数据共享的方法及装置"的中国专利申请的优先权, 其全部内容通过 引用结合在本申请中。 技术领域
[02] 本发明涉及网络技术领域, 特别涉及一种数据共享的方法及装置。 背景技术
[03] 随着网络技术的发展, 越来越多的企业和个人愿意将自己的数据上传到云端来降低 存储成本。 云服务提供商 (或云端服务器)会方便地替用户处理很多事情, 例如, 数据 共享、 数据备份等等。 在对数据共享和数据备份的同时, 安全问题是用户最关注的一个 问题, 也是目前云服务提供商面临的最大挑战。 如果用户不信任云服务提供商, 数据在 上传到云端之前将被加密。 因此, 云环境下, 如何将云端服务器上的数据安全共享给其 他用户, 将是目前要解决的问题。
[04] 现有技术中, 如果用户想共享上传到云端服务提供商的服务器上的数据, 需要在不 同的服务提供商的服务器中设置数据的共享权限, 允许其他用户访问。 并且, 在其他用 户要想取得共享数据时, 需要登录到不同的服务提供商的服务器上, 依次通过不同的服 务提供商的服务器设置的权限, 才能获取到用户共享的数据。
[05] 在对现有技术的研究和实践过程中可知, 用户不能灵活的共享云端服务器上的数 据, 只有通过登录不同服务提供商的服务器提供的服务站点, 才能获得相应的服务提供 商在云端服务器上存储的共享数据, 因此, 由于用户需要依次登录到相应的服务站点, 才能访问到共享数据, 从而导致不能安全方便的访问共享数据。
发明内容
[06] 本发明实施例中提供了一种数据共享的方法及装置, 以解决现有技术中用户不能安 全方便的访问云端服务器上的数据的技术问题。
[07] 为了解决上述技术问题, 本发明实施例公开了如下技术方案:
[08】 第一方面提供了一种数据共享的方法, 包括:
[09] 接收第二用户通过统一资源定位符 URL请求第一用户的共享文件的用户密钥,其中, 所述第二用户为所述第一用户通过信任中心授权访问所述共享文件的合法用户; 所述共 享文件为利用所述用户密钥加密后的共享文件;
[10] 根据所述 URL从云端服务器中获取对应的所述共享文件的文件描述; 其中, 所述文 件描述为利用所述信任中心的公钥加密所述用户密钥后的文件描述;
[11] 利用所述信任中心的所述公钥对应的私钥解密所述文件描述, 得到所述第一用户的 所述用户密钥;
[12] 将所述用户密钥发送给所述第二用户。
[13] 在第一方面的第一种可能的实现方式中,所述根据所述 URL从云端服务器中获取所 述共享文件的文件描述, 还包括:
[14] 获取与所述 URL对应的所述共享文件;
[15] 利用所述用户密钥解密获取的所述共享文件, 得到所述第一用户的原共享文件; [16] 利用临时密钥加密所述原共享文件, 得到临时文件;
[17] 将所述临时文件上传到所述云端服务器中, 并获得所述云端服务器下发的与所述临 时文件对应的临时 URL;
[18] 所述将用户密钥发送给所述第二用户, 具体包括: [19] 将所述临时 URL及临时密钥发送给所述第二用户。 [20] 第二方面提供了一种数据共享的方法, 所述方法包括-
[21] 利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密后的共享文件, 并 使用信任中心的公钥对所述用户密钥进行加密, 并将加密后的用户密钥作为文件描述;
[22] 将加密后的所述共享文件和文件描述上传到所述云端服务器;
[23] 接收所述云端服务器发送的所述共享文件对应的统一资源定位符 URL;
[24】 通过所述信任中心授权第二用户访问所述共享文件;
[25] 将所述 URL发送给所述第二用户; 以便于所述第二用户根据所述 URL获取所述用户 密钥; 并利用所述用户密钥解密所述共享文件。
[26] 在第二方面的第一种可能的实现方式中,
[27] 所述第二用户根据所述 URL获取所述共享文件以及所述用户密钥; 并利用所述用户 密钥解密所述共享文件, 具体包括-
[28] 所述第二用户根据所述 URL从所述信任中心获取所述共享文件的所述用户密钥, 以 及从所述云端服务器获取所述共享文件, 并利用所述用户密钥解密所述共享文件。
[29] 结合第二方面或第二方面第一种可能的实现方式, 在第二种可能的实现方式中,
[30] 所述第二用户根据所述 URL获取所述共享文件以及所述用户密钥; 并利用所述用户 密钥解密所述共享文件, 具体包括:
[31] 所述第二用户向所述信任中心请求所述 URL对应的所述共享文件的所述用户密钥;
[32] 接收所述信任中心响应所述请求发送的临时 URL和临时密钥; 其中, 所述临时密钥 是信任中心对获得的所述共享文件解密后进行重新加密的密钥, 所述临时 URL是云端服 务器返回临时文件对应的 URL, 其中, 所述临时文件为所述信任中心利用所述临时密钥 对获得所述共享文件解密后重新加密后的文件;
[33] 向云端服务器获取所述临时 URL对应的临时文件;
[34] 利用所述临时密钥对所述临时文件进行解密。
[35] 第三方面提供了一种数据共享的方法, 所述方法包括-
[36] 接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件为利用第一 用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加密用户密钥 后的文件描述;
[37] 存储所述共享文件及对应的文件描述;
[38] 向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;
[39] 接收信任中心发送的获取所述 URL对应的文件描述的请求;
[40] 向所述信任中心发送包括所述文件描述的响应; 以便于所述信任中心利用所述公钥 对应的私钥解密所述文件描述, 得到所述用户密钥, 以及所述信任中心将所述用户密钥 发送给第二用户;
[41] 接收第二用户发送请求所述 URL对应的共享文件; 所述第二用户为所述第一用户通
过所述信任中心授权访问所述共享文件的用户;
[42] 向所述第二用户发送所述 URL对应的共享文件, 以便于所述第二用户根据接收到的 所述用户密钥解密所述共享文件。
[43] 第四方面提供了一种数据共享的方法, 所述方法包括-
[44] 接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件为利用第一 用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加密用户密钥 后的文件描述;
[45] 存储所述共享文件及对应的文件描述;
[46] 向所述第一用户发送存储所述共享文件和对应的文件描述对应的统一资源定位符 URL;
[47] 接收信任中心发送的获取所述 URL对应的共享文件和文件描述的请求;
[48] 向所述信任中心发送包括所述共享文件和文件描述的响应; 以便于所述信任中心利 用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 并利用所述用户密钥解 密所述共享文件后利用临时密钥重新加密, 得到临时文件;
[49] 接收所述信任中心发送的临时文件; [50] 存储所述临时文件;
[51] 向所述信任中心发送存储所述临时文件对应的临时 URL; 以便于所述信任中心将所 述临时密钥和临时 URL发送给第二用户;
[52] 接收所述第二用户发送的获取所述临时 URL对应的临时文件的请求;
[53] 向所述第二用户发送包括所述临时文件的响应, 以便于所述第二用户根据所述临时 密钥解密所述临时文件。
[54] 第五方面提供了一种数据共享的装置, 包括:
[55] 第一接收单元, 用于接收第二用户通过统一资源定位符 URL请求第一用户的共享文 件的用户密钥, 其中, 所述第二用户为所述第一用户通过信任中心授权访问所述共享文 件的合法用户; 所述共享文件为利用所述第一用户的用户密钥加密后的共享文件;
[56] 获取单元,用于根据所述 URL从云端服务器中获取对应的所述共享文件的文件描述;
其中, 所述文件描述为利用所述信任中心的公钥加密所述用户密钥后的文件描述;
[57] 第一解密单元, 用于利用所述信任中心的所述公钥对应的私钥解密所述文件描述, 得到所述第一用户的用户密钥;
[58] 第一发送单元, 用于将所述用户密钥发送给所述第二用户。 [59] 在第五方面的第一种可能的实现方式中,
[60] 所述获取单元还用于:在根据所述 URL从云端服务器中获取所述共享文件的文件描 述时, 还获取与所述 URL对应的所述共享文件; 所述装置还包括:
[61] 第二解密单元, 用于利用所述第一解密单元得到的所述用户密钥解密获取的所述共 享文件, 得到第一用户的原共享文件;
[62] 加密单元, 用于利用临时密钥加密所述原共享文件, 得到临时文件;
[63] 第二发送单元, 用于将所述临时文件上传到所述云端服务器中;
[64] 第二接收单元, 用于所述云端服务器下发的与所述临时文件对应的临时 URL;
[65] 所述第一发送单元, 还用于将所述临时 URL及临时密钥发送给所述第二用户。
[66] 第六方面提供了一种数据共享的装置, 包括-
[67] 加密单元, 用于利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密后 的共享文件, 并使用信任中心的公钥对所述用户密钥进行加密, 并将加密后的用户密钥 作为文件描述;
[68] 第一发送单元, 用于将加密后的所述共享文件和文件描述上传到所述云端服务器;
[69] 第一接收单元, 用于接收所述云端服务器发送的所述共享文件对应的统一资源定位 符 URL;
[70] 授权单元, 用于通过所述信任中心授权第二用户访问所述共享文件;
[71] 第二发送单元, 用于将所述 URL发送给所述第二用户; 以便于所述第二用户根据所 述 URL获取所述共享文件以及所述用户密钥; 并利用所述用户密钥解密所述共享文件。
[72] 第七方面提供了一种数据共享的装置, 包括:
[73] 第一接收单元, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述 共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心 的公钥加密用户密钥后的文件描述;
[74] 存储单元, 用于存储所述共享文件及对应的文件描述;
[75] 第一发送单元, 用于向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;
[76] 第二接收单元, 用于接收信任中心发送的获取所述 URL对应的文件描述的请求;
[77] 第二发送单元, 用于向所述信任中心发送包括所述文件描述的响应; 以便于所述信 任中心利用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 以及所述信任 中心将所述用户密钥发送给第二用户;
[78] 第三接收单元, 用于接收第二用户发送请求所述 URL对应的共享文件; 所述第二用 户为所述第一用户通过所述信任中心授权访问所述共享文件的用户;
[79] 第三发送单元, 用于向所述第二用户发送所述 URL对应的共享文件, 以便于所述第 二用户根据接收到的所述用户密钥解密所述共享文件。
[80] 第八方面提供了一种数据共享的装置, 包括-
[81] 第一接收单元, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述 共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心 的公钥加密用户密钥后的文件描述;
[82] 第一存储单元, 用于存储所述共享文件及对应的文件描述;
[83] 第一发送单元, 用于向所述第一用户发送存储所述共享文件和文件描述对应的统一 资源定位符 URL;
[84] 第二接收单元, 用于接收信任中心发送的获取所述 URL对应的共享文件和文件描述 的请求;
[85] 第二发送单元, 用于向所述信任中心发送包括所述共享文件和文件描述的响应; 以 便于所述信任中心利用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 并 利用所述用户密钥解密所述共享文件后利用临时密钥重新加密, 得到临时文件;
[86] 第三接收单元, 用于接收所述信任中心发送的临时文件;
[87】 第二存储单元, 用于存储所述临时文件;
[88] 第三发送单元, 用于向所述信任中心发送存储所述临时文件对应的临时 URL; 以便 于所述信任中心将所述临时密钥和临时 URL发送给第二用户;
[89] 第四接收单元, 用于接收所述第二用户发送的获取所述临时 URL对应的临时文件的 请求;
[90] 第四发送单元, 用于向所述第二用户发送包括所述临时文件的响应, 以便于所述第 二用户根据所述临时密钥解密所述临时文件。
[91] 由上述技方案可知, 本发明实施例中, 通过对用户数据(即共享文件)在上传到云 端服务器之前进行加密, 并且, 通过信任中心对第一用户授权其他用户访问上传到云端 的用户数据进行鉴权, 解决了共享云端服务器上的共享文件的安全问题, 提升了用户终 端对于云安全的信心, 并且用户可以方便的共享存储在云端服务器的共享数据。 附图说明
[92】 为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附 图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域 普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
[93] 图 1为本发明实施例提供的-一种数据共享的方法的流程图;
[94] 图 2为本发明实施例提供的-一种数据共享的方法的另一流程图;
[95] 图 3为本发明实施例提供的-一种数据共享的方法的又一流程图;
[96] 图 4为本发明实施例提供的-一种数据共享的方法的又一流程图;
[97] 图 5为本发明实施例提供的-一种数据共享的方法的又一流程图;
[98] 图 6为本发明实施例提供的-一种数据共享的方法的又一流程图;
[99] 图 7为本发明实施例提供的-一种数据共享装置的结构示意图;
[100】图 8为本发明实施例提供的-一种数据共享装置的另一结构示意图;
[101】图 9为本发明实施例提供的-一种数据共享装置的又一结构示意图;
[102]图 10为本发明实施例提供的一种数据共享装置的又一结构示意图;
[103】图 11为本发明实施例提供的一种数据共享装置的又一结构示意图;
[104】图 12为本发明实施例提供的一种数据共享装置的又一结构示意图; [105】图 13为本发明实施例提供的一种数据共享的方法的第一应用实例图; [106]图 14为本发明实施例提供的一种数据共享的方法的第二应用实例图; [107】图 15为本发明实施例提供的一种数据共享的方法的第三应用实例图。 具体实施方式
[108】下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚的描述,显 然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。基于本发明中的实 施例, 本领域普通技术人员在没有做出创造性劳动的 H ^下所获得的所有其他实施例, 都属 于本发明保护的范围。
[109】请参阅图 1,图 1为本发明实施例提供的一种 «共享的方法的流程图;在该实施例中, 在用户终端(消费者)和云端服务器(云端服务提供商的服务器)之间引入了信任中心(即 第三方), 在该实施例中, 假定云端服务提供商不可信。其中, 信任中心包瓶书授权中心 (Certificate Authority, CA)和密钥分发中心(Key Distribution Center, KDC), 在该实 施例中, 通常默认用户终端和信任中心之间的通信信道是安全的, 所以用户终端和信任中心 之间的密钥协商 也是安全的。 ¾方¾ ^括:
[110]步骤 101:接收第二用户通过统一资源定位符 URL请求第一用户的共享文件的用户密钥, 其中, 腿第二用户为腿第一用户通过信任中心授权访问纖共享文件的合法用户; m 共享文件为利用所述第一用户的用户密钥加密后的共享文件;
[111】在该步骤中,第一用户先使用自身的用户密钥对要上传的共享文件进行加密,得到加密 后的共享文件, 以及使用信任中心自身的公钥对所述用户密钥进行加密, 并将加密后的用户 密钥作为所述共享文件的文件描述, 然后, 第一用户将所述文件描述和加密后的共享文件上 传到云端服务器上, 收到所述云端服务器反馈的与所述共享文件对应的统一资源定位符 (URL), 之后, 第一用户通过所述信任中心授权第二用户访问加密后所述共享文件的 URL, 并通过信任中心 腿第二用户为合法用户后, 将纖 URL发送给第二用户。
[112]之后,信任中心就接收到腿第二用户请求获取纖 URL对应的共享文件的用户密钥。
[113】步骤 102:根据纖 URL从云端服务器中获取纖共享文件的文件描述; 其中, 纖文 件描述为利用信任中心的公钥加密所述用户密钥后的文件描述;
[114]在该步骤 101的基础上, 信任中心向云端服务器请求获取所述 URL对应的文件描述, 以及接收到所述云端服务器反馈的所述文件描述。
[115】步骤 103: 利用信任中心的所述公钥对应的私钥解密所述文件描述, 得到第一用户的用 户密钥;
[116】在该步骤中, 由于信任中心在接收到腿 URL对应的文件描述后, 利用纖公钥对应 的私钥对所述文件描述进行解密, 得到第一用户的用户密钥。
[117】步骤 104: 将 用户密钥发送给 第二用户, 以便于 第二用户利用 用户密 钥解密获取到的 共享文件, 得到第一用户的原共享文件。
[118】在该步骤中,信任中心可以通过安全通道将腿用户密钥发送给第二用户,第二用户先 根据所述 URL从云端服务器中获取到对应的共享文件, 然后, 再利用所述用户密钥对获取 到的所述共享文件进行解密, 得到第一用户的原共享文件。
[119】本发明实施例中, 通过对用户数据(即共享文件)在上传到云端服务器之前进行加密, 并且, 通过信任中心对第一用户授权其他用户访问上传到云端的用户数据进行鉴权, 解决了 共享云端服务器上的共享文件的安全问题, 提升了用户终端对于云安全的信心, 并且用户可 以方便的共辩储在云端服务器的共享数据。
[120】可选的, 在另一实施例中, 该实施例在上述实施例的基础上,还可以包括: 信任中心在 根据所述 URL从云端服务器中获取所述共享文件的文件描述的同时, 还获取与所述 URL对应 的所述共享文件; 然后, 利用所述用户密钥对获取到的所述共享文件进行解密, 得到第一用 户的原共享文件; 之后, 利用临时密钥加密所述第一用户的原共享文件, 得到临时文件; 以 及将所述临时文件存储到所述云端服务器中, 并获得所述云端服务器下发的与临时文件对应 的临时 URL;
[121]所述将用户密钥发送给所述第二用户,以便于所述第二用户利用所述用户密钥解密获取 到的所述共享文件, 得到第一用户的原共享文件具体为: 将所述临时 URL及临时密钥发 送给所述第二用户,以便于所述第二用户利用所述临时密钥解密获取到的所述临时文件, 得到第一用户的原共享文件。
[122】也就是说,该实施例中,信任中心在获取到其他用户访问的共享文件和文件描述后, 利用所述公钥对应的私钥对文件描述进行解密, 得到对应的用户密钥, 然后利用用户密 钥对所述共享文件进行解密, 得到原共享文件, 然后, 对所述原共享文件进行重新加密, 以及将重新加密后的共享文件 (即临时文件) 重新上传到云端服务器, 并得到云端服务 器下发对应的临时 URL, 然后, 将其临时 URL和临时密钥发送给第二用户, 以便于第二
用户根据临时 URL获取到对应的临时文件,以及利用临时密钥对所述临时文件进行解密, 得到第一用户的原共享文件。
[123】本发明实施例中, 信任中心对获取的原共享文件重新加密, 并且重新上传到云端服 务器上, 以便于对第一用户授权其他用户访问上传到云端的用户数据进行鉴权, 解决了 共享云端服务器上的共享文件的安全问题, 同时也方便用户共享存储在云端服务器的共 享数据。
[124】还请参阅图 2, 为本发明实施例提供的一种数据共享的方法的另一流程, 所述方法 包括:
[125】步骤 201 : 利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密后的共 享文件, 并使用信任中心的公钥对用户密钥进行加密, 并将加密后的用户密钥作为文件 描述;
[126】在该步骤中, 上传共享文件的用户 (即第一用户)在上传共享文件前, 先利用自身 的密钥 (即用户密钥) 对共享文件进行加密, 之后, 利用信任中心的自身公钥对用户密 钥进行加密, 并将加密后的用户密钥作为该共享文件的文件描述。
[127】步骤 202: 将所述共享文件和文件描述上传到所述云端服务器上;
[128】在该步骤中, 第一用户通过安全通道将加密后的共享文件和文件描述上传云端服务 器上, 通常情况, 默认用户和云端服务器之间是安全的。
[129】步骤 203: 接收所述云端服务器发送的所述共享文件对应的统一资源定位符 URL, 即 URL1 ;
[130】在该步骤中, 第一用户通过安全通道接收所述云端服务器发送的与所述共享文件对 应的 URL (即 URL1 )。
[131】步骤 204: 通过信任中心授权第二用户访问所述共享文件的 URL;
[132】第一用户通过信任中心先要对授权的第二用户的身份进行鉴权, 即判断第二用户是 否为合法用户, 如果第二用户为合法用户, 才会执行步骤 205;
[133】步骤 205: 将所述 URL发送给所述第二用户; 以便于所述第二用户根据所述 URL获 取所述共享文件以及所述用户密钥; 并利用所述用户密钥解密所述共享文件, 得到第一 用户的原共享文件。
[134】在该步骤中, 第二用户得到第一用户的原共享文件的过程主要包括两种情况-
[135】一种情况是, 所述第二用户根据所述 URL从所述信任中心获取所述共享文件的用户 密钥, 以及从云端服务器获取所述共享文件, 并利用所述用户密钥解密所述共享文件, 得到第一用户的原共享文件。
[136】另一种情况是, 所述第二用户向信任中心请求所述 URL对应的所述共享文件的用户 密钥;所述第二用户接收所述信任中心响应所述请求发送的临时 URL和临时密钥;其中, 所述临时密钥是信任中心对获得的所述共享文件的原文件进行重新加密的密钥, 所述临 时 URL是云端服务器返回临时文件对应的 URL, 其中, 所述临时文件为所述信任中心利 用所述临时密钥对获得所述共享文件的原文件重新加密后的文件; 所述第二用户向云端 服务器获取所述临时 URL对应的临时文件; 并利用所述临时密钥对所述临时文件进行解 密, 得到所述第一用户的原共享文件。
[137】还请参阅图 3, 为本发明实施例提供的一种数据共享的方法的又一流程图, 其特征 在于, 包括:
[138】步骤 301 : 接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件 为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加 密所述用户密钥后的文件描述;
[139】云端服务器(或云端服务提供商的服务器)对接收到用户发送的共享文件及对应的 文件描述进行存储, 以及向用户反馈对应共享文件的统一资源定位符 URL, 即步骤 302。
[140】步骤 302: 存储所述共享文件及对应的文件描述;
[141】步骤 303: 向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;
[142】云端服务器通过安全通道将所述共享文件的 URL发送给对应的第一用户。之后, 第 一用户可以通过信任中心授权第二用户访问所述共享文件的 URL, 在信任中心验证所述 第二用户为合法用户时, 第一用户将所述共享文件的 URL发送给第二用户, 之后, 第二 用户根据 URL向信任中心请求所述共享文件的用户密钥, 所述信任中心根据所述 URL向 云端服务器请求对应的文件描述。
[143】步骤 304: 接收信任中心发送的获取所述 URL对应的文件描述的请求;
[144】云端服务器通过安全信道接收信任中心发送的获取与所述 URL对应的文件描述的请 求。
[145】步骤 305: 向所述信任中心发送包括所述文件描述的响应; 以便于信任中心利用所 述公钥对应的私钥解密所述文件描述, 得到用户密钥, 以及所述信任中心将所述用户密 钥发送给第二用户;
[146】云端服务器通过安全信道向所述信任中心发送所述文件描述。
[147】步骤 306: 接收第二用户发送请求所述 URL对应的共享文件; 所述第二用户为第一 用户通过信任中心授权访问所述共享文件的用户;
[148】步骤 307: 向所述第二用户发送所述 URL对应的共享文件, 以便于所述第二用户根 据接收到的用户密钥解密所述共享文件, 得到第一用户的原共享文件。
[149】还请参阅图 4, 为本发明实施例提供的一种数据共享的方法的又一流程图, 所述方 法包括:
[150】步骤 401 : 接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件 为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加 密用户密钥后的文件描述;
[151】云端服务器通过安全通道接收第一用户发送的共享文件及对应的文件描述。 [152】步骤 402: 存储所述共享文件及对应的文件描述;
[153】步骤 403: 向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;
[154]云端服务器通过安全通道将所述共享文件对应的 URL发送给第一用户。
[155】步骤 404: 接收信任中心发送的获取所述 URL对应的共享文件和文件描述的请求;
[156】步骤 405: 向所述信任中心发送包括所述共享文件和文件描述的响应; 以便于信任 中心利用所述公钥对应的私钥解密所述文件描述, 得到用户密钥, 并利用所述用户密钥 解密所述共享文件, 得到原文件; 以及所述信任中心利用临时密钥对所述原文件进行加 密, 得到临时文件;
[157】也就是说, 云端服务器, 文件描述和共享文件发送给信任中心, 信任中心根据所述 公钥对应的私钥对文件描述进行解密, 得到用户密钥, 然后, 利用用户密钥对共享文件 进行解密, 得到原共享文件, 并且, 在得到所述第一用户的原共享文件后, 重新对该原 共享文件进行加密, 得到临时文件。
[158】步骤 406: 接收所述信任中心发送的临时文件;
[159】步骤 407: 向所述信任中心发送所述临时文件对应的临时 URL; 以便于信任中心将 所述临时密钥和临时 URL发送给第二用户;
[160】其中, 信任中心将重新加密后的临时文件上传到云端服务器上, 得到云端服务器下 发临时文件对应的临时 URL, 之后, 信任中心将所述临时密钥和临时 URL发送给第二用 户。
[161】步骤 408: 接收所述第二用户发送的获取所述临时 URL对应的临时文件的请求;
[162】步骤 409: 向所述第二用户发送包括所述临时文件的响应, 以便于所述第二用户根 据所述临时密钥解密所述临时文件, 得到原共享文件。
[163】还请参阅图 5, 为本发明实施例提供的一种数据共享的方法的又一流程图, 所述方 法包括:
[164】步骤 501 : 接收信任中心发送的密钥, 以及鉴权证书;
[165】第一用户接收到信任中心通过安全通道发送的密钥以及,对用户进行身份认证的鉴 权证书。
[166】步骤 502: 利用所述密钥对将要上传的共享文件进行加密, 得到加密后的第一共享 文件;
[167】第一用户利用密钥对要上传的共享文件进行加密, 得到加密后的第一共享文件之 后, 执行步骤 503;
[168】步骤 503: 将所述第一共享文件发送到云端服务器上; 以便于所述云端服务器将所 述第一共享文件作为第一用户的源文件;
[169】步骤 504: 利用临时密钥对所述共享文件进行加密, 得到加密后的第二共享文件;
[170】步骤 505: 将所述第二共享文件发送到云端服务器上; 以便于所述云端服务器将所 述第二共享文件作为第一用户的临时文件;
[171】步骤 506: 接收云端服务器发送的所述第二共享文件对应的统一资源定位符 URL;
[172】步骤 507: 通过所述鉴权证书确认第二用户为合法用户后, 将所述 URL和临时密钥 发送给第二用户; 以便于所述第二用户请求所述 URL对应的第二共享文件, 并利用所述 临时密钥解密所述第二共享文件, 得到第一用户的原共享文件。
[173】还请参阅图 6, 为本发明实施例提供的一种数据共享的方法的又一流程图, 所述方 法包括:
[174】步骤 601 : 接收第一用户发送的第一共享文件, 所述第一共享文件为利用信任中心 下发的密钥加密的文件; 并将所述第一共享文件作为第一用户的源文件;
[175】步骤 602: 接收所述第一用户发送的第二共享文件, 所述第二共享文件为利用临时 密钥加密的文件; 并将所述第二共享文件作为所述第一用户的临时文件;
[176】步骤 603: 存储第一共享文件和第二共享文件;
[177】在该步骤中, 云端服务器可以将第一共享文件和第二共享文件存储到一个 URL, 也 可以存储在不同的 URL下, 本实施例不作限制。
[178】步骤 604: 向所述第一用户发送存储所述第二共享文件对应的统一资源定位符 URL;
[179】步骤 605: 接收第二用户发送获取所述 URL对应的第二共享文件的请求, 所述第二 用户为所述第一用户经过鉴权认证的用户; 并且接收到所述第一用户发送的临时密钥和 所述 URL;
[180】步骤 606: 向所述第二用户发送所述第二共享文件, 以便于所述第二用户根据所述 临时密钥解密所述第二共享文件, 得到第一用户的原共享文件。
[181】基于上述方法的实现过程, 本发明实施例还提供一种数据共享的装置, 其结构示意 图如图 7所示, 所述装置包括: 第一接收单元 71, 获取单元 72, 第一解密单元 73和第 一发送单元 74, 其中, 所述第一接收单元 71, 用于接收第二用户通过统一资源定位符 URL请求第一用户的共享文件的用户密钥, 其中, 所述第二用户为所述第一用户通过信 任中心授权访问所述共享文件的合法用户; 所述共享文件为利用第一用户的用户密钥加 密后的共享文件; 所述获取单元 72, 用于根据所述 URL从云端服务器中获取对应的所述 共享文件的文件描述; 其中, 所述文件描述为利用信任中心的公钥加密所述用户密钥后 的文件描述; 所述第一解密单元 73, 用于利用所述公钥对应的私钥解密所述文件描述, 得到第一用户的用户密钥; 所述第一发送单元 74, 用于将所述用户密钥发送给所述第二 用户, 以便于所述第二用户利用所述用户密钥解密获取到的所述共享文件, 得到第一用 户的原共享文件。
[182】可选的, 所述获取单元还可以用于: 在根据所述 URL从云端服务器中获取所述共享 文件的文件描述的同时,还获取与所述 URL对应的所述共享文件;所述装置还可以包括: 第二解密单元, 加密单元, 第二发送单元和第二接收单元, 其中,
[183】所述第二解密单元, 用于利用所述第一解密单元得到的用户密钥解密获取的所述共 享文件, 得到第一用户的原共享文件; 所述加密单元, 用于利用临时密钥加密所述第一 用户的原共享文件, 得到临时文件; 所述第二发送单元, 用于将所述临时文件上传到所 述云端服务器中; 所述第二接收单元, 用于接收所述云端服务器下发的与所述临时文件 对应的临时 URL; 所述第一发送单元, 还用于将所述临时 URL及临时密钥发送给所述第 二用户, 以便于所述第二用户利用所述临时密钥解密获取到的所述临时文件, 得到第一 用户的原共享文件。
[184】所述装置可以集成在信任中心中, 也可以独立部署, 本实施例不作限制。
[185】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程,在 此不再赘述。
[186】还请参阅图 8, 为本发明实施例提供的一种数据共享的装置的另一结构示意图, 所 述装置包括: 加密单元 81, 第一发送单元 82, 第一接收单元 83, 授权单元 84和第二发 送单元 85, 其中,
[187】所述加密单元 81,用于利用用户密钥对要上传到云端服务器的文件进行加密,得到 加密后的共享文件, 并使用信任中心的公钥对用户密钥进行加密, 并将加密后的用户密 钥作为文件描述; 所述第一发送单元 82, 用于将加密后的所述共享文件和文件描述上传 到所述云端服务器上; 所述第一接收单元 83, 用于接收所述云端服务器发送的所述共享 文件对应的统一资源定位符 URL; 所述授权单元 84, 用于通过信任中心授权第二用户访 问所述共享文件的 URL; 所述第二发送单元 85, 用于将所述 URL发送给所述第二用户; 以便于所述第二用户根据所述 URL获取所述共享文件以及所述用户密钥; 并利用所述用 户密钥解密所述共享文件, 得到第一用户的原共享文件。
[188】所述装置可以集成在用户终端中。
[189】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程,在 此不再赘述。
[190】还请参阅图 9, 为本发明实施例提供的一种数据共享的装置的又一结构示意图, 所 述装置包括: 第一接收单元 91, 存储单元 92, 第一发送单元 93, 第二接收单元 94, 第 二发送单元 95, 第三接收单元 96和第三发送单元 97, 其中,
[191】所述第一接收单元 91,用于接收第一用户发送的共享文件及对应的文件描述;其中, 所述共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任 中心的公钥加密用户密钥后的文件描述; 所述存储单元 92, 用于存储所述共享文件及对
应的文件描述; 所述第一发送单元 93, 用于向所述第一用户发送存储所述共享文件对应 的统一资源定位符 URL; 所述第二接收单元 94, 用于接收信任中心发送的获取所述 URL 对应的文件描述的请求; 所述第二发送单元 95, 用于向所述信任中心发送包括所述文件 描述的响应; 以便于所述信任中心利用所述公钥对应的私钥解密所述文件描述, 得到用 户密钥, 以及所述信任中心将所述用户密钥发送给第二用户; 所述第三接收单元 96, 用 于接收第二用户发送请求所述 URL对应的共享文件; 所述第二用户为第一用户通过信任 中心授权访问所述共享文件的用户; 所述第三发送单元 97, 用于向所述第二用户发送所 述 URL对应的共享文件,以便于所述第二用户根据接收到的用户密钥解密所述共享文件, 得到第一用户的原共享文件。
[192】所述装置可以集成在云端服务器中, 也可以独立部署, 本实施例不作限制。
[193】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程,在 此不再赘述。
[194】还请参与图 10,为本发明实施例提供的一种数据共享的装置的又一结构示意图,所 述装置包括: 第一接收单元 11, 第一存储单元 12, 第一发送单元 13, 第二接收单元 14, 第二发送单元 15, 第三接收单元 16, 第二存储单元 17, 第三发送单元 18, 第四接收单 元 19和第四发送单元 120, 其中,
[195】所述第一接收单元 11,用于接收第一用户发送的共享文件及对应的文件描述;其中, 所述共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任 中心的公钥加密用户密钥后的文件描述; 所述第一存储单元 12, 用于存储所述共享文件 及对应的文件描述; 所述第一发送单元 13, 用于向所述第一用户发送存储所述共享文件 和文件描述对应的统一资源定位符 URL; 所述第二接收单元 14, 用于接收信任中心发送 的获取所述 URL对应的共享文件和文件描述的请求; 所述第二发送单元 15, 用于向所述 信任中心发送包括所述共享文件和文件描述的响应; 以便于信任中心利用所述公钥对应 的私钥解密所述文件描述, 得到用户密钥, 并利用所述用户密钥解密所述共享文件, 得 到原文件; 以及所述信任中心利用临时密钥对所述原文件进行加密, 得到临时文件; 所 述第三接收单元 16, 用于接收所述信任中心发送的临时文件; 所述第二存储单元 17, 用 于存储所述临时文件; 所述第三发送单元 18, 用于向所述信任中心发送存储所述临时文 件对应的临时 URL; 以便于信任中心将所述临时密钥和临时 URL发送给第二用户; 所述 第四接收单元 19, 用于接收所述第二用户发送的获取所述临时 URL对应的临时文件的请 求; 所述第四发送单元 120, 向所述第二用户发送包括所述临时文件的响应, 以便于所 述第二用户根据所述临时密钥解密所述临时文件, 得到原共享文件。
[196】所述装置可以集成在云端服务器中, 也可以独立部署, 本实施例不作限制。
[197】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程, 在 此不再赘述。
[198】还请参阅图 11,为本发明实施例提供的一种数据共享的装置的又一结构示意图,所 述装置包括: 第一接收单元 111, 第一加密单元 112, 第一发送单元 113, 第二加密单元 114, 第二发送单元 115, 第二接收单元 116和第三发送单元 117, 其中,
[199】所述第一接收单元 111, 用于接收信任中心发送的密钥, 以及鉴权证书; 所述第一 加密单元 112, 用于利用所述密钥对将要上传的共享文件进行加密, 得到加密后的第一 共享文件; 所述第一发送单元 113, 用于将所述第一共享文件发送到云端服务器上; 以 便于所述云端服务器将所述第一共享文件作为第一用户的源文件; 所述第二加密单元 114, 用于利用临时密钥对所述共享文件进行加密, 得到加密后的第二共享文件; 所述第 二发送单元 115, 用于将所述第二共享文件发送到云端服务器上; 以便于所述云端服务 器将所述第二共享文件作为第一用户的临时文件; 所述第二接收单元 116, 用于接收云 端服务器发送的所述第二共享文件对应的临时统一资源定位符 URL; 所述第三发送单元 117,用于在通过所述鉴权证书确认第二用户为合法用户后,将所述临时 URL和临时密钥 发送给第二用户; 以便于所述第二用户请求所述临时 URL对应的第二共享文件, 并利用 所述临时密钥解密所述第二共享文件, 得到第一用户的原共享文件。
[200]所述装置可以集成在用户终端。
[201】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程,在 此不再赘述。
[202】还请参阅图 12,为本发明实施例提供的一种数据共享的装置的又一结构示意图,所 述装置包括: 第一接收单元 121, 第二接收单元 122, 存储单元 123, 第一发送单元 124, 第三接收单元 125和第二发送单元 126, 其中,
[203】所述第一接收单元 121, 用于接收第一用户发送的第一共享文件, 所述第一共享文 件为利用信任中心下发的密钥加密的文件; 并将所述第一共享文件作为第一用户的源文 件; 所述第二接收单元 122, 用于接收所述第一用户发送的第二共享文件, 所述第二共 享文件为利用临时密钥加密的文件; 并将所述第二共享文件作为所述第一用户的临时文 件; 所述存储单元 123, 用于分别存储第一共享文件和第二共享文件; 所述第一发送单 元 124, 用于向所述第一用户发送存储所述第二共享文件对应的临时统一资源定位符 URL; 所述第三接收单元 125, 用于接收第二用户发送的获取所述临时 URL对应的第二共
享文件, 所述第二用户为所述第一用户经过鉴权认证的用户; 并且接收到所述第一用户 发送的临时密钥和所述临时 URL;所述第二发送单元 126,用于向所述第二用户发送所述 第二共享文件, 以便于所述第二用户根据所述临时密钥解密所述第二共享文件, 得到第 一用户的原共享文件。
[204】所述装置可以集成在云端服务器上, 也可以独立部署, 本实施例不作限制。
[205】所述装置中各个单元的功能和作用的实现过程详见上述方法中对应的实现过程, 在 此不再赘述。
[206】为了便于本领域技术人员的理解, 下面以具体的应用实例来说明。 [207】实施例一
[208】请参阅图 13,图 13为本发明实施例提供的一种数据共享的方法的第一应用实例图, 该实施例应用于在云环境下实现用户数据共享, 所述方法包括:
[209】步骤 1301 : 用户 A使用自己的用户密钥 keyl加密将要上传到云端服务器的共享文 件, 并使用信任中心的公钥加密用户密钥 keyl作为文件描述。
[210】其中, 用户 A使用信任中心的公钥, 是通过第三方机构査询信任中心得到的。
[211】步骤 1302: 用户 A将已加密的所述共享文件和文件描述上传到云端服务器上。
[212】步骤 1303:云端服务器向用户 A返回已上传共享文件所对应的统一资源定位符 URL。
[213】步骤 1304: 用户 A通过信任中心授权用户 B访问该共享文件的 URL。
[214】步骤 1305: 用户 A发送云端服务器返回的共享文件的 URL给用户 B。
[215】步骤 1306: 信任中心对用户 B进行身份鉴权, 并在鉴权通过后, 执行步骤 1307。
[216】也就是说, 信任中心验证用户 B是否为合法的用户, 即对用户 B的身份进行认证。
[217】步骤 1307:用户 B通过所述 URL向信任中心请求所述共享文件的用户密钥(即 keyl )。 即用户 B向信任中心请求 URL对应所述共享文件的用户密钥。
[218】步骤 1308: 信任中心根据用户 B请求中的 URL, 向云端服务器请求其对应的文件描 述。
[219】步骤 1309: 云端服务器向信任中心返回所述 URL对应的文件描述。
[220】步骤 1310: 信任中心使用所述公钥对应的私钥(即与用户 A使用的信任中心的公钥 对应的私钥)解密文件描述, 获得用户 A的用户密钥 keyl。
[221】步骤 1311 : 信任中心将用户 A的用户密钥 keyl发送给用户 B, 在该步骤中, 可以 通过信任中心与用户 B之间的安全通道, 也可以通过其他通道, 本实施例中不作限制。
[222】步骤 1312: 用户 B向云端服务器请求所述 URL对应的共享文件。
[223】步骤 1313: 云端服务器向用户 B返回所述 URL对应的共享文件。
[224】步骤 1314: 用户 B使用接收到的所述用户 A的用户密钥 keyl解密接收到的共享文 件, 获得用户 A的原共享文件。
[225】本发明实施例中, 通过对用户数据在上传到云端服务器之前进行加密操作, 并且在 信任中心授权的用户才可以访问上传到云端服务器上的数据, 解决了共享云端文件的安 全问题。 提升了用户对于云安全的信心, 并且使得用户可以方便的共享存储在云端的数 据。
[226】实施例二
[227】请参阅图 14,图 14为本发明实施例提供的一种数据共享的方法的第二应用实例图, 该实施例应用于在云环境下实现用户数据共享, 所述方法包括:
[228】步骤 1401 : 用户 A使用自己的用户密钥 keyl加密将要上传到云端服务器的共享文 件, 并使用信任中心的公钥加密用户密钥 keyl作为文件描述。
[229】步骤 1402: 用户 A将已加密的共享文件和文件描述上传到云端服务器。
[230】步骤 1403: 云端服务器向用户 A返回已上传的共享文件所对应的 URL, 为了便于描 述, 本实施例定义为 URL1。
[231】步骤 1404: 用户 A通过信任中心授权用户 B访问该共享文件的 URL1。
[232】步骤 1405: 用户 A向用户 B发送所述共享文件的 URL1。
[233】步骤 1406: 信任中心对用户 B进行身份鉴权, 并在鉴权通过后, 执行步骤 1407;
[234】其中, 用户 B通过信任中心实现身份认证。
[235】步骤 1407: 用户 B通过所述 URL1 向信任中心请求所述共享文件的用户密钥 (即 keyD o
[236】步骤 1408: 信任中心根据用户 B请求中的 URL1 , 向云端服务器请求用户 A上传的 共享文件和文件描述。
[237】步骤 1409: 云端服务器向所述信任中心返回用户 A上传的共享文件和文件描述。
[238】步骤 1410: 信任中心使用所述公钥对应的私钥对所述文件描述进行解密, 获得用户 A的用户密钥 keyl, 并使用 keyl解密所述共享文件, 获得用户 A的原共享文件;
[239】步骤 1411 : 信任中心使用临时密钥 key2加密原共享文件, 得到临时文件 file2。
[240】步骤 1412: 信任中心将所述临时文件 file2上传到云端服务器。
[241】步骤 1413: 云端服务器向信任中心返回临时文件 file2对应的临时 URL, 为了便于 描述, 本实施例定义 URL2。
[242】步骤 1414: 信任中心通过安全信道向用户 B发送所述 URL2和临时密钥 key2。
[243】步骤 1415: 用户 B向云端服务器请求所述 URL2对应的临时文件 file2。
[244】步骤 1416: 云端服务器向用户 B返回所述 URL2对应的临时文件 file2。
[245】步骤 1417:用户 B接收所述临时文件 file2,并使用信任中心返回的临时密钥 key2 解密接收到的临时文件 file2, 获得用户 A的原共享文件。
[246】本发明实施例中, 通过对用户数据在上传到云端服务器之前进行加密操作, 并且在 信任中心在获取到原共享文件后, 对该原共享文件进行重新加密, 以及将重新加密后的 共享文件上传到云端服务器, 以便于授权的用户访问上传到云端服务器上的数据, 解决 了共享云端文件的安全问题。 提升了用户对于云安全的信心, 并且使得用户可以方便的 共享存储在云端的数据。
[247】实施例三
[248】请参阅图 15,图 15为本发明实施例提供的一种数据共享的方法的第三应用实例图, 该实施例应用于在云环境下实现用户数据共享, 所述方法包括:
[249】步骤 1501 : 信任中心向用户 A分发密钥 keyl。
[250】其中, 可以通过安全信道向用户 A分发密钥 keyl。
[251】步骤 1502: 用户 A使用所述密钥 keyl加密将要上传到云端服务器上的文件, 得到 加密后的文件 filel。
[252】步骤 1503: 用户 A将已加密的文件 filel上传到云端服务器上。
[253】步骤 1504: 云端服务器存储接收到的文件 filel, 并将文件 filel作为用户 A的源 文件。
[254】步骤 1505: 用户 A随机选择临时密钥 key2, 并使用临时密钥 key2加密所述文件, 获得文件 file2。
[255】其中, 步骤 1504和步骤 1505在时间上不分先后顺序, 也可以同时进行。
[256】步骤 1506: 用户 A将已加密的文件 f ile2上传到云端服务器上。
[257】步骤 1507: 云端服务器存储接收到的文件 file2, 并将文件 f ile2作为用户 A的临 时文件, 即称为临时文件 file2。
[258】步骤 1508: 云端服务器向用户 A发送所述临时文件 f ile2对应的临时 URL;
[259】步骤 1509: 用户 A通过信任中心颁发的鉴权证书对用户 B进行鉴权 (认证), 并在 确认对方为合法用户后, 执行步骤 1510;
[260】其中, 步骤 1508和步骤 1509在时间上没有先后顺序, 也可以同时进行, 本实施例 不作限制。
[261]步骤 1510: 用户 A将所述临时 URL和临时密钥 key2发送给用户 B。
[262】步骤 1511 : 用户 B向云端服务器请求临时 URL对应的临时文件 f ile2。
[263】步骤 1512: 云端服务器向用户 B返回所述临时 URL对应的临时文件 file2。
[264】步骤 1513: 用户 B接收到临时文件 file2, 并使用临时密钥 key2解密所述临时文 件 file2, 获得用户 A的原共享文件。
[265】本发明实施例, 用户预先接收到信任中心的密钥, 并通过该密钥对要共享的文件进 行加密, 得到 filel , 并将 filel上传到云端服务器, 云端服务器会将该文件作为该用 户的源文件, 之后, 该用户会用临时密钥对要共享的该文件进行加密, 得到 file2, 并 将 f ile2也上传到云端服务器, 云端服务器会将该 file2作为临时文件, 并将该临时文 件作为其他授权用户访问的文件, 解决了共享云端文件的安全问题, 同时也方便授权用 户共享存储在云端服务器上的数据。
[266】本发明实施例还提供一种信任中心, 所述信任中心包括: 收发器和处理器, 其中,
[267]所述收发器, 用于接收第二用户通过统一资源定位符 URL请求第一用户的共享文件 的用户密钥, 其中, 所述第二用户为所述第一用户通过信任中心授权访问所述共享文件 的合法用户; 所述共享文件为利用所述用户密钥加密后的共享文件; 以及根据所述 URL 从云端服务器中获取对应的所述共享文件的文件描述; 其中, 所述文件描述为利用所述 信任中心的公钥加密所述用户密钥后的文件描述;
[268】所述处理器, 利用所述信任中心的所述公钥对应的私钥解密所述文件描述, 得到所 述第一用户的所述用户密钥;
[269】所述收发器, 还用于将所述用户密钥发送给所述第二用户。
[270】可选的, 在另一实施例中, 该实施例在上述实施例中, 所述收发器根据所述 URL从 云端服务器中获取所述共享文件的文件描述, 还包括: 获取与所述 URL对应的所述共享 文件;
[271】所述处理器, 还用于利用所述用户密钥解密获取的所述共享文件, 得到所述第一用 户的原共享文件; 以及利用临时密钥加密所述原共享文件, 得到临时文件;
[272】所述收发器, 还用于将所述临时文件上传到所述云端服务器中, 并获得所述云端服 务器下发的与所述临时文件对应的临时 URL;
[273】所述收发器将用户密钥发送给所述第二用户, 具体包括: 将所述临时 URL及临时密 钥发送给所述第二用户。
[274】其中, 所述信任中心包括的收发器和处理器的功能和作用的实现过程, 详见上述方 法中对应的实现过程, 在此不再赘述。
[275】本发明实施例还提提供一种用户终端, 包括: 收发器和处理器, 其中,
[276】所述处理器, 用于利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密 后的共享文件, 并使用信任中心的公钥对所述用户密钥进行加密, 并将加密后的用户密 钥作为文件描述;
[277】所述收发器, 用于将加密后的所述共享文件和文件描述上传到所述云端服务器; 以 及接收所述云端服务器发送的所述共享文件对应的统一资源定位符 URL;
[278】所述处理器, 用于通过所述信任中心授权第二用户访问所述共享文件;
[279】所述收发器, 还用于将所述 URL发送给所述第二用户; 以便于所述第二用户根据所
述 URL获取所述用户密钥; 并利用所述用户密钥解密所述共享文件。
[280】其中, 所述用户终端包括的收发器和处理器的功能和作用的实现过程, 详见上述方 法中对应的实现过程, 在此不再赘述。
[281】本发明实施例还提供一种云端服务器, 包括: 收发器和存储器, 其中,
[282】所述收发器, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共 享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的 公钥加密用户密钥后的文件描述;
[283】所述存储器, 用于存储所述共享文件及对应的文件描述;
[284】所述收发器,还用于向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;接收信任中心发送的获取所述 URL对应的文件描述的请求; 向所述信任中心发送包 括所述文件描述的响应; 以便于所述信任中心利用所述公钥对应的私钥解密所述文件描 述, 得到所述用户密钥, 以及所述信任中心将所述用户密钥发送给第二用户; 接收第二 用户发送请求所述 URL对应的共享文件; 所述第二用户为所述第一用户通过所述信任中 心授权访问所述共享文件的用户; 向所述第二用户发送所述 URL对应的共享文件, 以便 于所述第二用户根据接收到的所述用户密钥解密所述共享文件。
[285】其中, 所述云端服务器包括的收发器和存储器的功能和作用的实现过程, 详见上述 方法中对应的实现过程, 在此不再赘述。
[286】本发明实施例还提供一种云端服务器, 包括: 收发器和存储器, 其中,
[287】所述收发器, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共 享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的 公钥加密用户密钥后的文件描述;
[288】所述存储器, 用于存储所述共享文件及对应的文件描述;
[289】所述收发器,还用于向所述第一用户发送存储所述共享文件和对应的文件描述对应 的统一资源定位符 URL; 接收信任中心发送的获取所述 URL对应的共享文件和文件描述 的请求; 向所述信任中心发送包括所述共享文件和文件描述的响应; 以便于所述信任中 心利用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 并利用所述用户密 钥解密所述共享文件后利用临时密钥重新加密, 得到临时文件; 接收所述信任中心发送 的临时文件;
[290】所述存储器, 还用于存储所述临时文件;
[291】所述收发器, 还用于向所述信任中心发送存储所述临时文件对应的临时 URL; 以便 于所述信任中心将所述临时密钥和临时 URL发送给第二用户; 接收所述第二用户发送的 获取所述临时 URL对应的临时文件的请求; 向所述第二用户发送包括所述临时文件的响 应, 以便于所述第二用户根据所述临时密钥解密所述临时文件。
[292】其中, 所述云端服务器包括的收发器和存储器的功能和作用的实现过程, 详见上述 方法中对应的实现过程, 在此不再赘述。
[293】需要说明的是, 在本文中, 诸如第一和第二等之类的关系术语仅仅用来将一个实体 或者操作与另一个实体或操作区分开来, 而不一定要求或者暗示这些实体或操作之间存 在任何这种实际的关系或者顺序。 而且, 术语 "包括"、 "包含"或者其任何其他变体 意在涵盖非排他性的包含, 从而使得包括一系列要素的过程、 方法、 物品或者设备不仅 包括那些要素,而且还包括没有明确列出的其他要素, 或者是还包括为这种过程、方法、 物品或者设备所固有的要素。 在没有更多限制的情况下, 由语句 "包括一个…… " 限定 的要素, 并不排除在包括所述要素的过程、 方法、 物品或者设备中还存在另外的相同要 素。
[294】通过以上的实施方式的描述, 本领域的技术人员可以清楚地了解到本发明可借助软 件加必需的通用硬件平台的方式来实现, 当然也可以通过硬件, 但很多情况下前者是更 佳的实施方式。 基于这样的理解, 本发明的技术方案本质上或者说对现有技术做出贡献 的部分可以以软件产品的形式体现出来, 该计算机软件产品可以存储在存储介质中, 如 ROM/RAM, 磁碟、 光盘等, 包括若干指令用以使得一台计算机设备 (可以是个人计算机, 服务器, 或者网络设备等)执行本发明各个实施例或者实施例的某些部分所述的方法。
[295】以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域的普通技术人员 来说, 在不脱离本发明原理的前提下, 还可以作出若干改进和润饰, 这些改进和润饰也 应视为本发明的保护范围。
Claims
1、一种数据共享的方法, 其特征在于, 包括- 接收第二用户通过统一资源定位符 URL请求第一用户的共享文件的用户密钥, 其 中, 所述第二用户为所述第一用户通过信任中心授权访问所述共享文件的合法用户; 所 述共享文件为利用所述用户密钥加密后的共享文件;
根据所述 URL从云端服务器中获取对应的所述共享文件的文件描述; 其中, 所述文 件描述为利用所述信任中心的公钥加密所述用户密钥后的文件描述;
利用所述信任中心的所述公钥对应的私钥解密所述文件描述, 得到所述第一用户的 所述用户密钥;
将所述用户密钥发送给所述第二用户。
2、 根据权利要求 1所述的方法, 其特征在于, 所述根据所述 URL从云端服务器中 获取所述共享文件的文件描述, 还包括- 获取与所述 URL对应的所述共享文件;
利用所述用户密钥解密获取的所述共享文件, 得到所述第一用户的原共享文件; 利用临时密钥加密所述原共享文件, 得到临时文件;
将所述临时文件上传到所述云端服务器中,并获得所述云端服务器下发的与所述临 时文件对应的临时 URL;
所述将用户密钥发送给所述第二用户, 具体包括- 将所述临时 URL及临时密钥发送给所述第二用户。
3、一种数据共享的方法, 其特征在于, 包括:
利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密后的共享文件, 并 使用信任中心的公钥对所述用户密钥进行加密, 并将加密后的用户密钥作为文件描述; 将加密后的所述共享文件和文件描述上传到所述云端服务器;
接收所述云端服务器发送的所述共享文件对应的统一资源定位符 URL;
通过所述信任中心授权第二用户访问所述共享文件;
将所述 URL发送给所述第二用户;以便于所述第二用户根据所述 URL获取所述用户 密钥; 并利用所述用户密钥解密所述共享文件。
4、 根据权利要求 3所述的方法, 其特征在于, 所述第二用户根据所述 URL获取所 述共享文件以及所述用户密钥; 并利用所述用户密钥解密所述共享文件, 具体包括: 所述第二用户根据所述 URL从所述信任中心获取所述共享文件的所述用户密钥,以 及从所述云端服务器获取所述共享文件, 并利用所述用户密钥解密所述共享文件。
5、 根据权利要求 3所述的方法, 其特征在于, 所述第二用户根据所述 URL获取所 述共享文件以及所述用户密钥; 并利用所述用户密钥解密所述共享文件, 具体包括: 所述第二用户向所述信任中心请求所述 URL对应的所述共享文件的所述用户密钥; 接收所述信任中心响应所述请求发送的临时 URL和临时密钥; 其中, 所述临时密钥 是信任中心对获得的所述共享文件解密后进行重新加密的密钥, 所述临时 URL是云端服 务器返回临时文件对应的 URL, 其中, 所述临时文件为所述信任中心利用所述临时密钥 对获得所述共享文件解密后重新加密后的文件;
向云端服务器获取所述临时 URL对应的临时文件;
利用所述临时密钥对所述临时文件进行解密。
6、一种数据共享的方法, 其特征在于, 包括- 接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件为利用第一 用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加密用户密钥 后的文件描述;
存储所述共享文件及对应的文件描述;
向所述第一用户发送存储所述共享文件对应的统一资源定位符 URL;
接收信任中心发送的获取所述 URL对应的文件描述的请求;
向所述信任中心发送包括所述文件描述的响应;以便于所述信任中心利用所述公钥 对应的私钥解密所述文件描述, 得到所述用户密钥, 以及所述信任中心将所述用户密钥 发送给第二用户;
接收第二用户发送请求所述 URL对应的共享文件;所述第二用户为所述第一用户通 过所述信任中心授权访问所述共享文件的用户;
向所述第二用户发送所述 URL对应的共享文件,以便于所述第二用户根据接收到的 所述用户密钥解密所述共享文件。
7、一种数据共享的方法, 其特征在于, 包括:
接收第一用户发送的共享文件及对应的文件描述; 其中, 所述共享文件为利用第一 用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心的公钥加密用户密钥 后的文件描述;
存储所述共享文件及对应的文件描述;
向所述第一用户发送存储所述共享文件和对应的文件描述对应的统一资源定位符
URL;
接收信任中心发送的获取所述 URL对应的共享文件和文件描述的请求;
向所述信任中心发送包括所述共享文件和文件描述的响应;以便于所述信任中心利 用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 并利用所述用户密钥解 密所述共享文件后利用临时密钥重新加密, 得到临时文件;
接收所述信任中心发送的临时文件;
存储所述临时文件;
向所述信任中心发送存储所述临时文件对应的临时 URL; 以便于所述信任中心将所 述临时密钥和临时 URL发送给第二用户;
接收所述第二用户发送的获取所述临时 URL对应的临时文件的请求;
向所述第二用户发送包括所述临时文件的响应,以便于所述第二用户根据所述临时 密钥解密所述临时文件。
8、一种数据共享的装置, 其特征在于, 包括:
第一接收单元,用于接收第二用户通过统一资源定位符 URL请求第一用户的共享文 件的用户密钥, 其中, 所述第二用户为所述第一用户通过信任中心授权访问所述共享文 件的合法用户; 所述共享文件为利用所述第一用户的用户密钥加密后的共享文件; 获取单元, 用于根据所述 URL从云端服务器中获取对应的所述共享文件的文件描 述; 其中, 所述文件描述为利用所述信任中心的公钥加密所述用户密钥后的文件描述; 第一解密单元, 用于利用所述信任中心的所述公钥对应的私钥解密所述文件描述, 得到所述第一用户的用户密钥;
第一发送单元, 用于将所述用户密钥发送给所述第二用户。
9、 根据权利要求 8所述的装置, 其特征在于, 所述获取单元还用于: 在根据所述 URL从云端服务器中获取所述共享文件的文件描述时, 还获取与所述 URL对应的所述共 享文件; 所述装置还包括:
第二解密单元,用于利用所述第一解密单元得到的所述用户密钥解密获取的所述共 享文件, 得到第一用户的原共享文件;
加密单元, 用于利用临时密钥加密所述原共享文件, 得到临时文件;
第二发送单元, 用于将所述临时文件上传到所述云端服务器中;
第二接收单元, 用于所述云端服务器下发的与所述临时文件对应的临时 URL; 所述第一发送单元, 还用于将所述临时 URL及临时密钥发送给所述第二用户。
10、一种数据共享的装置, 其特征在于, 包括:
加密单元, 用于利用用户密钥对要上传到云端服务器的文件进行加密, 得到加密后 的共享文件, 并使用信任中心的公钥对所述用户密钥进行加密, 并将加密后的用户密钥
作为文件描述;
第一发送单元, 用于将加密后的所述共享文件和文件描述上传到所述云端服务器; 第一接收单元,用于接收所述云端服务器发送的所述共享文件对应的统一资源定位 符 URL;
授权单元, 用于通过所述信任中心授权第二用户访问所述共享文件;
第二发送单元, 用于将所述 URL发送给所述第二用户; 以便于所述第二用户根据所 述 URL获取所述共享文件以及所述用户密钥; 并利用所述用户密钥解密所述共享文件。
11、一种数据共享的装置, 其特征在于, 包括- 第一接收单元, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述 共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心 的公钥加密用户密钥后的文件描述;
存储单元, 用于存储所述共享文件及对应的文件描述;
第一发送单元,用于向所述第一用户发送存储所述共享文件对应的统一资源定位符
URL;
第二接收单元, 用于接收信任中心发送的获取所述 URL对应的文件描述的请求; 第二发送单元, 用于向所述信任中心发送包括所述文件描述的响应; 以便于所述信 任中心利用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 以及所述信任 中心将所述用户密钥发送给第二用户;
第三接收单元, 用于接收第二用户发送请求所述 URL对应的共享文件; 所述第二用 户为所述第一用户通过所述信任中心授权访问所述共享文件的用户;
第三发送单元, 用于向所述第二用户发送所述 URL对应的共享文件, 以便于所述第 二用户根据接收到的所述用户密钥解密所述共享文件。
12、一种数据共享的装置, 其特征在于, 包括:
第一接收单元, 用于接收第一用户发送的共享文件及对应的文件描述; 其中, 所述 共享文件为利用第一用户的用户密钥加密后的共享文件; 所述文件描述为利用信任中心 的公钥加密用户密钥后的文件描述;
第一存储单元, 用于存储所述共享文件及对应的文件描述;
第一发送单元,用于向所述第一用户发送存储所述共享文件和文件描述对应的统一 资源定位符 URL;
第二接收单元,用于接收信任中心发送的获取所述 URL对应的共享文件和文件描述 的请求;
第二发送单元, 用于向所述信任中心发送包括所述共享文件和文件描述的响应; 以
便于所述信任中心利用所述公钥对应的私钥解密所述文件描述, 得到所述用户密钥, 并 利用所述用户密钥解密所述共享文件后利用临时密钥重新加密, 得到临时文件;
第三接收单元, 用于接收所述信任中心发送的临时文件;
第二存储单元, 用于存储所述临时文件;
第三发送单元, 用于向所述信任中心发送存储所述临时文件对应的临时 URL; 以便 于所述信任中心将所述临时密钥和临时 URL发送给第二用户;
第四接收单元,用于接收所述第二用户发送的获取所述临时 URL对应的临时文件的 请求;
第四发送单元, 用于向所述第二用户发送包括所述临时文件的响应, 以便于所述第 二用户根据所述临时密钥解密所述临时文件。
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP14745514.1A EP2814200B8 (en) | 2013-01-30 | 2014-01-16 | Method and apparatus for data sharing |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310035962.6A CN103973736B (zh) | 2013-01-30 | 2013-01-30 | 一种数据共享的方法及装置 |
| CN201310035962.6 | 2013-01-30 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2014117649A1 true WO2014117649A1 (zh) | 2014-08-07 |
Family
ID=51224360
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2014/070724 Ceased WO2014117649A1 (zh) | 2013-01-30 | 2014-01-16 | 一种数据共享的方法及装置 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US9129125B2 (zh) |
| EP (1) | EP2814200B8 (zh) |
| CN (1) | CN103973736B (zh) |
| WO (1) | WO2014117649A1 (zh) |
Families Citing this family (44)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10055595B2 (en) | 2007-08-30 | 2018-08-21 | Baimmt, Llc | Secure credentials control method |
| US8966287B2 (en) * | 2012-03-26 | 2015-02-24 | Symantec Corporation | Systems and methods for secure third-party data storage |
| US9767299B2 (en) * | 2013-03-15 | 2017-09-19 | Mymail Technology, Llc | Secure cloud data sharing |
| US10250579B2 (en) * | 2013-08-13 | 2019-04-02 | Alcatel Lucent | Secure file transfers within network-based storage |
| CN103442059B (zh) | 2013-08-27 | 2017-02-01 | 华为终端有限公司 | 一种文件共享方法及装置 |
| KR101754308B1 (ko) * | 2013-10-04 | 2017-07-07 | 한국전자통신연구원 | 모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버 |
| US20150195086A1 (en) * | 2014-01-05 | 2015-07-09 | Core Business IT, LLC | Mediated encryption policy framework for user-transparent method-agnostic data protection |
| US10212143B2 (en) * | 2014-01-31 | 2019-02-19 | Dropbox, Inc. | Authorizing an untrusted client device for access on a content management system |
| US9607170B2 (en) * | 2014-05-02 | 2017-03-28 | Henry R. Williams | Compromise free cloud data encryption and security |
| EP3169031B1 (en) * | 2014-07-08 | 2020-12-30 | Huawei Technologies Co., Ltd. | Method, device and platform for sharing wireless local area network |
| US9699152B2 (en) * | 2014-08-27 | 2017-07-04 | Microsoft Technology Licensing, Llc | Sharing content with permission control using near field communication |
| US20160261576A1 (en) * | 2015-03-05 | 2016-09-08 | M-Files Oy | Method, an apparatus, a computer program product and a server for secure access to an information management system |
| CN105100836A (zh) * | 2015-06-06 | 2015-11-25 | 深圳市美贝壳科技有限公司 | 一种基于家庭视频服务器的视频分享系统 |
| CN105100816A (zh) * | 2015-06-06 | 2015-11-25 | 深圳市美贝壳科技有限公司 | 基于家庭局域网的视频分享系统及方法 |
| CN105100925A (zh) * | 2015-06-06 | 2015-11-25 | 深圳市美贝壳科技有限公司 | 一种基于家庭视频服务器的视频分享方法 |
| CN105025019B (zh) * | 2015-07-07 | 2018-09-28 | 深圳奥联信息安全技术有限公司 | 一种数据安全分享方法 |
| KR102482324B1 (ko) * | 2016-01-05 | 2022-12-29 | 삼성전자주식회사 | 클라우드 스토리지 서비스를 지원하는 무선 통신 시스템에서 파일 송/수신 장치 및 방법 |
| CN105721463B (zh) * | 2016-02-01 | 2020-05-26 | 腾讯科技(深圳)有限公司 | 一种文件安全传输方法和装置 |
| US10380360B2 (en) * | 2016-03-30 | 2019-08-13 | PhazrlO Inc. | Secured file sharing system |
| US9602477B1 (en) | 2016-04-14 | 2017-03-21 | Wickr Inc. | Secure file transfer |
| US20170317823A1 (en) * | 2016-04-28 | 2017-11-02 | Amish Gaganvihari Gandhi | Zero Knowledge Encrypted File Transfer |
| CN106096438A (zh) * | 2016-06-01 | 2016-11-09 | 付晓玫 | 一种用于司法实务的法律文件智能存储装置 |
| US10810185B2 (en) | 2016-09-22 | 2020-10-20 | At&T Intellectual Property I, L.P. | Temporary shared storage |
| US11140173B2 (en) | 2017-03-31 | 2021-10-05 | Baimmt, Llc | System and method for secure access control |
| CN109120576B (zh) * | 2017-06-23 | 2020-11-03 | 腾讯科技(深圳)有限公司 | 数据分享方法及装置、计算机设备及存储介质 |
| CN107370767A (zh) * | 2017-09-11 | 2017-11-21 | 安徽省未来博学信息技术有限公司 | 一种互联网分享系统 |
| CN107979590B (zh) | 2017-11-02 | 2020-01-17 | 财付通支付科技有限公司 | 数据共享方法、客户端、服务器、计算设备及存储介质 |
| CN109951432A (zh) * | 2017-12-21 | 2019-06-28 | 国民技术股份有限公司 | 授权认证方法、用户终端、装置、服务器及存储介质 |
| CN108259585B (zh) * | 2018-01-05 | 2021-06-01 | 携程旅游信息技术(上海)有限公司 | 呼叫中心录音云存储方法、系统、设备及存储介质 |
| US11601402B1 (en) * | 2018-05-03 | 2023-03-07 | Cyber Ip Holdings, Llc | Secure communications to multiple devices and multiple parties using physical and virtual key storage |
| US11349646B1 (en) | 2018-05-03 | 2022-05-31 | Berryville Holdings, LLC | Method of providing secure communications to multiple devices and multiple parties |
| TW201947406A (zh) * | 2018-05-03 | 2019-12-16 | 華東科技股份有限公司 | 資料交換群組系統及方法 |
| CN109246110B (zh) * | 2018-09-18 | 2021-10-26 | 北京小米智能科技有限公司 | 数据共享方法、装置及计算机可读存储介质 |
| DE102019101195A1 (de) * | 2019-01-17 | 2020-07-23 | Bundesdruckerei Gmbh | Verfahren zum sicheren Übermitteln einer Datei |
| CN109992976B (zh) * | 2019-02-27 | 2024-07-02 | 平安科技(深圳)有限公司 | 访问凭证验证方法、装置、计算机设备及存储介质 |
| CN110149210A (zh) * | 2019-04-20 | 2019-08-20 | 深圳市元征科技股份有限公司 | 一种数据传输方法及装置 |
| CN110266683A (zh) * | 2019-06-18 | 2019-09-20 | 北京阿尔山区块链联盟科技有限公司 | 数字资产分享方法、装置以及电子设备 |
| US11265282B2 (en) * | 2020-03-17 | 2022-03-01 | Slack Technologies, Llc | Methods and apparatuses for managing external approval provisioning and external messaging communication requests in a group-based communication system |
| CN113452660B (zh) * | 2020-03-27 | 2023-07-25 | 瑞昱半导体股份有限公司 | 网状网络与云端服务器的通信方法、网状网络系统及其节点装置 |
| CN114385307B (zh) * | 2020-10-20 | 2024-02-02 | 中国电信股份有限公司 | 数据共享方法、系统和虚拟计算单元 |
| US12475252B2 (en) * | 2020-11-23 | 2025-11-18 | Biojars Holdings Pty Ltd | Information security systems and methods thereof |
| CN114629901B (zh) * | 2020-12-14 | 2024-08-20 | 北京金山云网络技术有限公司 | 一种基于BaaS的区块链上数据共享方法、装置及设备 |
| US11528131B1 (en) | 2021-11-04 | 2022-12-13 | Uab 360 It | Sharing access to data externally |
| US12254192B2 (en) * | 2022-01-30 | 2025-03-18 | Zoom Communications, Inc. | File encryption layer |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101833615A (zh) * | 2009-03-10 | 2010-09-15 | 上海盈哲信息科技有限公司 | 基于身份联合的数字资源权限控制方法 |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6557102B1 (en) * | 1997-09-05 | 2003-04-29 | Koninklijke Philips Electronics N.V. | Digital trust center for medical image authentication |
| US6947556B1 (en) * | 2000-08-21 | 2005-09-20 | International Business Machines Corporation | Secure data storage and retrieval with key management and user authentication |
| WO2002052480A1 (en) * | 2000-12-22 | 2002-07-04 | Trac Medical Solutions, Inc. | Dynamic electronic chain-of-trust document with audit trail |
| US20030037054A1 (en) * | 2001-08-09 | 2003-02-20 | International Business Machines Corporation | Method for controlling access to medical information |
| US20040153451A1 (en) * | 2002-11-15 | 2004-08-05 | John Phillips | Methods and systems for sharing data |
| CN100521610C (zh) * | 2006-03-31 | 2009-07-29 | 腾讯科技(深圳)有限公司 | 客户端播放网络媒体文件的方法及客户端 |
| US8271424B2 (en) * | 2008-05-15 | 2012-09-18 | International Business Machines Corporation | Privacy and confidentiality preserving reporting of URLs |
| CN101588350A (zh) * | 2008-05-19 | 2009-11-25 | 北京亿企通信息技术有限公司 | 一种实现文件共享的方法及系统 |
| EP2273409A3 (en) * | 2009-07-10 | 2013-01-16 | Disney Enterprises, Inc. | Interoperable keychest |
| CN102457507B (zh) * | 2010-10-29 | 2016-06-08 | 中兴通讯股份有限公司 | 云计算资源安全共享方法、装置及系统 |
| CN102651737B (zh) * | 2011-02-28 | 2015-11-25 | 国际商业机器公司 | 在云应用环境中用于数据泄漏防护的装置和方法 |
| EP2544117A1 (en) * | 2011-07-08 | 2013-01-09 | Gemalto SA | Method and system for sharing or storing personal data without loss of privacy |
-
2013
- 2013-01-30 CN CN201310035962.6A patent/CN103973736B/zh not_active Expired - Fee Related
-
2014
- 2014-01-16 WO PCT/CN2014/070724 patent/WO2014117649A1/zh not_active Ceased
- 2014-01-16 EP EP14745514.1A patent/EP2814200B8/en active Active
- 2014-01-30 US US14/168,585 patent/US9129125B2/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101833615A (zh) * | 2009-03-10 | 2010-09-15 | 上海盈哲信息科技有限公司 | 基于身份联合的数字资源权限控制方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2814200B1 (en) | 2019-04-17 |
| US20140215210A1 (en) | 2014-07-31 |
| EP2814200A4 (en) | 2015-07-08 |
| US9129125B2 (en) | 2015-09-08 |
| CN103973736A (zh) | 2014-08-06 |
| EP2814200B8 (en) | 2019-06-12 |
| CN103973736B (zh) | 2017-12-29 |
| EP2814200A1 (en) | 2014-12-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103973736B (zh) | 一种数据共享的方法及装置 | |
| US11855767B2 (en) | Methods and systems for distributing encrypted cryptographic data | |
| EP2940959B1 (en) | Apparatuses and system for the privacy and security of user files stored at a cloud server | |
| CN103427998B (zh) | 一种面向互联网数据分发的身份验证和数据加密方法 | |
| CN106453612B (zh) | 一种数据存储与共享系统 | |
| WO2013139079A1 (zh) | 一种存储方法、系统和装置 | |
| TW201701226A (zh) | 電子處方操作方法、裝置及系統 | |
| JP2005534049A5 (zh) | ||
| US20130227280A1 (en) | Method of operating a computing device, computing device and computer program | |
| CN103475474B (zh) | 一种提供、获取共享的加密数据的方法及身份认证设备 | |
| CN101515947A (zh) | 基于p2p的文件快速安全分发方法及系统 | |
| US20160105279A1 (en) | Data distributing over network to user devices | |
| CN107919958B (zh) | 一种数据加密的处理方法、装置及设备 | |
| CN103812927A (zh) | 一种存储方法 | |
| US20210167955A1 (en) | Data transmission | |
| WO2014183671A1 (zh) | 一种云存储安全控制的方法 | |
| CN106411884A (zh) | 一种数据存储加密的方法及装置 | |
| JP2024501326A (ja) | アクセス制御方法、装置、ネットワーク側機器、端末及びブロックチェーンノード | |
| WO2013163861A1 (zh) | 一种代理转换的方法、装置和系统 | |
| CN103548021B (zh) | 内容发布的控制系统 | |
| JP2006186807A5 (zh) | ||
| Kumar et al. | CloudShare: A Passwordless Cloud-Based File Storage and Sharing Framework | |
| JP4586383B2 (ja) | ファイルの暗号化方法、ファイルの復号化方法、および制御プログラム | |
| CN117614683A (zh) | 一种基于身份代理重加密和区块链的ipfs安全文件共享方法 | |
| WO2015161563A1 (zh) | 一种利用非对称安全机制的交互方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 2014745514 Country of ref document: EP |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14745514 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |