Secure Cloaking of Data

In a method for providing secure data storage, a user selection of a plurality of cloaking sequences is received. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a fi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Carlson, Jay Eric, Pattan, Bajeed, Blackley, James Anderson, Alcott, Christopher Scott, Hanrahan, Michael David
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In a method for providing secure data storage, a user selection of a plurality of cloaking sequences is received. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data.