主权项 |
1. A system for making a target file impractical to be retrieved, comprising:
a processor configured to:
receive a target file;segment the target file into a plurality of segments;determine a fingerprint and an encryption key for each segment;build a file encryption tree being stored in a hierarchical data structure, comprising to:
group a plurality of segments to form a first tier, comprising to:
encrypt a first segment using a corresponding first encryption key to obtain a first encrypted segment;encrypt a second segment using a corresponding second encryption key to obtain a second encrypted segment; andgroup, to form the first tier, the first and second encrypted segments and a first fingerprint relating to the first and second encrypted segments; andform a second tier, comprising to:
compute a second fingerprint based on the first and second encryption keys;group the second fingerprint and the first and second encryption keys to obtain the second tier;decrypt a directory manager file using a first directory manager file key, the directory manager file relating to the file encryption tree, wherein the directory manager file includes an encryption key that is used when reconstructing a target file;modify the directory manager file by deleting the encryption key;encrypt the modified directory manager file using a second directory manager file key; anddelete the first directory manager file key to make the target file impractical to be retrieved; and a memory coupled to the processor and configured to provide the processor with instructions. |