Encryption scheme for disk-based deduplication system (ESDS)

An encryption scheme and storage system technology, applied in the field of information security, can solve the problems of poor compatibility of redundancy elimination technology and reduce the data redundancy elimination capability of disk-based redundancy elimination storage system.

Inactive Publication Date: 2012-04-04
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The problem solved by the present invention is that the traditional file-based encryption method has poor compatibility with the redundancy elimination technology, and directly introducing the traditional encryption method will greatly reduce the data elimination capability of the disk-based redundant storage system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption scheme for disk-based deduplication system (ESDS)
  • Encryption scheme for disk-based deduplication system (ESDS)
  • Encryption scheme for disk-based deduplication system (ESDS)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0015] 1. Participants of ESDS

[0016] Based on this scheme, a multi-role task data encryption system and strategy are proposed. The Encryption Scheme for Disk-based Redundant Storage System (ESDS) has a total of three participants: users, metadata servers and block storage servers. The relationship between the three figure 1 shown.

[0017] 1.1 User

[0018] The user uses a certain block method to block a certain version of his own data file (the block is recorded as Chunk i ), and encrypt each block with the AES128 symmetric encryption algorithm, the key K ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption scheme for a disk-based deduplication system (ESDS for short). In the scheme, an encrypted basic unit is reduced from the whole file to file chunks, and chunk symmetric keys are generated by a consensus method, so that the same plaintext chunks correspond to a unique encryption result, the influence of an avalanche effect on a deduplication technology is eliminated, and data confidentiality and a data deduplication rate are ensured simultaneously. The safety of the system is not completely dependent on the chunk symmetric keys, so the safety of the whole system cannot be significantly influenced by leakage of a part of chunk symmetric keys as long as a user private key and an identity recognition password are not leaked simultaneously. The ESDS can ensure confidentiality in the data storage and transmission processes and is suitable for mass data storage application with a certain requirement on the data confidentiality.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an encryption scheme ESDS suitable for a disk-based deduplication storage system (note: the abbreviation "ESDS" is used for Encryption Scheme for Deduplication System mentioned in this specification). Background technique [0002] With the rapid development of information technology, electronic data is increasing rapidly at a rate of about 57% per year, and massive data has brought enormous pressure to data center storage capacity and network bandwidth. [0003] In recent years, a redundant elimination technology based on disk storage has emerged, which uses information redundancy between files to compress data, and can achieve a compression ratio of 20:1 or higher. However, the traditional data compression technology only utilizes the information redundancy of the file itself, and the compression ratio is limited, about 2:1 on average. The redundancy elimination tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F3/06
Inventor 秦志光何兴高王春杰王灿
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products