Safe method for repeated data deleting

A data deduplication and security technology, applied in encryption devices with shift registers/memory, electrical components, transmission systems, etc., can solve problems such as user data leakage, cannot prevent cloud storage service providers from leaking files, etc., to ensure security sexual effect

Inactive Publication Date: 2014-04-16
BEIJING SAFE CODE TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the hash value used to determine whether the user has uploaded the file is lost, the user data will be leaked. Although there are some methods to solve the problem of leaking part of the information without leaking the entire file, it still cannot prevent cloud storage service providers from leaking document

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe method for repeated data deleting
  • Safe method for repeated data deleting
  • Safe method for repeated data deleting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples.

[0018] Such as figure 1 As shown, the present invention includes: the client encrypts the file to be stored into ciphertext using the same key and different encryption algorithms; the server first judges whether the file has been stored by the hash value of the file; The file is decrypted to get the key, and then encrypted with another encryption algorithm; the server judges whether to perform deduplication by comparing the file with the same encryption algorithm twice encrypted.

[0019] Such as figure 2 As shown, the present invention encrypts files at the client end. When the user uploads a file to the server for the first time, the client first randomly selects an AES key τ, and then generates two ciphertext files. The first ciphertext file C F The file F is encrypted with the key τ using the AES encryption alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe method for repeated data deleting. The method comprises the steps that a client side encrypts files which need to be stored through the same secret key with different encryption algorithms; a server judges whether the files are stored through the Hash values of the files first; the client side decrypts a secret key through a ciphertext returned by the server, and then encryption is carried out with another encryption algorithm; and the server carries out two-time encryption with the same encryption algorithm by comparing the files to judge whether repeated date deleting is carried out. The advantage of a repeated data deleting technology is guaranteed, user data privacy is guaranteed, and an external attacker and an unreliable cloud storage serve provider are prevented.

Description

technical field [0001] The invention belongs to the technical field of data security storage, and in particular relates to a client-side deduplication method for encrypted data in cloud storage. Background technique [0002] In recent years, cloud storage services have become more and more popular. In order to reduce the consumption of network broadband resources and storage resources, many cloud storage service providers (such as Dropbox) began to use client-side data deduplication technology, that is, when a user tries to upload a file to the server, the cloud storage server will check whether the file exists in the cloud. File (other users have uploaded the file), if the file exists, the user is allowed to download the cloud file without uploading the entire file. In this way, only one copy of each document is kept in the cloud. According to the white paper of SNIA, the use of this deduplication technology can save up to 90% of storage space. [0003] Currently, the ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
Inventor 张毕涛查雅行王立进徐勤李正文李伟仲镜学
Owner BEIJING SAFE CODE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products