Safe distributed duplicated data deletion method

A data deduplication and distributed technology, applied in the field of cloud storage services, can solve problems such as hidden dangers, data loss, data inaccessibility, etc., and achieve the effect of high reliability, data confidentiality protection, high reliability and confidentiality level

Active Publication Date: 2014-04-30
XIDIAN UNIV
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If this shared copy is lost, an incalculable amount of data will be inaccessible, as all files sharing this data will become invalid
As a result, a deduplication system set up on a single server has the potential for data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe distributed duplicated data deletion method
  • Safe distributed duplicated data deletion method
  • Safe distributed duplicated data deletion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] System settings: In our construction, it is assumed that the number of S-CSPs storage servers is n, and the identities are represented as id 1 ,id 2 ...,id n . Define the security parameter as 1 λ , and initialize the secret sharing mechanism SS=(Share, Recover), a tag generation algorithm TagGen. The file storage system of the storage server is set to ⊥.

[0067] File upload: upload a file F, and the user interacts with S-CSPs to achieve deduplication. More precisely, the user first computes and sends the file label φ F =TagGen(F) for S-CSPs to perform deduplication check.

[0068] If a duplicate is found, the user calculates and sends Give the jth owning identity id j The S-CSP server. The purpose of introducing index j is to prevent servers from fetching the same file or block from other S-CSPs. if with metadata φ F match, the user will be given a pointer to the server id j Our Shared Data in .

[0069] Otherwise, if no duplication is found, the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe distributed duplicated data deletion method. According to the method, a file is segmented into fragments through a secret sharing technology without any encryption mechanism. The shared fragments are distributed in a plurality of independent storage servers. In addition, in order to support reduplication removing, a different short value is calculated and sent to the storage servers as the indicator of one fragment. Only possessors uploading data for the first time need to carry out such calculation and distribution of secrete sharing, and then people possessing the same data copies do not need to calculate and store the sharing any longer. When the data copies are restored, users must access the storage servers with the minimum quantity to reconstruct the data through authentication and acquisition of the secret sharing. In other words, the secret sharing of the data can only be accessed by the users who possess the same copies and are authorized.

Description

technical field [0001] The invention relates to a cloud storage service in the computer field, in particular to a safe distributed duplicate data deletion method. Background technique [0002] Data deduplication technology is widely used in data backup to reduce network and storage overhead, and it does this by detecting and eliminating data redundancy. Data deduplication technology eliminates data redundancy, leaving only one physical copy instead of multiple copies of the same content. At present, many data deduplication technologies have emerged, and they are based on various deduplication strategies, such as client-side or server-side deduplication, file-level or block-level deduplication, and so on. Especially when the era of cloud computing comes, the growing data problems faced in cloud storage make many enterprises and groups outsource data storage to third-party organizations. In this case, data deduplication technology is extremely critical. Many commercial cloud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
Inventor 陈晓峰尤沛李进李柏晴
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products