Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting confidentiality of file distributed and stored at plurality of storage service providers

一种存储服务、保密性的技术,应用在云存储领域

Inactive Publication Date: 2015-02-11
ALCATEL LUCENT SAS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this solution is that each storage provider has access to the blocks it stores

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting confidentiality of file distributed and stored at plurality of storage service providers
  • Method for protecting confidentiality of file distributed and stored at plurality of storage service providers
  • Method for protecting confidentiality of file distributed and stored at plurality of storage service providers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] figure 1 A first step common to the three embodiments of the method for protecting files according to the invention is illustrated. For example, consider a typical user who has a device with limited storage (eg, a mobile phone or tablet) and wants to outsource the storage of large files. Assume that the user knows the m available storage service providers that he / she can use, since he / she already has an account and related contracts.

[0090] The proposed method requires the following means in the device:

[0091] 1 / Means for associating a unique identifier ID with each file F to be distributed and stored at the storage service provider. The process can be complex, but the file's path or label or any other known method compatible with the file system architecture can be used.

[0092] 2 / Input means enabling the user to select the security parameter n. This parameter can be different for each file: larger values ​​of n involve more calculations but are also safer. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This method comprises the steps of: - choosing (1) a security parameter n, - segmenting (2) the file in n chunks S 1 ,...,S n , - randomly choosing (3) n 2 coefficients a ij for i = 1,..., n and j = 1,..., n, - verifying (3) that the vectors a i1 ,...,a in , for i = 1,..., n, are linearly independent, otherwise generating the coefficients again, - computing (4) n linear combinations C i = a i1. S 1 + ... + a ij .S j + ... + a in .S n , for i = 1, ..., n, - choosing (5) n storage service providers O i , ..., On among said plurality of storage service provider, - generating (6a; 6b; 6c) n file identifiers ID' 1 , ..., ID' n designating said file (F), - storing (6a; 6b; 6c) the combination C i at the storage service provider O i in association with the file identifier ID' i , for i = 1, ..., n, - storing the file identifier ID' i and the provider identifier O i , for i = 1,..., n, in a file descriptor corresponding to the file (F), this file descriptor being stored in a local memory (LM), - and storing the set of coefficients a i1 , ..., a in SO that it can be re-associated with the combination C i , for i = 1, ..., n.

Description

technical field [0001] The present invention generally relates to protecting the confidentiality of files distributed and stored at multiple storage service providers. Specifically, cloud storage is involved. Cloud storage is a model of networked online storage where data is stored in a virtual pool of storage, usually hosted by a third party. Hosting companies operate large data centers, and people who need to host their data buy or lease storage capacity from the hosting company. In this context, data center operators virtualize resources according to customer requirements and present them as storage pools that customers themselves can use to store files or data objects. Physically, this resource can span multiple servers. [0002] If precautions are not taken, all stored data can be accessed by operators who may use it maliciously (e.g. to resell the information to the customer's competitors). Furthermore, even if the cloud operator is honest, the confidentiality of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F17/30G06F3/06
CPCG06F2221/2149G06F21/6209H04L9/0894G06F21/6218G06F3/0607G06F21/6227G06F3/0604G06F3/067G06F3/0605G06F21/6272G06F3/062G06F3/0638G06F21/62G06F21/64
Inventor A·希克法S·帕皮永
Owner ALCATEL LUCENT SAS