Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception

A technology for secure data and users, applied in transmission systems, electrical digital data processing, special data processing applications, etc., can solve problems such as private key single point of failure, large key space overhead and single point of failure, huge computing overhead, etc. To achieve the effect of ensuring confidentiality and security, preventing single point failure problems, and reducing computing overhead

Active Publication Date: 2015-09-16
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The DupLESS method is only suitable for file-level deduplication, and there is a huge computational overhead for block-level deduplication
Second, cutting-edge convergent key management schemes have many limitations, including huge key space overhead and single points of failure
At the same time, in order to ensure the security of the key, users usually use their own private key to encrypt the key of the data block, so that the user's private key has a single point of failure problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception
  • Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception
  • Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0042] Such as figure 1 As shown, it is an architecture diagram of the user-perceived-based efficient security data deduplication system of the present invention. The system of the present invention includes three components: users (clients), storage service providers and distributed key servers, which are connected through an enterprise-level network, and secure network transmission protocols ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an efficient and safe data deduplication method based on user perception, which comprises the steps that a client adopts key server assisted Hash-based convergence encryption to carry out file-level data deduplication across users; if duplication does not exists in files, user assisted convergence encryption is adopted to carry out block-level deduplication inside the users; and multilevel key management is adopted, a file-level secret key is used to encrypt a block-level secret key, the file-level secret key is segmented into fragment-level secret keys by using secret sharing, and the fragment-level secret keys are stored in a distributed key server. The invention further provides an efficient and safe data deduplication system based on user perception. According to the invention, random information is added through adopting key server assisted Hash-based convergence encryption in a file level and adopting user assisted convergence encryption in a block level, thereby enabling file-level secret keys and block-level secret keys of users to be randomized, being capable of effectively resisting brute force attacks of opponents, and ensuring the data confidentiality and the safety of the users; and the multilevel key management scheme is adopted to ensure the safety of secret keys, and the secret key space overhead is reduced.

Description

technical field [0001] The invention belongs to the field of computer storage, and more specifically relates to a method and system for deduplication of efficient and secure data based on user perception. Background technique [0002] In recent years, with the rapid development of cloud computing, more and more users and enterprises back up their data to cloud storage. IDC predicts that by 2020, the scale of global electronic data will exceed expectations, reaching 44ZB. A large number of recent studies and investigations have shown that there is a large amount of duplicate data among different users and within users in storage systems, especially in backup systems. The growth of online digital content has led to an increase in the cost of storage systems including hardware and human maintenance. It is extremely important to reduce the amount of data in the process of transmission and storage management. Cloud backup systems usually store and operate several copies of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06F17/30
Inventor 冯丹周玉坤夏文付忞黄方亭张宇成李春光
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products