An efficient security data deduplication method and system based on user perception

A technology for securing data and users, applied in transmission systems, electrical digital data processing, special data processing applications, etc., and can solve problems such as huge computational overhead, private key single point of failure, large key space overhead and single point of failure, etc. Achieve the effect of preventing single point of failure problems, guaranteeing confidentiality and security, and reducing computational overhead

Active Publication Date: 2017-11-10
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The DupLESS method is only suitable for file-level deduplication, and there is a huge computational overhead for block-level deduplication
Second, cutting-edge convergent key management schemes have many limitations, including huge key space overhead and single points of failure
At the same time, in order to ensure the security of the key, users usually use their own private key to encrypt the key of the data block, so that the user's private key has a single point of failure problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An efficient security data deduplication method and system based on user perception
  • An efficient security data deduplication method and system based on user perception
  • An efficient security data deduplication method and system based on user perception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0042] Such as figure 1 As shown, it is an architecture diagram of the user-perceived-based efficient security data deduplication system of the present invention. The system of the present invention includes three components: users (clients), storage service providers and distributed key servers, which are connected through an enterprise-level network, and secure network transmission protocols ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an efficient and secure data deduplication method based on user perception, including: the client adopts hash-based convergent encryption assisted by a key server to deduplicate cross-user file-level data; Convergent encryption performs block-level deduplication within users; adopts multi-level key management, uses file-level keys to encrypt block-level keys, and uses secret sharing to divide file-level keys into shard-level keys and store them in distributed keys server. The invention also provides an efficient security data deduplication system based on user perception. The present invention adds random information by using hash-based convergent encryption assisted by a key server at the file level and user-assisted convergent encryption at the block level to randomize the user's file-level and block-level keys, which can effectively resist the opponent's Brute force cracking attacks ensure the confidentiality and security of user data; a multi-level key management scheme is used to ensure key security and reduce key space overhead.

Description

technical field [0001] The invention belongs to the field of computer storage, and more specifically relates to a method and system for deduplication of efficient and secure data based on user perception. Background technique [0002] In recent years, with the rapid development of cloud computing, more and more users and enterprises back up their data to cloud storage. IDC predicts that by 2020, the scale of global electronic data will exceed expectations, reaching 44ZB. A large number of recent studies and investigations have shown that there is a large amount of duplicate data among different users and within users in storage systems, especially in backup systems. The growth of online digital content has led to an increase in the cost of storage systems including hardware and human maintenance. It is extremely important to reduce the amount of data in the process of transmission and storage management. Cloud backup systems usually store and operate several copies of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06F17/30
Inventor 冯丹周玉坤夏文付忞黄方亭张宇成李春光
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products