Unlock instant, AI-driven research and patent intelligence for your innovation.

Client-side deduplication method

A technology of deduplication and client-side, applied in the field of information security, can solve the problems of factors that ensure the freshness of authentication, the security of the scheme is difficult to prove, and cannot resist replay attacks. sexual effect

Active Publication Date: 2018-11-20
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this file ownership authentication scheme has two disadvantages: first, the scheme requires the client to frequently perform extremely time-consuming I / O requests and consume a large amount of computing resources; second, the security of the scheme is based on assumptions that are difficult to prove
This scheme uses the hash value of file ciphertext as evidence of file ownership, but there are two problems in terms of security and practical efficiency: First, the authentication process of file ownership lacks freshness: the hash value of the same file ciphertext is the same , for multiple users who own the file, the same hash value is uploaded to the server every time the file ownership authentication is performed, there is no factor to ensure the freshness of the authentication, and it cannot resist replay attacks; second, file encryption is inefficient: use A relatively large file is used as a key to encrypt and decrypt a relatively short content, which requires a large amount of computation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client-side deduplication method
  • Client-side deduplication method
  • Client-side deduplication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Symbols and abbreviations:

[0041] F is the file owned by FU, the first file uploader;

[0042] τ is the first file encryption key randomly generated by the first file uploader FU;

[0043] C F The ciphertext of the first file obtained by encrypting F for the first file uploader FU;

[0044] δ is the first key extracted from F by the first file uploader FU;

[0045] C τ The ciphertext obtained by encrypting the first file encryption key τ for the first file uploader;

[0046] SHA-1 is a secure hash algorithm (Secure Hash Algorithem);

[0047] MLE is the information locking encryption algorithm;

[0048] hash(F) is the hash value of file F;

[0049] F'is the file owned by the subsequent file uploader SU;

[0050] hash(F') is the hash value of file F';

[0051] β is the random number generated by the server;

[0052] δ'is the second key extracted from F'by the subsequent file uploader SU;

[0053] τ'decrypts C for the subsequent file uploader SU τ The obtained second file encryption key; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a client data deduplication method, which mainly solves the problems of low security and large operand of the prior art. The method comprises the following implementation steps that (1) a key is extracted by utilizing an efficient encryption algorithm based on information lock MLE and the key is used to encrypt an encryption key; (2) timeliness and effectiveness for each authentication of file ownership are guaranteed through introducing a random number, even if an attacker intercepts a hash value of a ciphertext of a file, the attacker cannot authenticate the file ownership timely, so that a purpose of resisting the replay attack is realized; and (3) a server grants the file ownership for a user passing authentication of the file ownership and informs the user to delete the local file. According to the method, the replay attack can be effectively resisted under the scene of encryption data deduplication, the security of user data is improved, and meanwhile, the operand in encryption and decryption processes is reduced, the efficiency for data deduplication is improved, and the method can be used for storage service of the cloud computing encryption file.

Description

Technical field [0001] The invention belongs to the technical field of information security, and particularly relates to a method for deleting duplicate data at a client end, which can be used in cloud computing encrypted file storage services. Background technique [0002] With the increasing development of cloud computing technology, more and more individuals and enterprises have begun to use cheap and convenient cloud services to transfer computing and storage. In this mode, a large amount of redundant data is bound to be generated. In order to save the upload bandwidth of users and the storage resources of cloud service providers, "duplication" technology is proposed. This technology can ensure the uniqueness of the data stored in the server at the block or file level to reduce data redundancy. [0003] According to the timing of the application of deduplication, the classification of "duplication" technology includes client-side deduplication and server-side deduplication. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/0428H04L63/08H04L63/1441
Inventor 纪倩杨超李兴华马建峰王旭张鹏
Owner XIDIAN UNIV