Client secure deduplication method of ciphertext data in cloud storage

A client and cloud storage technology, applied in the field of cloud storage and information security, can solve problems such as key management difficulties and security vulnerabilities

Active Publication Date: 2016-09-14
NANJING UNIV OF SCI & TECH
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a big security problem in client data deduplication: an attacker may be able to obtain the download permission of the corresponding file from the cloud with a single file hash value
However, there are big security holes in convergent encryption, such as dicti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client secure deduplication method of ciphertext data in cloud storage
  • Client secure deduplication method of ciphertext data in cloud storage
  • Client secure deduplication method of ciphertext data in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described in detail below in conjunction with the accompanying drawings and implementation examples. The following examples are implemented on the premise of the technical solutions of the present invention, and detailed implementation methods and processes are given, but the protection scope of the present invention is not limited to the following examples.

[0061] The present invention provides a client-side security deduplication method for ciphertext data in cloud storage. The system model of the method is as follows: figure 1 As shown, there are three types of entities: cloud service provider (Cloud Service Provider, CSP), key server (KeyServer, KS), user (Users). Among them, CSP is composed of a main server and a storage server, which has sufficient storage space and computing power to provide users with data storage and de-duplication verification services. The KS interacts with the user to re-encrypt the blinded converged ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a client secure deduplication method of ciphertext data in cloud storage. The method comprises the following steps of: (1) key generation; (2) file initialization; (3) data block initialization; (4) data block verification; (5) file storage; (6) challenge generation; (7) proof generation; (8) proof verification; and (9) file decryption. According to the method of the invention, a secure key generation protocol is constructed based on blind signature, and therefore, secondary encryption of convergence keys is realized, and the security of the keys can be ensured; and a signature-based ownership proving method is put forward based on the above encryption, and with the method adopted, it can be ensured that a user can prove his or her ownership of a certain file in the could storage to a could server in a safer and more efficient way, and file-level and block-level deduplication of a ciphertext file can be realized.

Description

technical field [0001] The invention relates to the technical field of cloud storage and information security, in particular to a client-side security deduplication method for ciphertext data in cloud storage. Background technique [0002] With the widespread use of cloud storage services, more and more enterprises and individuals outsource their data information to cloud service providers (Cloud Service Provider, CSP), which will generate a large amount of redundant data in the cloud. Therefore, a severe challenge that cloud service providers will face is how to efficiently manage the continuously increasing data. [0003] To this end, the researchers proposed a client-side data de-duplication technology, which enables the CSP to store the same file only once, and all users who own the file can only access the file through that unique copy. More specifically, CSP only executes the storage of data files when it receives the first user upload request; for subsequent upload r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0869H04L9/3247H04L63/067H04L63/0807H04L63/083H04L63/1441H04L67/06H04L67/1097
Inventor 付安民宋建业苏铓朱一明丁纬佳
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products