Key management method based on convergence encryption for use in cloud storage data duplication elimination

A technology of convergent encryption and key management, applied to encryption devices with shift registers/memory, key distribution, can solve problems such as single point failure, inability of key storage management to be fault-tolerant, etc., and achieve the effect of reducing storage overhead

Inactive Publication Date: 2016-11-09
GUANGDONG UNIV OF TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, such as key storage management cannot be fault-tolerant, single-point failure...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method based on convergence encryption for use in cloud storage data duplication elimination
  • Key management method based on convergence encryption for use in cloud storage data duplication elimination
  • Key management method based on convergence encryption for use in cloud storage data duplication elimination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A key management method Dekey based on convergent encryption in cloud storage data deduplication, comprising:

[0036] A. Add n key servers in the cloud storage system, and the server is used to store the key sharing share distributed by the client, wherein the key sharing share is performed by the client based on (n, k, r)-RSSS Share Algorithm, the original key is divided and encoded; the key recovery algorithm is the Recover algorithm, which restores the shared share to the original key S; the shared key share of any k (k

[0037] B. According to the distributed management method of the deduplication key in the cloud storage system, the deduplication management of the converged key a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a key management method based on convergence encryption for use in cloud storage data duplication elimination. The method comprises the following steps: adding n key servers into a cloud storage system, wherein the servers are used for storing key shares distributed by a client, and the key shares are obtained by the client in a way of executing a Share algorithm based on (n, k, r)-RSSS, segmenting an original key and performing encoding, a key recovery algorithm is a Recover algorithm for recovering the shares into an original key S, the key shares of any k (k is less than n) servers can be recovered to the original key S, a part of n servers are allowed to fail or be damaged but safe running of k (exceeding a minimum threshold) servers needs to be ensured, and r pseudo-random shares are generated by the Share algorithm to replace random shares of RSSS; and performing duplication elimination management on convergence keys according to a key distributed management method for use in cloud storage system duplication elimination, and executing a duplication elimination operation on file data blocks to be stored.

Description

technical field [0001] The invention relates to key management technology of cloud storage, in particular to a key management method based on convergent encryption in deduplication of cloud storage data. Background technique [0002] Data deduplication is a technology that deletes redundant copies of data and ensures that only one copy of the same data file is stored. Data deduplication technology is widely used in cloud storage systems, which can reduce storage space and upload bandwidth. The classification methods of data deduplication include: (1) from the granularity of deduplication: data deduplication can be divided into data block layer deduplication and file level deduplication; (2) from the perspective of deduplication location: data deduplication Deduplication can be divided into client-side deduplication and server-side deduplication; (3) From the stage of deduplication: data deduplication can be divided into online deduplication and post-deduplication; (4) From ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L29/08
CPCH04L9/0643H04L9/085H04L67/1097
Inventor 刘竹松尹勤勤李进
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products