Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud data public audit method with deduplication function

A technology of cloud data and functions, applied in the field of network security, can solve problems such as cloud storage security risks, achieve low communication overhead, low calculation, and protect user privacy

Active Publication Date: 2019-10-01
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid increase of data on cloud storage, in order to provide virtual unlimited storage capacity and save bandwidth, deduplication of files is extremely important. However, deduplication of data has its inherent security vulnerabilities. Adversaries can provide file hash value to finally download files that do not belong to you, which brings great security risks to cloud storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud data public audit method with deduplication function
  • A cloud data public audit method with deduplication function
  • A cloud data public audit method with deduplication function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and the accompanying drawings.

[0037] The present invention is based on the theory of public key cryptography, proposes a cloud data public audit method with deduplication function, and is applied to cloud storage environments with high security requirements. When a cloud user stores a file, first upload the file hash value, and the cloud server judges whether the file already exists in the server. If it already exists, the user does not need to upload the entire file, saving user bandwidth, and the cloud server will provide file ownership to the user Verify that the cloud user actually owns this file. When a cloud user wants to verify the integrity of cloud data, it sends an audit request to the audit server. The audit server uses the challenge response method to verify t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data public audit method with a deduplication function, and belongs to the technical field of network security. The invention includes: the CA server sets system parameters, and after the user rents the storage space of the cloud server, he applies for a public-private key pair from the CA server; If the file already exists in the server, the cloud server will verify the ownership of the challenge information sent by the cloud user, and verify whether the user really owns the data file according to the response. Otherwise, the cloud user uploads the file and the label to the cloud server; in addition, the audit server can verify the integrity of the data in the cloud server according to the user's request. The present invention uses a round of asymmetric key agreement algorithm to realize data integrity verification and zero-knowledge privacy protection. We also add practical data deduplication technology, which greatly improves the utilization rate of cloud servers.

Description

Technical field [0001] The invention belongs to the technical field of network security, and specifically relates to a cloud data public audit method with a deduplication function. Background technique [0002] Cloud computing is another new computing model following grid computing, peer-to-peer computing, utility computing, and distributed computing. It can provide a large amount of low-cost, on-demand storage and computing resources. It is an important innovation in information technology. [0003] Cloud storage is a new concept extended and expanded from the concept of cloud computing, and is the most basic service provided by cloud computing. Through cluster applications, grid technology, and distributed file system functions, various storage devices of different types in the network are assembled to work together through application software, and have the function of providing external data storage and business access. Powerful computing and storage capabilities also make use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32H04L29/08G06F21/64G06F21/62G06F21/60G06F16/174
CPCG06F16/122G06F16/1748H04L9/0869H04L9/3221H04L9/3236H04L63/0442H04L67/06H04L67/1097
Inventor 禹勇薛靓臧力李艳楠邱佳惠陈垚彤吴淮
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products