Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted data dereplication method for cloud storage

A technology for encrypting data and cloud storage. It is used in digital data protection, electronic digital data processing, and special data processing applications. It can solve problems such as deduplication of ciphertext data and achieve the effect of protecting confidentiality.

Active Publication Date: 2017-05-03
深圳市中盛瑞达科技有限公司
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if you want to deduplicate the ciphertext data, you will face many technical difficulties
The primary problem to be solved is how to judge whether multiple ciphertexts come from the same plaintext, that is, the problem of duplication detection of confidential data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data dereplication method for cloud storage
  • Encrypted data dereplication method for cloud storage
  • Encrypted data dereplication method for cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In order to make the whole invention clear, the present invention is specifically explained in conjunction with the following steps:

[0012] Step 1: Generate file identification and conduct preliminary verification. The specific content is as follows:

[0013] The user's file F is not encrypted before uploading. First, the file properties (property) including file type, file name, file summary and other information are hashed to obtain the file's property label: h(F P ), if there is the same attribute tag in the cloud space, it will prompt whether to confirm the upload, and if the upload continues, it will enter the follow-up process.

[0014] Step 2: Divide the file into blocks and generate the feature set of the data block. The specific content is as follows:

[0015] Divide the file F into n data blocks {F i}, 1≤i≤n, and then calculate the hash value of each data block that is the identity:

[0016]

[0017] Represents the characteristics of the i-th data bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention mainly relates to the field of replicated ciphertext data detection and deletion in the environments of cloud storage and big data, and provides an encrypted data dereplication method for cloud storage. The method adopts the technical scheme that through a comparison between identification data generated from hash creation of a file abstract and a file in a database of a cloud service provider, obtaining a result of whether the file is replicated or not; if the file is replicated, uploading different file blocks or canceling file uploading; and if the file is not replicated, carrying out blocking, hashing and verification data generation on the file, and then finally uploading ciphertext data without identical file blocks and tag information. The method has the advantages that through the operation, the ciphertext data can be dereplicated while data confidentiality can be protected, and file privacy disclosure caused by violent search attacks through data blocks can be prevented; and due to the two-stage data dereplication, the network transmission flow can be effectively reduced, and attacks from vicious cloud service providers can be resisted.

Description

technical field [0001] The invention relates to the field of repeated ciphertext data detection and deletion in cloud storage and big data environments. [0002] technical background [0003] With the development of information technology and network technology, big data and massive data have become the main business of data centers, and deduplication and compression of duplicate data is a technology that can save a large amount of data storage. Data deduplication is a compression technique that minimizes the amount of data by identifying duplicate content, deduplicating it, and leaving a pointer in the corresponding storage location; this pointer is created by hashing a data pattern of a given size. [0004] For users who lease cloud space, a large amount of duplicate data is flooded in the cloud space, which not only causes trouble for retrieval, but also wastes valuable cloud resources and generates additional overhead. Therefore, the present invention introduces the theo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30G06F21/62
Inventor 范勇胡成华
Owner 深圳市中盛瑞达科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More