Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A cloud data deduplication and integrity audit method based on convergent encryption

A technology of convergent encryption and integrity, applied in the field of cloud storage and information security, which can solve problems such as signature redundancy

Active Publication Date: 2020-04-10
NANJING UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the signatures required for audit certification are all generated by the signature private key and file information randomly generated by the user, so for the redundant data original text between users, the corresponding signature will inevitably appear redundant, so cloud storage will store A large number of redundant signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud data deduplication and integrity audit method based on convergent encryption
  • A cloud data deduplication and integrity audit method based on convergent encryption
  • A cloud data deduplication and integrity audit method based on convergent encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described in detail below in conjunction with the accompanying drawings and implementation examples.

[0061] The present invention provides a cloud data deduplication and integrity audit method based on convergent encryption. The system model of the method is as follows figure 1 As shown, there are three types of entities: client (Client), cloud storage server (CloudStorageProvider) and trusted third party (Trusted Third Party). Among them, CSP is composed of a main server and a storage server, which has sufficient storage space and computing power to provide users with private data storage and repeated authentication and audit authentication services. TTP interacts with users, securely encapsulates / uncapsulates the convergence key, stores the audit public key and acts as an agent for auditing. Client includes many ordinary users, and using the services provided by cloud storage is also an important part of security authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data duplication elimination and integrity auditing method based on convergence encryption. According to the method, through adoption of a convergence key encapsulation / de-encapsulation algorithm based on blind signatures, convergence keys can be securely stored and moreover convergence key duplication elimination can be realized; and through utilization of a BLS signature algorithm based on the convergence keys, auditing public keys are stored by a trusted third party TTP, the TTP carries out proxy auditing, and duplication elimination of auditing signatures and the auditing public keys is realized. The method comprises the specific steps of carrying out system initialization; carrying out key initialization; carrying out file initialization; carrying out authentication evidence initialization; carrying out key encapsulation; carrying out data storage; carrying out duplication challenge; carrying out duplication response; carrying out duplication authentication; carrying out request auditing; carrying out proxy auditing; carrying out auditing response; carrying out auditing authentication; and carrying out file downloading. According to the method,a utilization rate of a cloud storage space is improved, the duplication elimination of auditing signatures and the auditing public keys is realized, and the storage and computing cost of a client arereduced.

Description

technical field [0001] The invention relates to the technical field of cloud storage and information security, in particular to a cloud data deduplication and integrity audit method based on convergent encryption. Background technique [0002] With the widespread application of cloud storage services, more and more users store data in the cloud. According to EMC research, about 75% of cloud storage space is occupied by duplicate data, and because cloud servers are "semi-trusted", how to eliminate redundant data while protecting data privacy has become a serious problem in the development of cloud storage applications; In addition, since data is stored in the cloud, users lose control of the data, so it is impossible to determine whether the data in the cloud is complete. Therefore, how to efficiently verify data integrity is also an issue that needs to be considered in cloud storage security. [0003] To solve the problem of how to deduplicate cloud privacy protection data,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06F21/64
CPCG06F21/645H04L9/083H04L9/3252H04L9/3257H04L9/3271H04L63/123
Inventor 付安民郭晓勇苏铓周磊陈珍珠丁伟佳
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products