Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A client-side deduplication method for encrypted data blocks supporting data update

A technology for encrypting data and updating data, which is applied in the computer field, and can solve problems such as low efficiency in decrypting file block ciphertext, inability to support users to update file blocks, and no method for file ownership authentication.

Active Publication Date: 2019-11-15
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcomings of this method are: the key in this method is randomly generated by the user, which cannot resist the content spoofing attack initiated by the first uploader of the file, the security is low, and this method does not support file block level deduplication , the deduplication granularity is small, and the deduplication ratio is low
The shortcomings of this method are: using bilinear algorithm and exponential operation, the calculation complexity is high and the efficiency is low; it cannot support the user's update operation on the file block. If the user wants to update the cloud backup file, he needs to upload the update. The entire file, not just the file block that needs to be updated, thus wasting user upload bandwidth and upload time
The shortcomings of this scheme are: large-scale insertion and deletion operations will lead to an imbalance in the homomorphic authentication structure, thus losing the efficiency of binary search; this method does not support deduplication of encrypted file blocks, and the deduplication ratio is low
The shortcomings of this method are: no safe and efficient file ownership authentication method is proposed, resulting in a large number of repeated file block uploads, wasting user bandwidth; the iterative convergence encryption algorithm is used to calculate the file block ciphertext, so that the decryption process of the file block ciphertext Low efficiency; due to its own structural limitations, Merkle Tree only supports leaf node modification and update, and does not support leaf node insertion and deletion updates. Therefore, it cannot fully meet the user's update requirements for file blocks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A client-side deduplication method for encrypted data blocks supporting data update
  • A client-side deduplication method for encrypted data blocks supporting data update
  • A client-side deduplication method for encrypted data blocks supporting data update

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0085] Attached below figure 1 Further detailed description is made on the steps realized by the present invention.

[0086] Step 1, the first uploader of the file encrypts the data block.

[0087] The first uploader of the file uses the 256-bit secure hash algorithm SHA256, takes the plaintext file as input, calculates the key of the plaintext file, and uses the key of the plaintext file as input to calculate the label of the plaintext file.

[0088] The 256-bit secure hash algorithm SHA256 refers to: the 256-bit one-way hash algorithm SHA256 specified in the federal information processing standard FIPS PUB 180-3 issued by the National Institute of Standards and Technology, applicable to 64 Binary message.

[0089] The first uploader of the file divides the plaintext file into blocks with a length of 4kb to generate multiple plaintext file blocks.

[009...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data update-supported deduplication method for an encrypted data block client. A convergence encryption algorithm is adopted, so that the same plaintext file blocks after encryption are mapped into the same ciphertext file blocks, a novel dynamic balance skip list is constructed as a file ownership authentication structure, and file ownership authentication interaction isperformed on a server and a subsequent uploader of files to achieve the deduplication of the encrypted data block client. A dynamic balance skip list self-balancing method is proposed, and nodes in the dynamic balance skip list are modified, inserted and deleted according to the dynamic operation instruction uploaded by a user and the authentication value of the plaintext file blocks to be updated; the method improves the deduplication ratio of the server and storage resource utilization rate, saves user bandwidth and upload time, and supports data block update to achieve server-side data flexible management.

Description

technical field [0001] The invention belongs to the technical field of computers, and further relates to a deduplication method of an encrypted data block client supporting data update in the technical field of information security. The present invention can be used in a cloud storage system that supports deduplication and update of encrypted data blocks, not only can improve the deduplication ratio, save upload bandwidth of users and storage space of servers, but also support user's update operation of file blocks, and realize flexible data management. Background technique [0002] Cloud storage data deduplication technology is widely used in data backup to reduce network and storage overhead. This technology eliminates data redundancy, leaving only one physical copy rather than multiple copies of the same content. Data deduplication technology is based on different deduplication strategies, which can be divided into client-side or server-side deduplication, file-level or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 刘茂珍杨超杨力张俊伟马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products