Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data deduplication system with ownership management for cloud ciphertext storage and data deduplication method thereof

A technology of ownership and cloud storage, applied in transmission systems, electrical digital data processing, special data processing applications, etc., can solve the problems of repeated forgery attacks, ciphertext substitution attacks, fraudulent server trust, large communication overheads, and computational overheads

Inactive Publication Date: 2018-08-07
JIANGSU UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This process will result in huge communication overhead (upload / download ciphertext) and computational overhead (encryption / decryption operations)
Furthermore, dishonest data owners who only have data tags may deceive the trust of the server, which will cause repeated forgery attacks or maliciously generated ciphertext substitution attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data deduplication system with ownership management for cloud ciphertext storage and data deduplication method thereof
  • Data deduplication system with ownership management for cloud ciphertext storage and data deduplication method thereof
  • Data deduplication system with ownership management for cloud ciphertext storage and data deduplication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0128] In order to evaluate the performance of the present invention, the implementation of the following example is compared with the performance of the existing security deduplication scheme at different stages.

[0129] In this embodiment, the parameters are set as follows: b=16, s=100, l=8, n=16; the file sizes are 16MB, 64MB, 256MB and 1024MB respectively.

[0130] Embodiment performance evaluation is as follows:

[0131] 1) Convergent key generation: such as Figure 4 As shown in , this section evaluates the computational overhead of different schemes in the stage of generating converged encryption keys. It can be seen that the key generation time grows linearly with the file size.

[0132] 2) Data upload: Figure 5(a) is an evaluation of the computational overhead of the original uploader during the data upload phase. It can be seen that the calculation overhead of the present invention is superior to other schemes, and supports single-user data block-level data dedup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data deduplication system with ownership management for cloud ciphertext storage and a data deduplication method thereof. The method includes the steps of installation, datauploading, file level ownership management, data block level ownership management, and data downloading. The scheme of the invention supports deduplication of cross-user file level data and deduplication of single-user data block level data, has security and high efficiency, and can resist pollution attacks and data forgery attacks for the deduplication of the cross-user file level data. In addition, a delayed update strategy in the invention can reduce the data update frequency of the deduplication of the cross-user file level data and reduce the computation overhead of the system while ensuring the forward and backward confidentiality; and a user-assisted convergence encryption method of the invention can implement the deduplication of the single-user data block level data.

Description

technical field [0001] The invention relates to a data deduplication technology, in particular to a data deduplication system with ownership management for cloud ciphertext storage and a data deduplication method thereof. Background technique [0002] With the development and popularization of cloud computing technology, due to its great flexibility and economy, enterprises and individuals are urged to outsource data to cloud service providers. According to the analysis report of Internet Data Center (IDC), by 2020, the total amount of data in the world will reach 44ZB. With the rapid growth of the total amount of data in cloud servers, it is urgent to develop new technologies to efficiently use storage space and network bandwidth. In fact, data deduplication technology has attracted great attention from both industry and academia. For example, Dropbox, SpiderOak, and GoogleDrive have adopted data deduplication technology to reduce storage space consumption, and adopted cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCG06F16/215G06F16/2365H04L63/0428H04L63/0823H04L63/083H04L67/06H04L67/1097
Inventor 姜顺荣王良民孙世璞段梦杰陈向益邬海琴刘湘雯陈潇
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products