Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage data de-duplication method supporting efficient convergence key management

A key management and cloud storage technology, applied in the fields of cloud storage data deduplication and data security outsourcing, can solve the problems of inability to resist cloud server collusion attacks, high computing and communication overhead, deceiving directory servers, etc., to save computing and Communication overhead, convenient and efficient use of keys, and effect of saving storage resources

Active Publication Date: 2018-09-04
XIDIAN UNIV
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing basic method is that the user encrypts the convergence key with his own master key and stores it on the cloud. However, as the scale of users and data increases, it will bring the burden of key management to the user and at the same time, a large number of convergence keys Duplicate storage itself is a kind of data redundancy
In response to this problem, Li et al. (Li J, Chen X, Li M, et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel&Distributed Systems,2014,25(6):1615-1625.) A deduplication scheme that supports efficient convergence key management is proposed. This scheme adopts threshold secret sharing technology to allow users to distribute and store their convergence keys in distributed cloud storage. However, this scheme cannot resist the collusion of cloud servers exceeding the threshold number. Channels that are attacked and require the distribution of secret shares are secure
Kwon et al. introduced a complete The trusted directory server proposes to divide the convergence key into three secret components and store them in different entities. This method solves the problem of open channels, but faces the problem of users colluding with the cloud storage server to deceive the directory server. And the computational and communication overhead is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data de-duplication method supporting efficient convergence key management
  • Cloud storage data de-duplication method supporting efficient convergence key management
  • Cloud storage data de-duplication method supporting efficient convergence key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0033] The usage scenario of the present invention includes three valid entities:

[0034] Cloud Storage Server (CS): CS provides storage and computing services to users, with powerful computing capabilities and huge storage space. Generally, users will purchase storage space from cloud servers in the form of leasing, and store their own data on the cloud for future use.

[0035] Directory Server (IS): As a trusted entity, IS provides indexes for users and their data, can fairly prove data ownership, and can ensure the consistency of data, keys, and ciphertexts.

[0036] User (U): A user can be an individual or an enterprise, who has a large amount of data that needs to be stored on the cloud, and relies on the cloud for data maintenance and management and related calculations.

[0037] refer to figure 1 , the implementation steps of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud storage data de-duplication method supporting efficient convergence key management, mainly solving the problems of low security strength and difficult management of a convergence key in existing cloud storage de-duplication technology. The method is realized by the following scheme that: a data owner interacts with a directory server for repeated data check; for thedata failing to de-duplicate, an original data uploader randomly selects a key to perform data encrypted uploading, and distributes and shares the data key; for the de-duplicated data, the user decrypts by a data certificate of ownership to obtain the data key, and detects the consistency of the data and the label; and the data downloading and decryption is performed when the user needs to use the data self-stored in the cloud storage server. The invention reduces the key management load of the user while eliminating redundancy, reduces the computation and communication overhead and improvesthe de-duplication efficiency of the cloud storage data, and is applicable to data security outsourcing under the environment of cloud computing.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a cloud storage data deduplication method capable of supporting efficient convergent key management, which can be used for data security outsourcing in a cloud computing environment. Background technique [0002] With the rapid development of cloud computing technology, more and more enterprises and individuals store their own data in the cloud. With the growth of cloud storage scale, a large amount of data is stored repeatedly, which has caused great damage to the storage resources of cloud servers. waste. Data deduplication technology is a very important method of data management and storage optimization in cloud storage. Data redundancy can be eliminated through data deduplication, and only one physical copy of the same data is kept, thereby effectively reducing the bandwidth consumed by the client to upload data and saving the server. storage. Convergent encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/085H04L9/3236H04L67/1097
Inventor 王亮王保仓刘鹤群
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products