A Safe and Effective Client Deduplication Method Based on Possession Proof

A client-side, safe technology, applied in the field of communication, can solve problems such as potential safety hazards

Active Publication Date: 2020-09-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Judging whether the data is repeated using the above method brings a great security risk to data deduplication. The attacker only needs to steal the hash value of the file to prove to the cloud server that he owns the file. At the same time, the cloud server adds the attacker to the The file owner list, and then the attacker requests the specific content of the file from the cloud server to steal the entire file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with examples.

[0027] This embodiment provides a secure and effective client deduplication protocol based on proof of possession, including:

[0028] Initialization: This protocol includes three subjects, namely the client, the key server and the cloud server; the system initializes the security factor, and the key server selects its own private key and public key for communication with the client; secondly, the cloud server selects its own private key and public key;

[0029] The client interacts with the key server to obtain the encryption key of the file: in order to obtain the encryption key of the uploaded file, the client needs to communicate with the key server; the client first uses the hash function to process the message to be uploaded, and then blindly The key server signs the blinded message with its own private key, and then returns the signature to the client, and the client verifies t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and effective client deduplication protocol based on proof of ownership, which belongs to the technical field of communication. The present invention includes: system initialization safety factor and parameter, client and key server communication obtain the key of encrypted file through blind signature, cloud server and client communication implementation challenge-response mechanism; Key server introduces Rate-limiting strategy, limits The number of times the client initiates requests to the key server within a certain period of time; the invention of this scheme resists exhaustive attacks and spoofing attacks, ensuring the security and efficiency of the proof-of-possession protocol; the invention can improve the efficiency of authentication and save storage space , guaranteeing a constant communication cost.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a safe and effective client deduplication protocol based on proof of ownership. Background technique [0002] Proofs of Ownership (Proofs of Ownership) is a proof technology for the client to prove to the cloud server that it owns the entire data file instead of part of the data or a simple hash value of a file. In the proof of possession technology, the communication between the client and the cloud server adopts a challenge-response mechanism. The cloud server initiates an inquiry, the client responds, and finally the cloud server verifies whether it is established. [0003] In the era of data explosion, more and more users choose to store data in cloud servers. In order to reduce storage costs, cloud servers only store one copy of the same data. Client-side deduplication means that the client judges whether the data is duplicated with the cloud server data w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06H04L9/08
CPCH04L9/0643H04L9/0869H04L63/0428H04L67/06
Inventor 许春香李闪闪张源薛婧婷李闯
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products