Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data deterministic deletion method based on inversion of random positions of data blocks

A random position and deletion method technology, which is applied in the direction of electrical digital data processing, computer security devices, serial/continuous modification of data streams, etc., can solve the problems that attackers are not easy to obtain keys, huge overhead, and no small storage pressure , to achieve the effect of reducing data leakage, reducing possibility, and reducing overhead

Active Publication Date: 2020-07-03
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, most schemes consider storing keys more securely, making it difficult for attackers to obtain keys
However, due to the huge overhead and cost of keeping the key, it will cause no small storage pressure
The key can only decrypt the encrypted ciphertext. Once the ciphertext is destroyed, even if the key is obtained, the attacker will have no way to recover the plaintext.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data deterministic deletion method based on inversion of random positions of data blocks
  • A data deterministic deletion method based on inversion of random positions of data blocks
  • A data deterministic deletion method based on inversion of random positions of data blocks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following describes the data access process in the present invention in more detail in conjunction with the accompanying drawings:

[0046] In the present invention, the data access process is divided into four stages: data block stage, encrypted upload stage, legal user data access stage and data owner deletion stage.

[0047] (1) In the system data plaintext data {M}, the data owner uses the Data(M) algorithm to block the plaintext data to obtain n plaintext data blocks {M i}.

[0048] (2) Each data block is 128 bits, and when the last block is less than 128 bits, it is filled with 0.

[0049] (3) A flag is introduced to record whether to perform filling operation for the nth data block. If the nth data block is filled with data, the flag value is set to 1, otherwise it is set to 0.

[0050] (4) The data owner generates the key k required for encryption.

[0051] (5) Encrypt each plaintext data block. The plaintext data block encryption algorithm is expressed a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data deterministic deletion method based on random negation of a data block. According to the method, by carrying out block encryption on cleartext data and carrying out an operation of random position negation on cleartext, a cloud end does not store the complete cleartext. The method is wide in application condition, and allows a key to be leaked in an active or passivecase, and thus, a method of encrypting each cleartext data block by a single key is adopted and key preservation cost is reduced. Compared to other data deterministic deletion schemes, the method is briefer in step and wider in application condition.

Description

[0001] (1) Technical field [0002] The invention relates to the field of cloud data security, in particular to a data deterministic deletion method based on inversion of random positions of data blocks. [0003] (2) Background technology [0004] The purpose of data deterministic deletion is to make the data that the user wants to delete permanently inaccessible, thereby ensuring data security. In order to improve the reliability of cloud services, cloud service providers usually make multiple backups of data, and there is a possibility of active or passive leakage of user data. However, often the data deleted by the user is only logically marked for deletion, but is not actually deleted. Therefore, after the user performs a deletion operation, how to ensure that the user's data is permanently inaccessible is of great significance. [0005] In order to ensure the security of user data, user data is encrypted before being uploaded to the cloud, and then the ciphertext is stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCG06F21/6218G06F2221/2141H04L9/065H04L63/0428
Inventor 姚文斌陈宜洁杨奕慰郭珍
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products