High-efficiency data re-encryption method and system supporting data deduplication and cloud storage system

A technology of re-encryption and data, applied in digital transmission systems, encryption devices with shift registers/memory, transmission systems, etc., can solve the problems of consuming users, not considering re-encryption, and huge amount of user data.

Active Publication Date: 2019-02-22
XIDIAN UNIV
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Afterwards, although there are a series of new message locking encryption schemes trying to improve the security of the scheme or provide other new features, and there are already many schemes that can support the dynamic joining and revocation of users, but they do not consider the problem of efficient re-encryption, so they cannot Efficient re-encryption of user data
[0003] To sum up, the problem existing in the existing technology is: many existing schemes can support the dynamic joining and revocation of users, but they do not consider the problem of efficient re-encryption
Since existing solutions usually use traditional encryption schemes to re-encrypt data, however, the amount of user data is often huge. If traditional data encryption is used to re-encrypt data, it will consume a lot of computing resources for users.
At the same time, although some schemes have proposed efficient re-encryption schemes, their schemes cannot solve the user revocation problem, that is, users can still access sensitive information of legitimate users after being revoked from the group
Therefore, it is difficult for existing technologies to achieve efficient data re-encryption while solving the problem of user revocation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-efficiency data re-encryption method and system supporting data deduplication and cloud storage system
  • High-efficiency data re-encryption method and system supporting data deduplication and cloud storage system
  • High-efficiency data re-encryption method and system supporting data deduplication and cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052]Data re-encryption enables the data owner to re-encrypt data with a new key to replace the old key, which not only solves the problem of key leakage but also realizes dynamic access control of data. However, traditional data re-encryption schemes consume a lot of computing resources. In recent years, efficient re-encryption methods suitable for deduplication of ciphertext data have attracted the attention of many scholars and many re-encryption schemes have been proposed. However, although there are already some schemes that can support efficient data re-encryption, they cannot solve the problem of user revocation. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field in which a protocol is taken as the characteristic, and discloses a high-efficiency data re-encryption method and system supporting data deduplication anda cloud storage system. Before a user uploads data, the user consults with a key server to generate an MLE key, and the MLE key enables the same clear-text data to always obtain the same key; in a mode of establishing one access control tree for one file, a file key is distributed to a valid user; after the user encrypts data to obtain ciphertext by using the MLE key, the user uses the ciphertextas an input of CAONT and a new data block is output; and after re-encrypting one part of the newly generated data block, the user uploads the data block and stores the data block at a cloud service provider. According to the invention, a rescinding user can be prevented from continuously accessing sensitive data of a data owner; and computation cost when the data owner carries out re-encryption can be greatly reduced. Experiments show that by adopting the high-efficiency data re-encryption method and system supporting data deduplication and the cloud storage system which are disclosed by the invention, computation cost when the data owner carries out re-encryption is greatly reduced.

Description

technical field [0001] The invention belongs to the technical field characterized by protocols, and in particular relates to an efficient data re-encryption method and system supporting data deduplication, and a cloud storage system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the rapid development of cloud storage, more and more users and enterprises tend to outsource data to cloud service providers. According to the recent research results of the International Data Center, data is rapidly growing at a rate of doubling every two years. It is expected that by 2020, the total amount of global data will reach 44ZB or 44 trillion GB. In order to process these large amounts of data, cloud service providers need to deploy a large number of cloud storage devices and consume a large amount of hardware resources and bandwidth resources. On the other hand, cloud service providers may store large and repetitiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L29/08G06F16/215
CPCH04L9/0631H04L9/0643H04L9/0838H04L9/0869H04L67/1097
Inventor 陈晓峰李进袁浩然王剑锋
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products