System and method for data security deduplication in fog computing environment, and cloud storage platform

A technology of data security and fog computing, which is applied in the field of cloud storage, can solve the problems of high re-encryption overhead, MLE is not dynamic, cloud server is not safe, etc., to prevent side channel attacks, save communication overhead, and overcome the problem of high delay Effect

Active Publication Date: 2021-08-10
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, MLE is not dynamic. If a user's authority is revoked, but his MLE key is still kept locally, if the user colludes with some hackers and steals the ciphertext, he can use the previously reserved MLE The plaintext data can be obtained by decrypting the key, which is extremely unsafe for cloud servers
[0004] To sum up, the problems existing in the existing technology are: the deduplication of encrypted data is not compatible with data update, and the existing encrypted data is only applicable to cloud servers. The pressure on the cloud server does not effectively protect the data privacy of users
[0006] Due to the randomness of user key selection, the same plaintext file may be encrypted into different ciphertext files. In addition, when some user permissions are revoked, in order to prevent these users from still being able to decrypt data, the encrypted The traditional update method uses re-encryption technology. However, re-encryption of complete data is expensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for data security deduplication in fog computing environment, and cloud storage platform
  • System and method for data security deduplication in fog computing environment, and cloud storage platform
  • System and method for data security deduplication in fog computing environment, and cloud storage platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0073] The data deduplication of the present invention is aimed at a large amount of data stored in the server, and some data are completely the same, and the data deduplication is to delete these same data, and only keep a data backup. From the fine-grained distinction of deduplication execution, data security deduplication can be divided into two types: file level (File Level) deduplication and block level (BlockLevel) deduplication: file level deduplication means that a file is the smallest unit of deduplication , that is, the server performs deduplication detection based on the file label, and only keeps a unique copy o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud storage, and discloses a data security deduplication system and method in a fog computing environment, and a cloud storage platform, which adopts an encryption scheme supporting deduplication to ensure that data is safely and efficiently stored on cloud servers and fog nodes; The attribute encryption scheme manages the data ownership of users and fog nodes; MerkleTree is used to generate data labels to prevent malicious users from conducting side channel attacks on servers; The user obtains the data again, which ensures the security of the server data. In addition, the present invention has also carried out a detailed security analysis. It is proved that the present invention can achieve the expected security goal, and can realize efficient data storage and deduplication operation at the same time.

Description

technical field [0001] The invention belongs to the technical field of cloud storage, and in particular relates to a data security deduplication system and method in a fog computing environment, and a cloud storage platform. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the development of cloud computing, more and more users prefer to store data on cloud servers rather than on the local side. International Data Center (IDC) According to a report by the Global Times, in 2013, the amount of newly generated data in the world was 4.4ZB, and in 2017, the amount of newly generated data in the world surged to 15.2ZB. It is estimated that by 2020, the amount of newly generated data in the world will be It will reach 40ZB, which will undoubtedly bring a great burden to the cloud server. Another IDC report pointed out that 75% of the data generated in the world every year is duplicated, which seriously damages t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L29/06G06F21/62
CPCG06F21/6218H04L9/0631H04L9/0643H04L63/0435
Inventor 齐赛宇张夫猷袁浩然陈晓峰张萌
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products