Attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage

An attribute encryption and cloud storage technology, applied in the field of cloud computing and information security, can solve the problems of low efficiency of duplicate data search, incompatibility of data deduplication and attribute revocation, long service delay, etc.

Active Publication Date: 2019-07-19
XIDIAN UNIV
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The existing de-duplication method supports inefficient search for duplicate data, resulting in long service delays
[0007] (2) Due to their specific structures, the existing methods cannot be compatible with the two functions of data deduplication and attribute revocation
[0010] 2. In commercial cloud storage, data privacy is an important issue. However, existing related technologies only support data deduplication or attribute revocation, and in the attribute encryption method that supports deduplication, if a user leaves the system or the password If the key is lost, it will bring great challenges to the data security in the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage
  • Attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage
  • Attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075]In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0076] Aiming at the low efficiency of duplicate data search in the existing deduplication schemes, the proposed scheme includes an efficient deduplication protocol. The data owner sends the file tag to the attribute authority before uploading the data, and the attribute authority maps the file tag to a unique prime number and sends it to the private cloud. The private cloud only needs to perform a division operation to determine whether the same data exists in the cloud.

[0077] Aiming at the problem that existing deduplication schemes cannot implement attribute revocation, a variant of attribute encryption scheme is propose...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud computing and information security. The invention discloses an attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage. According to the method, attribute authority is introduced between a cloud server and a data owner; the attribute authority finds out a specific prime number correspondingto the outsourcing data label through mapping, and the cloud server can judge whether corresponding outsourcing data exists in the cloud or not only by performing simple division operation on the prime number, so that the problem of low repeated data searching efficiency in the current duplicate removal scheme is solved; according to the method, private cloud is required to complete ciphertext updating according to an updating key issued by attribute authority, so that the problem that an unauthorized user cannot be revoked in a current duplicate removal scheme is solved; in addition, the method supports a ciphertext outsourcing decryption function, and the calculation burden of a user is reduced.

Description

technical field [0001] The invention belongs to the technical field of cloud computing and information security, and in particular relates to an attribute encryption method supporting efficient data deduplication and attribute revocation in cloud storage. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the rapid development of the Internet, cloud computing has brought great changes to various fields of society. More and more enterprises or individuals like to rely on cloud computing to enjoy high-quality services, such as data storage, data sharing and outsourced computing. For data privacy, data owners encrypt sensitive data. However, traditional cryptographic primitives are not compatible with fine-grained data sharing. For example, the data owner wants multiple clients to access the data, encrypt the data with the recipient's public key and then outsource it to the cloud server. The user receives th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/0478H04L63/0807H04L63/083H04L63/0846
Inventor 马华谢莹王剑锋田国华
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products