Supercharge Your Innovation With Domain-Expert AI Agents!

An Efficient Metadata Management Method in Encrypted Data Deduplication System

A technology for deduplication and management methods, applied in the field of data storage, can solve the problems of key metadata that cannot be encrypted, metadata that can only be reduced by zero blocks, and key metadata that cannot be compressed, so as to reduce storage overhead. Effect

Active Publication Date: 2020-05-12
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Currently, in the existing metadata management technology, the literature "E.Kruus, C.Ungureanu, and C.Dubnicki. Bimodal content defined chunking for backup streams.In Proc.ofUSENIX FAST,2010" and "D.R.Bobbarjung, S.Jagannathan, and C.Dubnicki.Improvingduplicate elimination in storage systems.ACM Transactions on Storage,vol.2,no.4,pp.424–448,2006"By constructing real-time repeated queries on fingerprint indexes, and several adjacent duplicates Chunks are merged into a superchunk to reduce file metadata overhead; however, these methods cannot compress key metadata because each chunk still needs to be encrypted with a key derived from its own content
Document "J.Li, X.Chen, M.Li, J.Li, P.P.C.Lee, and W.Lou. Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel Distributed Systems, vol.25, no.6, pp .1615–1625, 2014" applies deduplication directly to the key to reduce key metadata overhead; however, since the length of the key is usually comparable to the length of the fingerprint index entry (both tens of bytes), this The additional metadata overhead caused by key-based deduplication offsets the storage savings for key metadata
Document "D. Meister, Andre Brinkmann, and T. Su . β.File recipe compression in datadeduplication systems.In Proc.of USENIX FAST,2013"proposed four file metadata compression methods to replace file metadata entries with short codewords; however, these methods either cannot be applied by the file owner The key metadata encrypted by the master key, or the metadata that can only reduce zero blocks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Metadata Management Method in Encrypted Data Deduplication System
  • An Efficient Metadata Management Method in Encrypted Data Deduplication System
  • An Efficient Metadata Management Method in Encrypted Data Deduplication System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0076] The CDStore system (for details, please refer to the document "M.Li, C.Qin, and P.P.C.Lee. CDStore: Towardreliable, secure, and cost-efficient cloud storage via convergent dispersal. InProc. of USENIX ATC, 2015") supports encrypted duplicate data Deleted multi-cloud storage system. The CDStore system client encodes logical data blocks into n ciphertexts through the deduplication-aware secret sharing algorithm (deduplication-aware secret sharing), and stores them in n cloud storage servers respectively; each server can perform data deduplication based on the received ciphertexts To save storage space; when downloading, the client downloads ciphertext from at least k servers, and recovers the corresponding plaintext data block after decoding.

[0077] The CDStore system itself does not support an efficient metadata management mechanism. In this embodiment, the method of the present invention is implemented based on the CDStore system to form a Metadedup system, and the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient metadata management method in an encrypted repeated data deletion system, belonging to the technical field of data storage. The present invention can be used in a client-server storage model, and can also be applied to cloud computing. The present invention collects metadata of adjacent encrypted data blocks into metadata blocks, that is, each metadata block corresponds to an encrypted data block of an area, and only stores metadata of metadata blocks in file metadata and key metadata. Related Information. At the same time, the present invention further applies the deduplication operation to metadata blocks: since the same data blocks across backups are often aggregated to form duplicate areas, only one metadata block needs to be reserved for these duplicate data areas, thereby reducing metadata storage overhead.

Description

technical field [0001] The invention belongs to the technical field of data storage, and in particular relates to metadata management oriented to an encryption deduplication system. Background technique [0002] Data deduplication technology is widely used in backup storage systems, and the technical solutions usually used include: ① Divide the backup file into logical data blocks of fixed or variable length; ② For each logical data block, calculate the hash based on the data content value (called a fingerprint) to uniquely identify the corresponding data block; ③ only store a unique copy (called a physical data block) of a logical data block with the same fingerprint to save storage space. [0003] To protect data privacy, cryptographic deduplication adds an encryption layer that acts on logical data blocks. The encryption layer generates an encryption key based on the data content of the logical data block, called the MLE (message-locked encryption) key. For example, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06G06F21/60
CPCG06F3/0641G06F21/602
Inventor 李经纬李柏晴任彦璟张小松
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More