Outsourcing data deduplication cloud storage method supporting privacy and integrity protection

A technology for integrity protection and outsourcing data, used in digital data protection, digital transmission systems, key distribution, and can solve similar data complex technical problems

Active Publication Date: 2020-01-10
中科柏诚科技(北京)股份有限公司
View PDF11 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The second issue is the security of cloud storage
Deduplication of exactly the same data is a relatively prudent operation for cloud service provider CSP, while deduplication of similar data is more fle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing data deduplication cloud storage method supporting privacy and integrity protection
  • Outsourcing data deduplication cloud storage method supporting privacy and integrity protection
  • Outsourcing data deduplication cloud storage method supporting privacy and integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] An outsourced data deduplication cloud storage method that supports privacy and integrity protection, including the following steps:

[0114] 1) System establishment

[0115] 1.1 System parameter establishment:

[0116] The key generation center KGC generates and discloses system parameters

[0117] cp=(p,G,G T , e, H, Hash, Enc, Dec, Extrator( , ), (n, k)RS), where p is a large prime number selected according to the security parameters; G and G T is a multiplicative cyclic group randomly selected in the environment of the PBC cryptographic library with two orders of large prime number p; e: G×G→G T is a prescribed bilinear pair; H: {0, 1} * →G is a safe anti-collision hash function selected by Cryptopp password library, Hash is a safe anti-collision hash algorithm, such as MD5 algorithm or SHA1 algorithm, etc. (Enc, Dec) is a pair of symmetric encryption and decryption Algorithm, such as AES algorithm or DES algorithm, Extrator( , ) is an anti-leakage binary extra...

Embodiment 2

[0135] On the basis of Example 1, when the file tag Tag F Does not exist, original owner DO 0 Continue to perform storage, the specific steps are as follows:

[0136] a1) Key extraction and file encryption block:

[0137] First, the original owner DO 0Using the extractor, input the file F and the seed s selected by the key generation center KGC, and extract the encryption key K of the file F F = Extractor(F; s);

[0138] Second, the original owner DO 0 Use the symmetric encryption and decryption algorithm (Enc, Dec) agreed by the key generation center KGC to encrypt the file F to generate the file ciphertext C F =Enc(F;K F );

[0139] Then, use the (n, k) RS erasure code specified by the key generation center KGC to encrypt the file ciphertext C F Encode and chunk to get chunked file C F '={C 1 , C 2 ,Λ,C n}, n is the total number of blocks of the file F, so that the file ciphertext C F can be made by C F '={C 1 , C 2 ,Λ,C n} in any k file blocks can be restor...

Embodiment 3

[0147] On the basis of Example 1, when the file tag Tag F exists, the successor owner DO t (t=1, 2, Λ, W) provide the ownership certificate of the file F to the cloud service provider CSP, and the cloud service provider CSP sends the successor owner DO according to the ownership certificate t (t=1, 2, Λ, W) Feedback result, with the data owner DO of the second upload file F 1 For example, the specific steps are as follows, other successor owners DO t The steps of (t=2, 3, Λ, W) are similar:

[0148] a2) File extraction and chunking:

[0149] First, the successor owner DO 1 Use the same extractor algorithm to calculate the encryption key K for the file F held by yourself F = Extractor(F; s);

[0150] Second, the successor owner DO 1 Use the encryption key KF and the symmetric encryption and decryption algorithm (Enc, Dec) disclosed by the key generation center KGC to encrypt the file F to generate the file ciphertext C F =Enc(F;K F );

[0151] Then, the successor owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an outsourcing data deduplication cloud storage method supporting privacy and integrity protection. Firstly, client deduplication and security authentication label deduplication of a data file are realized, so that the communication overhead and the storage burden of a cloud server are greatly reduced; and secondly, by adopting the extractor technology, the ciphertext of the outsourcing storage data does not depend on an encipher and an encryption algorithm, but depends on the data, so that ciphertext data deduplication is realized, and the privacy of the data is ensured in the deduplication process and the integrity auditing process. And finally, the RS erasure code technology is adopted to improve the fault-tolerant capability of deduplication cloud storage; a cloud service provider is also supported to spontaneously and regularly delegate a third-party auditor to carry out batch public cloud auditing on the data stored in the cloud server so as to ensure theintegrity of the data; meanwhile, a data owner is also supported to initiate public cloud auditing on the integrity of the file anytime and anywhere, so that the privacy of the data can be always protected in auditing and deduplication processes. The method provided by the invention is effective in the aspect of deduplication and efficient in the aspect of integrity cloud auditing.

Description

technical field [0001] The invention belongs to the technical field of outsourced cloud storage data security in cloud computing, and in particular relates to a deduplication cloud storage method for outsourced data supporting privacy and integrity protection. Background technique [0002] Cloud outsourcing storage is an indispensable branch of cloud computing, which allows data owners (Data Owner, DO) to store data in cloud servers, and provides distributed, low-cost, convenient and fast data storage and update services . Due to the cost and management advantages of cloud storage systems, more and more individuals and organizations store their data in cloud service providers (Cloud Server Provider, CSP) in recent years. However, this promising data storage model faces many new challenges in terms of efficiency and security. [0003] The first issue is the efficiency of cloud storage. As the number of cloud storage users continues to increase, the amount of outsourced dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/08H04L9/32H04L29/06G06F21/64H04L1/00
CPCH04L67/1097H04L9/0869H04L9/0877H04L9/3247H04L63/0807H04L63/0435G06F21/64H04L67/06H04L1/004
Inventor 李艳平吴姣姣梁岩荣
Owner 中科柏诚科技(北京)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products