A deduplication cloud storage method for outsourced data supporting privacy and integrity protection

A technology for integrity protection and outsourcing data, applied in digital data protection, digital transmission systems, and key distribution, it can solve complex technical problems of similar data, save storage space, protect confidentiality and privacy, and save communication costs. Effect

Active Publication Date: 2022-04-26
中科柏诚科技(北京)股份有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The second issue is the security of cloud storage
Deduplication of exactly the same data is a relatively prudent operation for cloud service provider CSP, while deduplication of similar data is more flexible, but the implementation of similar data deduplication requires more complex technologies, and similar data deduplication The storage resource that can be saved depends on the proportion of similar data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A deduplication cloud storage method for outsourced data supporting privacy and integrity protection
  • A deduplication cloud storage method for outsourced data supporting privacy and integrity protection
  • A deduplication cloud storage method for outsourced data supporting privacy and integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] An outsourced data deduplication cloud storage method that supports privacy and integrity protection, including the following steps:

[0114] 1) System establishment

[0115] 1.1 System parameter establishment:

[0116] The key generation center KGC generates and discloses system parameters

[0117] cp=(p,G,G T , e, H, Hash, Enc, Dec, Extrator( , ), (n, k)RS), where p is a large prime number selected according to the security parameters; G and G T is a multiplicative cyclic group of two orders randomly selected in the PBC cryptographic library environment with a large prime number p; e: G×G→G T is a prescribed bilinear pair; H: {0, 1} * →G is a safe anti-collision hash function selected by Cryptopp password library, Hash is a safe anti-collision hash algorithm, such as MD5 algorithm or SHA1 algorithm, etc. (Enc, Dec) is a pair of symmetric encryption and decryption Algorithm, such as AES algorithm or DES algorithm, Extrator( , ) is an anti-leakage binary extractor,...

Embodiment 2

[0135] On the basis of Example 1, when the file tag Tag F Does not exist, original owner DO 0 Continue to perform storage, the specific steps are as follows:

[0136] a1) Key extraction and file encryption block:

[0137] First, the original owner DO0 Using the extractor, input the file F and the seed s selected by the key generation center KGC, and extract the encryption key K of the file F F = Extractor(F; s);

[0138] Second, the original owner DO 0 Use the symmetric encryption and decryption algorithm (Enc, Dec) agreed by the key generation center KGC to encrypt the file F to generate the file ciphertext C F =Enc(F;K F );

[0139] Then, use the (n, k) RS erasure code specified by the key generation center KGC to encrypt the file ciphertext C F Encode and chunk to get chunked file C F '={C 1 , C 2 ,Λ,C n}, n is the total number of blocks of the file F, so that the file ciphertext C F can be made by C F '={C 1 , C 2 ,Λ,C n} in any k file blocks can be restore...

Embodiment 3

[0147] On the basis of Example 1, when the file tag Tag F exists, the successor owner DO t (t=1, 2, Λ, W) provide the ownership certificate of the file F to the cloud service provider CSP, and the cloud service provider CSP sends the successor owner DO according to the ownership certificate t (t=1, 2, Λ, W) Feedback result, with the data owner DO of the second upload file F 1 For example, the specific steps are as follows, other successor owners DO t The steps of (t=2, 3, Λ, W) are similar:

[0148] a2) File extraction and chunking:

[0149] First, the successor owner DO 1 Use the same extractor algorithm to calculate the encryption key K for the file F held by yourself F = Extractor(F; s);

[0150] Second, the successor owner DO 1 Use the encryption key KF and the symmetric encryption and decryption algorithm (Enc, Dec) disclosed by the key generation center KGC to encrypt the file F to generate the file ciphertext C F =Enc(F;K F );

[0151] Then, the successor owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an outsourced data deduplication cloud storage method supporting privacy and integrity protection. First of all, the deduplication of data files on the client side and the deduplication of security authentication tags are realized, which greatly reduces the communication overhead and the storage burden of the cloud server. Secondly, the use of extractor technology makes the ciphertext of the outsourced stored data not depend on the encryptor and encryption algorithm, but on the data itself, so that the deduplication of ciphertext data can be realized, and the deduplication process and integrity audit process are guaranteed. Data Privacy. Finally, RS erasure coding technology is used to improve the fault tolerance of deduplication cloud storage, and it also supports cloud service providers to spontaneously and regularly entrust third-party auditors to conduct batch public cloud audits of data stored in cloud servers to ensure data integrity. At the same time, it also supports data owners to initiate public cloud audits on the integrity of files anytime and anywhere, and can always protect the privacy of data during the audit and deduplication process. The method provided by the invention is effective in deduplication and efficient in integrity cloud auditing.

Description

technical field [0001] The invention belongs to the technical field of outsourced cloud storage data security in cloud computing, and in particular relates to a deduplication cloud storage method for outsourced data supporting privacy and integrity protection. Background technique [0002] Cloud outsourcing storage is an indispensable branch of cloud computing, which allows data owners (Data Owner, DO) to store data in cloud servers, and provides distributed, low-cost, convenient and fast data storage and update services . Due to the cost and management advantages of cloud storage systems, more and more individuals and organizations store their data in cloud service providers (Cloud Server Provider, CSP) in recent years. However, this promising data storage model faces many new challenges in terms of efficiency and security. [0003] The first issue is the efficiency of cloud storage. As the number of cloud storage users continues to increase, the amount of outsourced dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1097H04L9/08H04L9/32H04L9/40G06F21/64H04L1/00
CPCH04L67/1097H04L9/0869H04L9/0877H04L9/3247H04L63/0807H04L63/0435G06F21/64H04L67/06H04L1/004
Inventor 李艳平吴姣姣梁岩荣
Owner 中科柏诚科技(北京)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products