Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud storage security deduplication method and system

A technology of cloud storage and cloud storage server, applied in the field of cloud storage, can solve problems such as user privacy leakage, loss of absolute control over data, data security concerns, etc.

Inactive Publication Date: 2020-03-27
HUNAN POLICE ACAD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in cloud storage systems, data deduplication has the following challenges: (1) Data is often stored in ciphertext, and different keys encrypt the same plaintext to generate different ciphertexts; (2) Data management rights and ownership Separation, users lose absolute control over the data, and will always express concerns about data security; (3) The bandwidth resources and computing resources of cloud data are very precious, how to realize the detection of duplicate data blocks efficiently and with low overhead is very important
[0004] Cloud computing uses virtualization technology to realize the on-demand allocation of multi-user storage resources. When the cloud storage server detects data duplication among multiple users, it is easy to cause user privacy leakage. How to realize data deduplication and protect user privacy is a a problem that needs to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage security deduplication method and system
  • Cloud storage security deduplication method and system
  • Cloud storage security deduplication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0059] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0060] Please also see figure 1 with figure 2 , the first aspect of the present invention proposes a cloud storage security deduplication method, the method comprising:

[0061] S101, the user te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud storage security deduplication method and a system. The method comprises the steps of performing block preprocessing on a file by a user terminal to form data blocks; sending an authority verification request to a third-party server, and querying the authority of the corresponding user by a Bloom filter for authority query deployed on the third-party server; judgingwhether all the K-bit hash functions corresponding to the permission are 1, and if all the K-bit hash functions are 1, passing permission query; selecting a corresponding permission key to generate apermission label and issuing the permission label to the user terminal; carrying out repeatability detection in the dynamic Bloom filter array by the user terminal for data de-reuse by the permissionlabel, and after the user terminal traverses in the dynamic Bloom filter array, proving that the data block is a new data block when no repetition is found; and then encrypting the data block by the user terminal by using the convergence key to generate a ciphertext and upload the ciphertext to the cloud storage server. According to the method, rapid detection of repeated data blocks and safe deduplication based on ownership are realized.

Description

technical field [0001] The present invention relates to the technical field of cloud storage, in particular to a method and system for secure deduplication of cloud storage. Background technique [0002] With the rapid development of cloud computing technology, more and more users choose to outsource data to cloud service providers. According to IDC analysis, cloud storage space is expected to reach 44ZB in 2020. How to effectively reduce storage space has become a research hotspot today. Data deduplication technology provides an effective solution to minimize storage capacity. It can automatically search for duplicate data, keep only one copy of all the same data, and reduce the actual data stored in the system geometrically. [0003] In traditional storage systems, data is stored in plain text, and users have complete ownership and management rights. Data deduplication-related technologies are relatively mature, and many research results have been achieved, such as duplic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/1097H04L63/0807H04L63/1441H04L63/0428H04L67/06
Inventor 鄢喜爱史伟奇田华
Owner HUNAN POLICE ACAD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More