Adjustable encrypted duplicated data deleting method

A deduplication and adjustable technology, applied in the field of information security, to achieve the effect of reducing memory usage, balancing anti-frequency analysis capabilities, and balancing storage efficiency

Active Publication Date: 2020-06-26
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The purpose of the present invention is to provide an adjustable encrypted deduplication method to solve the quantization and balance problems of storage efficiency and anti-frequency analysis in the existing encrypted deduplication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adjustable encrypted duplicated data deleting method
  • Adjustable encrypted duplicated data deleting method
  • Adjustable encrypted duplicated data deleting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0087] This embodiment compares and analyzes the tunable encrypted deduplication (TED for short) implemented based on the method of the present invention and the existing encryption method. Specifically, the following schemes are considered in the comparative analysis: ①MLE, using the hash value of each plaintext block as the key; ②SKE, selecting a random key for each plaintext block; ③MinHash Encryption (minimum hash encryption), the data segment The minimum hash value of all plaintext blocks is used as the key of all plaintext blocks in this data segment; ④ BTED (basic TED), does not apply automatic parameter setting adjustable encrypted deduplication; ⑤ FTED (full TED), complete application of three items Scalable encrypted deduplication of key technologies.

[0088] This embodiment will verify the effectiveness of the method TED of the present invention based on two real data sets FSL and MS.

[0089] The FSL dataset (http: / / tracer.filesystems.org / ) is a daily backup of 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an adjustable encrypted duplicated data deleting method, and belongs to the technical field of information security. The system comprises a client and a key server, the key server sequentially configures a balance parameter t, maintains a system global secret s, estimates the frequency f of a plaintext block M, calculates an intermediate parameter x, calculates and selectsa key seed k and returns the key seed k to the client, and the client calculates a key K of the plaintext block M. By adopting a CM-Sketch frequency statistics technology, a key probability generationtechnology and a balance parameter automatic setting technology, the quantization and balance problems of the storage efficiency and the anti-frequency analysis in the existing encrypted repeated data deletion system are solved.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a method for converting an original logical (plaintext) block into a ciphertext block, and in particular relates to a technology and method for resisting data frequency leakage in an encrypted data deduplication storage system. Background technique [0002] Data deduplication (data deduplication) is a data compression technology that reduces storage overhead by eliminating duplicate copies: the system divides files into several logical plaintext blocks, and compares the contents of each logical block with the stored physical plaintext block; When content is repeated, redundant logical blocks are replaced with references (references) pointing to corresponding physical blocks to save storage space. [0003] Encrypted deduplication (encrypted deduplication) converts original logic (plaintext) blocks into ciphertext blocks through encryption technology, and stores only ciphert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F21/60
CPCG06F3/0641G06F21/602
Inventor 李经纬杨祚儒任彦璟李柏晴张小松
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products