A Method of Scalable Encrypted Data Deduplication

A deduplication, adjustable technology used in the field of information security

Active Publication Date: 2021-09-14
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The purpose of the present invention is to provide an adjustable encrypted deduplication method to solve the quantization and balance problems of storage efficiency and anti-frequency analysis in the existing encrypted deduplication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Scalable Encrypted Data Deduplication
  • A Method of Scalable Encrypted Data Deduplication
  • A Method of Scalable Encrypted Data Deduplication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0089] This embodiment compares and analyzes the tunable encrypted deduplication (TED for short) implemented based on the method of the present invention and the existing encryption method. Specifically, the following schemes are considered in the comparative analysis: ①MLE, using the hash value of each plaintext block as the key; ②SKE, selecting a random key for each plaintext block; ③MinHash Encryption (minimum hash encryption), the data segment The minimum hash value of all plaintext blocks is used as the key of all plaintext blocks in this data segment; ④ BTED (basicTED), does not apply automatic parameter setting adjustable encrypted deduplication; ⑤ FTED (full TED), complete application of the three keys technology's adjustable encryption deduplication.

[0090] This embodiment will verify the effectiveness of the method TED of the present invention based on two real data sets FSL and MS.

[0091] The FSL dataset (http: / / tracer.filesystems.org / ) is a daily backup of 39 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an adjustable encrypted repeated data deletion method, which belongs to the technical field of information security. The present invention includes a client and a key server. The key server successively configures the balance parameter t, maintains the global secret s of the system, estimates the frequency f of the plaintext block M, calculates the intermediate parameter x, calculates and selects the key seed k and returns it to the client , the client computes the key K for the plaintext block M. The present invention adopts CM-Sketch-based frequency statistics technology, key probability generation technology and balance parameter automatic setting technology to solve the quantization and balance problems of storage efficiency and anti-frequency analysis in the existing encrypted deduplication system.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a method for converting an original logical (plaintext) block into a ciphertext block, and in particular relates to a technology and method for resisting data frequency leakage in an encrypted data deduplication storage system. Background technique [0002] Data deduplication (data deduplication) is a data compression technology that reduces storage overhead by eliminating duplicate copies: the system divides files into several logical plaintext blocks, and compares the contents of each logical block with the stored physical plaintext block; When duplicate content is found, redundant logical blocks are replaced with references (references) pointing to corresponding physical blocks to save storage space. [0003] Encrypted deduplication (encrypted deduplication) converts the original logical (plaintext) block into a ciphertext block through encryption technology, and stores...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06G06F21/60
CPCG06F3/0641G06F21/602
Inventor 李经纬杨祚儒任彦璟李柏晴张小松
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products