A Method of Scalable Encrypted Data Deduplication
A deduplication, adjustable technology used in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0089] This embodiment compares and analyzes the tunable encrypted deduplication (TED for short) implemented based on the method of the present invention and the existing encryption method. Specifically, the following schemes are considered in the comparative analysis: ①MLE, using the hash value of each plaintext block as the key; ②SKE, selecting a random key for each plaintext block; ③MinHash Encryption (minimum hash encryption), the data segment The minimum hash value of all plaintext blocks is used as the key of all plaintext blocks in this data segment; ④ BTED (basicTED), does not apply automatic parameter setting adjustable encrypted deduplication; ⑤ FTED (full TED), complete application of the three keys technology's adjustable encryption deduplication.
[0090] This embodiment will verify the effectiveness of the method TED of the present invention based on two real data sets FSL and MS.
[0091] The FSL dataset (http: / / tracer.filesystems.org / ) is a daily backup of 39 ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com