Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage security deduplication method and device based on Merkel hash tree

A Merkle hash and cloud storage technology, applied in the field of cloud storage security deduplication based on Merkle hash tree, can solve ciphertext attacks, proof of file ownership without consideration, and side channels without consideration Attack problems and other issues, to achieve the effect of reducing the number and size

Pending Publication Date: 2021-03-26
GUANGDONG UNIV OF TECH
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Currently existing cloud storage deduplication schemes such as patent CN201810922552 mainly have the following technical disadvantages: 1) Since any user who can access the data can calculate the convergence key according to the data content, the ciphertext may suffer from offline dictionary attacks ; 2) It is only suitable for protecting high-level unpredictable data; 3) It does not take into account the problem of side channel attacks in the process of deduplication; 4) Attackers can upload specific files to the cloud server, depending on whether deduplication occurs. It can be known whether the same file exists in the cloud storage server; 5) the proof of file ownership is not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage security deduplication method and device based on Merkel hash tree
  • Cloud storage security deduplication method and device based on Merkel hash tree
  • Cloud storage security deduplication method and device based on Merkel hash tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The embodiment of the present invention provides a cloud storage security deduplication method based on a Merkle hash tree. The system model used in this method includes: users, cloud servers and gateway servers. The system model architecture is shown in the attached figure 1 shown.

[0048] Cloud server: An entity that provides outsourced data services for users. When users upload duplicate data files, the cloud server will securely deduplicate the file data to reduce storage costs and save user upload bandwidth.

[0049] User: In order to save local storage space, the data is outsourced and stored in the cloud server, and the entity that can access the data at any time.

[0050] Gateway server: upload files for the user agent, verify file ownership, authorize the user on behalf of the cloud server, and confuse file upload traffic.

[0051] Such as figure 2 As shown, the cloud storage security deduplication method based on the Merkle hash tree provided by this embod...

Embodiment 2

[0078] Such as image 3 As shown, a cloud storage security deduplication device based on Merkle hash tree, the device is a gateway server, including:

[0079] Upload request receiving module: used to receive the request sent by the user to upload the file to the cloud server;

[0080] Label calculation module: used to calculate the label T of the file that the user needs to upload, and upload the label T to the cloud server, and the cloud server determines whether the uploaded label already exists;

[0081]File block module: used to block the file to be uploaded into n data blocks {Bi} (1≤i≤n) when the tag does not exist in the cloud server;

[0082] Merkle hash tree construction module: used to calculate the label {ti} (1≤i≤n) of n data blocks, and use the label of the data block to construct the Merkle hash tree, that is, the data block The label is used as the leaf node of the Merkle hash tree to build a complete Merkle hash tree;

[0083] Convergent key calculation and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud storage security deduplication method based on a Merkel hash tree, and the method comprises the steps that a gateway server calculates a label of a to-be-uploaded file,and uploads the label to a cloud server; the cloud server judges whether the uploaded label exists or not; if so, the cloud server operates an ownership certification protocol to carry out ownership verification, and the cloud server data is allowed to be accessed only after the user passes the verification; and if not, the gateway server blocks the file to be uploaded into n data blocks, constructs a Merkel hash tree, converges key calculation and encrypts. The invention provides a cloud storage security deduplication method based on a Merkel hash tree and a gateway server, the gateway serveris erected between a user and the cloud server to carry out the flow confusion of an uploaded file, so as to resist an attacker; and valuable information is obtained from private data uploaded by a user through a honest and curious server by adopting a key chain mechanism, and meanwhile, the quantity and the size of files locally stored by the user are reduced.

Description

technical field [0001] The present invention relates to the field of computer technology, and more specifically, to a method and device for securely deduplicating cloud storage based on a Merkle hash tree. Background technique [0002] With the continuous development of society and computer technology, the data generated by users is increasing geometrically, so users will give priority to storing data on cloud disks to free up the disk space required for storing data. With the passage of time, the amount of data on the cloud disk will continue to increase, and in the face of such a huge amount of data, how to efficiently and safely store these data has become a very urgent problem for every cloud service provider. topic. Data deduplication technology, also known as data deduplication technology, can be divided into deduplication of files and deduplication of data blocks. This technology can delete duplicate parts of files in the data collection or data blocks in files. Onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F3/06
CPCH04L67/1097H04L67/06H04L63/0428H04L67/108H04L63/0807G06F3/0641G06F3/067
Inventor 柳毅段嘉俊罗玉陈家辉李斯
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products