Supercharge Your Innovation With Domain-Expert AI Agents!

Encrypted data deduplication and sharing device and method for mobile edge computing network

A technology for encrypting data and edge computing, applied in computer security devices, computing, secure communication devices, etc., which can solve the problem of ineffective data deduplication in mobile edge computing scenarios, brute force attacks, and failure to consider multiple mobile edge computing. Edge server and other issues, to achieve the effect of efficient data storage and utilization, practical application significance, and safe data storage and utilization

Active Publication Date: 2022-03-18
NANJING UNIV
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing encrypted data deduplication scheme based on convergent encryption, due to the use of deterministic keys to encrypt data, it is vulnerable to brute force cracking attacks, and there are security problems
However, in the existing data sharing and deduplication scheme based on cloud storage design, because it relies on the central cloud server, it does not consider the existence of multiple edge servers in mobile edge computing, so it cannot effectively realize mobile edge computing. Data deduplication in the scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data deduplication and sharing device and method for mobile edge computing network
  • Encrypted data deduplication and sharing device and method for mobile edge computing network
  • Encrypted data deduplication and sharing device and method for mobile edge computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This embodiment provides a secure data deduplication and sharing device and method in a mobile edge computing network, such as figure 1 As shown: this device involves four functional entities: mobile terminal 1 , edge storage server 2 , edge authoritative server 3 and edge key server 4 . Mobile terminal 1 is the owner or user of the data; edge storage server 2 provides encrypted data storage service for mobile terminal 1, when mobile terminal 1 requests ciphertext storage service in the network, the adjacent available edge storage server 2 and mobile Terminal 1 establishes a connection and receives the encrypted data of mobile terminal 1; edge authoritative server 3 provides secure data blind label calculation service for mobile terminal 1, edge authoritative server 3 is a set of servers disclosed in the network, and mobile terminal 1 directly sends data to the set Each edge authoritative server 3 requests the data blind label calculation service; the edge key server 4 ...

Embodiment 2

[0090] This embodiment specifically illustrates the concept of the present invention by setting the total number of edge authoritative servers n=10 and the blind label calculation threshold t=6, and the mobile terminal uploads the file D. The edge authoritative server i executes figure 2 The key initialization algorithm process of the edge authoritative server, for example, for the edge authoritative server 1:

[0091] Step 101, input the total number of edge authoritative servers n=10 and blind label calculation threshold t=6, and the edge authoritative server number 1 that executes the current algorithm;

[0092] Step 102, the edge authoritative server 1 generates a random 5th order polynomial P1(x), calculates P1(1), and sets k=1;

[0093] Step 103, if k is greater than 10, jump to step 107;

[0094] Step 104, if k=1, k=k+1, jump to step 103, otherwise continue;

[0095] Step 105, edge authoritative server 1 sends P1(k) to edge authoritative server k;

[0096] Step 106...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of computer networks, and discloses an encrypted data deduplication and sharing device for a mobile edge computing network, including a mobile terminal, an edge storage server, an edge authority server, and an edge key server; the edge storage server includes an All available edge storage servers, the edge storage server provides encrypted data storage services for mobile terminals; the edge authoritative server is a set of servers disclosed in the network, and the edge authoritative server provides secure data blind label calculation services for mobile terminals; the edge The key server uses the distributed hash table for indexing, and the mobile terminal obtains the edge key server set by calculating the distributed hash table, and stores the key information to all the edge key servers in the edge key server set.

Description

technical field [0001] The present invention relates to a device and method for deduplication and sharing of encrypted data in a mobile edge computing network, and more specifically relates to a method for implementing a scheme for deduplication and sharing of encrypted data in a mobile edge computing scenario, which belongs to the field of computer networks. Background technique [0002] With the continuous maturity and development of mobile edge computing, it has become an inevitable trend in the future to use edge servers to provide computing and storage services for mobile terminals. To achieve safe and efficient data transmission and storage between edge servers and mobile terminals depends on the use of cryptography. A secure data deduplication solution built by tools. [0003] Supporting secure deduplication of encrypted data is an important technical feature of the data sharing solution. It can reduce the storage overhead of edge servers and improve system performanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/60H04L67/1097
CPCH04L63/06H04L63/062G06F21/602H04L67/1097
Inventor 林宇毛云龙张渊仲盛
Owner NANJING UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More