Cloud storage data deduplication method based on identity proxy re-encryption

A proxy re-encryption and cloud storage technology, applied in the field of data processing

Active Publication Date: 2021-08-13
HUAIYIN INSTITUTE OF TECHNOLOGY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this requires the data owners to be online and imposes a lot of computational cost on them

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data deduplication method based on identity proxy re-encryption
  • Cloud storage data deduplication method based on identity proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] By the following figure 1 The present invention is further described, and the following examples are for more clearly illustrative of the technical solutions of the present invention without limiting the scope of the invention.

[0032] Step 1: Set system parameters and initialize the system;

[0033] Set G 1 Circular addition groups generated by P, steps of p, g 2 In order to have the cyclic multiplication group with the same order P, For a bilinear mapping. Define five secure Hash functions h 1 : {0,1} * → g 1 , Hide 3 : G 2 × {0,1} * → g 1 H 4 : G 2 × g 1 × {0,1} * → g 1 , Setting parameters PKG randomly selects a master key Calculate P pub = SP. PKG public system parameters Confidential master key S.

[0034] For the user ID 1 , ID 2 , PKG calculates user private key, respectively. And send it to the user in a safe way. here,

[0035] Step 2: Data label generation;

[0036] User ID 1 Generate the label of the data M, send Give CSP and save h 1 = H 2 (M), used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data processing, and discloses a cloud storage data deduplication method based on identity proxy re-encryption, and the method proposes an identity-based authentication algorithm and an identity-based proxy re-encryption algorithm, so that ownership authentication of a user can be realized, and the problem that the user is not online or is difficult to participate is solved; and the conversion of the ciphertext can be realized without decryption, so that the security of the data is ensured, and the deduplication of the data is realized. The two methods are combined and applied to cloud storage data deduplication, including links of data uploading, repeatability check, ownership challenge, user data downloading, data deletion and the like, so that the calculation and communication overhead is reduced while data deduplication is performed, and the cloud storage data deduplication efficiency is improved. Therefore, the method is suitable for data security outsourcing in the cloud environment.

Description

Technical field [0001] The present invention relates to the field of data processing, and more particularly to a cloud storage data recession based on identity agent re-encrypted cloud storage data for data security outsourcing in a cloud storage environment. Background technique [0002] With the rapid development of cloud computing and large data technology, more and more users and businesses choose to store and manage their data outsourcing to cloud service providers (CSP). The amount of data in cloud storage is explosive, how to safe, economical, and efficient processing such a huge amount of data is an important issue facing CSP. In order to improve storage efficiency, save user bandwidth, the most direct method is to reach data when uploading data. However, in order to ensure the privacy of the data, the user generally uploads data in ciphertext, causing data to be more difficult. How to detect the same data from a randomized ciphertext and the weight is a problem that urge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L63/0478H04L63/0442H04L63/123H04L9/3271H04L9/3073Y02D30/50
Inventor 金春花阚格许永亮陈冠华邱军林单劲松
Owner HUAIYIN INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products