Secure cloud data deduplication method and system based on trusted hardware

A cloud data, trusted technology, applied in file systems, digital data authentication, digital data protection, etc., can solve problems such as damage to outsourced data, original data and privacy information leakage, data integrity damage, etc.

Pending Publication Date: 2022-01-11
XI AN JIAOTONG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Data deduplication solutions often require frequent communication between the client and the server. Most existing solutions lack consideration for data security in untrusted environments, and user information may be stolen during the deduplication process. The adversary steals the attack, and the original data and private information are leaked;
[0005] 2. Existing solutions often lack the guarantee of data integrity. Malicious users may upload data that is inconsistent with the label, and semi-trusted cloud storage platforms may damage outsourced data due to external and internal attacks. Integrity may be compromised;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud data deduplication method and system based on trusted hardware
  • Secure cloud data deduplication method and system based on trusted hardware
  • Secure cloud data deduplication method and system based on trusted hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0071] This solution only describes the file-level + block-level data deduplication process.

[0072] 1) System initialization phase

[0073] According to the SysSetup function proposed in Part 3, the cloud storage platform runs this function according to the input security parameter λ to generate the public parameter Pub:

[0074] 2) Data initialization stage

[0075] Client runs the KeyGen function proposed in Part 3 to generate the user's key pair (sk c ,pk c ). Then the Client runs the data encryption algorithm proposed in Part 3. If the file does not need to be divided into blocks according to the system parameters, the file ciphertext C is obtained, and if it needs to be divided into blocks, the ciphertext C={C 1 ,C 2 …C d ,i∈[0,d]}. Then the Client runs the tag generation algorithm proposed in Part 3 to get the tag set

[0076] 3) Data deduplication stage

[0077] CEnclave and Client run the duplicate detection algorithm proposed in Part 3. If there is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure cloud data deduplication method and system based on trusted hardware. Comprising the following steps: firstly, performing data encryption and label generation on an original file; sending the encrypted file and a corresponding label to a cloud storage platform; and enabling the cloud storage platform to store the to-be-encrypted file without the same copy after repeatedly detecting the label, and assigning the file permission. A secure trusted hardware area TH is configured in a cloud storage platform, all algorithms and operations related to user file privacy are realized in trusted hardware, and a code running in the trusted hardware is called CEnclave. Before a user communicates with a cloud storage platform, remote authentication needs to be carried out on the user and the TH to ensure secure transmission of data, and after the TH receives the data transmitted by the user, ORAM implicit reading is carried out on the TH and a cloud storage server CSS to realize a secure de-duplication process.

Description

technical field [0001] The invention belongs to the technical field of data deduplication, and in particular relates to a method and system for deduplication of secure cloud data based on trusted hardware. Background technique [0002] Among the massive data, there is a large amount of redundant data, which wastes the storage space in the cloud server. In order to alleviate storage pressure and reduce network communication overhead, data deduplication technology is applied to cloud storage systems. The technology keeps only one backup of the same file in cloud storage, resulting in significant savings in storage costs. [0003] Defects and deficiencies of the prior art: [0004] 1. Data deduplication solutions often require frequent communication between the client and the server. Most existing solutions lack consideration for data security in untrusted environments, and user information may be stolen during the deduplication process. The adversary steals the attack, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/174G06F21/60G06F21/62G06F16/13G06F21/44
CPCG06F16/1748G06F21/602G06F21/6218G06F16/137G06F21/44
Inventor 周瑞洁刘宇豪齐赛宇鹿又水侯迪齐勇
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products