CN103944988A - Repeating data deleting system and method applicable to cloud storage - Google Patents

Repeating data deleting system and method applicable to cloud storage Download PDF

Info

Publication number
CN103944988A
CN103944988A CN201410164634.0A CN201410164634A CN103944988A CN 103944988 A CN103944988 A CN 103944988A CN 201410164634 A CN201410164634 A CN 201410164634A CN 103944988 A CN103944988 A CN 103944988A
Authority
CN
China
Prior art keywords
data
file
cloud storage
client
data block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410164634.0A
Other languages
Chinese (zh)
Inventor
孙国梓
王振宇
杨一涛
何利文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201410164634.0A priority Critical patent/CN103944988A/en
Publication of CN103944988A publication Critical patent/CN103944988A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a repeating data deleting system and method applicable to cloud storage. The repeating data deleting system is based on strategies, a security agent and a random storage mechanism are adopted, a storage service is separated from a security service, the space utilization rate of cloud storage is improved, bandwidth occupation of redundant data is reduced, and security of user data and privacies is improved at the same time. The system is mainly composed of a client, the security agent and the cloud storage, wherein the security agent is the most secure core and is mainly used for ensuring the security of the user data and privacies. The repeating data deleting system and method applicable to cloud storage have the advantages of being high in security, system efficiency, bandwidth utilization rate and the like, and can resist replay attack, impersonation attack and security threats brought by partially trusted cloud storage providers.

Description

A kind of data deduplication system and method that is applicable to cloud storage
Technical field
The present invention relates to cloud storage and field of information security technology, particularly data de-duplication technology.
Background technology
Cloud storage is in cloud computing (Cloud Computing) conceptive extension and a development new concept out, refer to by functions such as cluster application, grid or distributed file systems, a large amount of various dissimilar memory devices in network are gathered to collaborative work by application software, a system of data storage and Operational Visit function is externally provided jointly.Cloud storage system utilizes data de-duplication technology, only retains a copy of redundant data, and the pointer that points to this copy is provided, rather than stores a plurality of copies, thereby can greatly reduce expense and the bandwidth demand of disk space.According to recent statistics data, data de-duplication technology is the most effective memory technology, will be applied in 75% standby system and cloud storage in ensuing several years.
Yet between data de-duplication technology and data encryption, exist and conflict, while using traditional encryption method, when encryption key is different, even identical plaintext, the ciphertext of generation is also diverse, and this makes to carry out the deletion of repeating data.Although convergent encryption can effectively be alleviated this conflict, also there is the threat of leaking privacy of user.
Also there is security threat in cloud storage provider for user in addition, it is generally acknowledged that provider is half believable, be that Cloud Server can be according to predefined agreement and strategy work, can not carry out obvious malicious attack, but cannot ensure the data uploaded not by cloud storage provider unauthorizedly check, scanning and show-and-tell, therefore cannot solve client's safety worries.
Convergent encryption is similar to symmetric cryptography, but encryption key from cryptographic Hash expressly, encryption method is based on xor operation.Same plaintext will be mapped to same encryption key, generates identical ciphertext, so this encryption method is widely applied in data deduplication system after encrypting.
Summary of the invention
The object of the invention has been to provide a kind of data deduplication system and method that is applicable to cloud storage environment, it is too many that the method has solved in cloud storage system redundant data, the problem that memory space utilance is low, and can effectively alleviate conflicting between data de-duplication technology and data encryption, and prevent the threat from cloud storage provider; The method can greatly improve memory space utilance, reduces bandwidth occupancy and improve user data and personal secrets.
The technical solution adopted for the present invention to solve the technical problems is: the invention provides the data deduplication system based on tactful in a kind of secure cloud storage, this system adopts TSM Security Agent and random memory mechanism, stores service is separated with security service, improve cloud memory property and safety; The cloud storage system that this system relates to mainly, by client, TSM Security Agent and three module compositions of cloud storage, specifically comprises as follows:
One, client
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file.
Hash: file or data block are calculated to hash value, as its fingerprint.What the most often use at present is MD5 and two kinds of hash methods of SHA-1.
Local fingerprint base: for storing file that this user uploads and the hash value of data block.
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning.
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation.
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time.During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server.
Data de-duplication operations of the present invention is carried out in client, takes the stratification superfluous strategy that disappears, and reduces overhead and the raising superfluous rate that disappears
Two, TSM Security Agent
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication.
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint.
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client.
Storage index: log file and the data block storage information in Cloud Server, as shown in table 1.
file_ID file_Name Location Chunks ……
Table 1: file storage index
Three, cloud storage
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
Data management: Cloud Server carries out basic management, optimization etc. according to storage policy to data.
The random storage scheme that the memory location of user's uploading data in cloud storage generated by TSM Security Agent is definite, and is uniformly distributed in different cloud storage providers, has improved user data and privacy of user safety.
The present invention is a kind of data de-duplication method that is applicable to cloud storage also, and the method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, search fingerprint base, obtain each data block fingerprint Fingerprints (fg1, fg2, fg3 ...), deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
Beneficial effect:
1, the present invention significantly reduces bandwidth occupancy, has also improved cloud storage server performance and space utilisation simultaneously.
2, the present invention has improved convergent encryption fail safe, prevents that assailant from obtaining the threshold values of storage of subscriber data number of copies by uploading test file.
3, verification retransmission mechanism of the present invention effectively guarantees user data integrality, prevents from damaging, losing or even be maliciously tampered in the data block of data upload stage appearance.
4, timestamp of the present invention can effectively be resisted possible Replay Attack, improves cloud storage security.
Accompanying drawing explanation
Fig. 1 is data upload flow chart of the present invention.
Fig. 2 is that data of the present invention are downloaded flow chart.
Fig. 3 is system configuration schematic diagram of the present invention.
Embodiment
Below in conjunction with Figure of description, the invention is described in further detail.
As depicted in figs. 1 and 2, the invention provides a kind of data de-duplication method that is applicable to cloud storage, in fact execute two stages that mainly contain: data upload stage and data download phase, the method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, search fingerprint base, obtain each data block fingerprint Fingerprints (fg1, fg2, fg3 ...), deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
As shown in Figure 3, the invention provides the data deduplication system based on tactful in a kind of secure cloud storage, this system adopts TSM Security Agent and random memory mechanism, and stores service is separated with security service, improves cloud memory property and safety; The cloud storage system that this system relates to mainly, by client, TSM Security Agent and three module compositions of cloud storage, specifically comprises as follows:
One, client
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file.
Hash: file or data block are calculated to hash value, as its fingerprint.What the most often use at present is MD5 and two kinds of hash methods of SHA-1.
Local fingerprint base: for storing file that this user uploads and the hash value of data block.
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning.
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation.
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time.During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server.
Data de-duplication operations of the present invention is carried out in client, takes the stratification superfluous strategy that disappears, and reduces overhead and the raising superfluous rate that disappears
Two, TSM Security Agent
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication.
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint.
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client.
Storage index: log file and the data block storage information in Cloud Server, as shown in table 1.
file_ID file_Name Location Chunka ……
Table 1: file storage index
Three, cloud storage
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
Data management: Cloud Server carries out basic management, optimization etc. according to storage policy to data.
The random storage scheme that the memory location of user's uploading data in cloud storage generated by TSM Security Agent is definite, and is uniformly distributed in different cloud storage providers, has improved user data and privacy of user safety.

Claims (5)

1. a data deduplication system that is applicable to cloud storage, is characterized in that, described system is that described system adopts TSM Security Agent and random memory mechanism, and stores service is separated with security service by client, TSM Security Agent, cloud storage three large module compositions;
Client, the client of described system comprises:
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file;
Hash: file or data block are calculated to hash value, as its fingerprint;
Local fingerprint base: for storing file that this user uploads and the hash value of data block;
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning;
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation;
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time; During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server;
TSM Security Agent, the TSM Security Agent of described system comprises:
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication;
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint;
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client;
Storage index: log file and the data block storage information in Cloud Server;
Cloud storage, the cloud storage of described system comprises:
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
2. a kind of data deduplication system that is applicable to cloud storage according to claim 1, is characterized in that: the data de-duplication operations of described system is carried out in client, takes the stratification superfluous strategy that disappears.
3. a kind of data deduplication system that is applicable to cloud storage according to claim 1, it is characterized in that: the random storage scheme that the memory location of user's uploading data of described system in cloud storage generated by TSM Security Agent is determined, and is uniformly distributed in different cloud storage providers.
4. a method that is applicable to the data deduplication system of cloud storage, is characterized in that, described method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, searches for fingerprint base, obtains the fingerprint Fingerprints of each data block, and deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
5. a kind of method that is applicable to the data deduplication system of cloud storage according to claim 4, is characterized in that: each data block fingerprint Fingerprints of described method is fg1, fg2, and fg3 ...
CN201410164634.0A 2014-04-22 2014-04-22 Repeating data deleting system and method applicable to cloud storage Pending CN103944988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410164634.0A CN103944988A (en) 2014-04-22 2014-04-22 Repeating data deleting system and method applicable to cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410164634.0A CN103944988A (en) 2014-04-22 2014-04-22 Repeating data deleting system and method applicable to cloud storage

Publications (1)

Publication Number Publication Date
CN103944988A true CN103944988A (en) 2014-07-23

Family

ID=51192469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410164634.0A Pending CN103944988A (en) 2014-04-22 2014-04-22 Repeating data deleting system and method applicable to cloud storage

Country Status (1)

Country Link
CN (1) CN103944988A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778095A (en) * 2015-01-20 2015-07-15 成都携恩科技有限公司 Cloud platform data management method
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN104902010A (en) * 2015-04-30 2015-09-09 浙江工商大学 Cloud storage method and system for file
CN104994069A (en) * 2015-05-25 2015-10-21 南京信息工程大学 Cloud-storage data integrity proving method based on data repeatability verification
CN105072157A (en) * 2015-07-15 2015-11-18 柳州首光科技有限公司 Network-based data storage system having privacy protection function
CN105893511A (en) * 2016-03-30 2016-08-24 电子科技大学 Method for data copy trace retention through agent cloud
CN105955675A (en) * 2016-06-22 2016-09-21 南京邮电大学 Repeated data deletion system and method for de-centralization cloud environment
CN106790711A (en) * 2017-03-06 2017-05-31 苏州汉辰数字科技有限公司 A kind of cloud storage system based on quantum Flow Technique
CN107066352A (en) * 2017-03-02 2017-08-18 陈辉 With delete again and remote functionality portable intelligent device backup devices and methods therefor
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
CN107566463A (en) * 2017-08-21 2018-01-09 北京航空航天大学 A kind of cloudy storage management system for improving storage availability
CN107864220A (en) * 2017-11-29 2018-03-30 佛山市因诺威特科技有限公司 A kind of cloud monitoring server and cloud client computing device
CN108241640A (en) * 2016-12-23 2018-07-03 航天星图科技(北京)有限公司 A kind of distributed file memory method
CN109800218A (en) * 2019-01-04 2019-05-24 平安科技(深圳)有限公司 Distributed memory system, memory node equipment and data duplicate removal method
CN110618968A (en) * 2019-08-13 2019-12-27 数字视觉云(北京)科技发展有限公司 Media asset storage system based on ipfs
CN110636141A (en) * 2019-10-17 2019-12-31 中国人民解放军陆军工程大学 Multi-cloud storage system based on cloud and mist cooperation and management method thereof
CN111291126A (en) * 2020-02-28 2020-06-16 深信服科技股份有限公司 Data recovery method, device, equipment and storage medium
CN112115495A (en) * 2020-09-25 2020-12-22 平安国际智慧城市科技股份有限公司 Offline cloud data storage method and system, computer equipment and storage medium
CN112307233A (en) * 2020-10-30 2021-02-02 圆通速递有限公司 Repeated image deleting method and system in cloud storage based on block chain
CN112416878A (en) * 2020-11-09 2021-02-26 山西云时代技术有限公司 File synchronization management method based on cloud platform
CN113728302A (en) * 2019-04-26 2021-11-30 Emc Ip控股有限公司 Cloud layered garbage collection for de-duplication
CN114518850A (en) * 2022-02-23 2022-05-20 云链网科技(广东)有限公司 Safe re-deletion storage system with re-deletion before encryption based on trusted execution protection
CN115242815A (en) * 2022-07-14 2022-10-25 山石网科通信技术股份有限公司 Data cloud storage method and device, management server and user terminal
CN115757328A (en) * 2022-11-15 2023-03-07 百润红科技有限公司 Data storage method and storage management system based on cloud platform
CN117149724A (en) * 2023-10-30 2023-12-01 宁德思客琦智能装备有限公司 Method and system for deleting repeated data of cloud environment system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035884A (en) * 2010-12-03 2011-04-27 华中科技大学 Cloud storage system and data deployment method thereof
US20120144448A1 (en) * 2010-12-01 2012-06-07 Microsoft Corporation Data Store Including a File Location Attribute
CN102833298A (en) * 2011-06-17 2012-12-19 英业达集团(天津)电子技术有限公司 Distributed repeated data deleting system and processing method thereof
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144448A1 (en) * 2010-12-01 2012-06-07 Microsoft Corporation Data Store Including a File Location Attribute
CN102035884A (en) * 2010-12-03 2011-04-27 华中科技大学 Cloud storage system and data deployment method thereof
CN102833298A (en) * 2011-06-17 2012-12-19 英业达集团(天津)电子技术有限公司 Distributed repeated data deleting system and processing method thereof
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
沈瑞清: "云存储中避免重复数据存储机制研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
黎天翔: "智能网络存储系统中的重复数据删除技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778095B (en) * 2015-01-20 2017-11-17 成都携恩科技有限公司 A kind of cloud platform data managing method
CN104778095A (en) * 2015-01-20 2015-07-15 成都携恩科技有限公司 Cloud platform data management method
CN104902010A (en) * 2015-04-30 2015-09-09 浙江工商大学 Cloud storage method and system for file
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN104836656B (en) * 2015-05-08 2018-04-10 厦门大学 A kind of storage of video file and transmission method
CN104994069A (en) * 2015-05-25 2015-10-21 南京信息工程大学 Cloud-storage data integrity proving method based on data repeatability verification
CN104994069B (en) * 2015-05-25 2019-01-01 南京信息工程大学 Cloud storage data integrity method of proof based on data redundancy verifying
CN105072157A (en) * 2015-07-15 2015-11-18 柳州首光科技有限公司 Network-based data storage system having privacy protection function
CN105893511A (en) * 2016-03-30 2016-08-24 电子科技大学 Method for data copy trace retention through agent cloud
CN105955675B (en) * 2016-06-22 2018-11-09 南京邮电大学 A kind of data deduplication system and method for removing center cloud environment
CN105955675A (en) * 2016-06-22 2016-09-21 南京邮电大学 Repeated data deletion system and method for de-centralization cloud environment
CN108241640A (en) * 2016-12-23 2018-07-03 航天星图科技(北京)有限公司 A kind of distributed file memory method
CN107066352A (en) * 2017-03-02 2017-08-18 陈辉 With delete again and remote functionality portable intelligent device backup devices and methods therefor
CN106790711A (en) * 2017-03-06 2017-05-31 苏州汉辰数字科技有限公司 A kind of cloud storage system based on quantum Flow Technique
CN107295002B (en) * 2017-07-12 2020-06-19 联动优势科技有限公司 Cloud data storage method and server
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
CN107566463A (en) * 2017-08-21 2018-01-09 北京航空航天大学 A kind of cloudy storage management system for improving storage availability
CN107864220A (en) * 2017-11-29 2018-03-30 佛山市因诺威特科技有限公司 A kind of cloud monitoring server and cloud client computing device
CN109800218B (en) * 2019-01-04 2024-04-09 平安科技(深圳)有限公司 Distributed storage system, storage node device and data deduplication method
CN109800218A (en) * 2019-01-04 2019-05-24 平安科技(深圳)有限公司 Distributed memory system, memory node equipment and data duplicate removal method
CN113728302A (en) * 2019-04-26 2021-11-30 Emc Ip控股有限公司 Cloud layered garbage collection for de-duplication
US11989124B2 (en) 2019-04-26 2024-05-21 EMC IP Holding Company LLC Garbage collection for a deduplicated cloud tier with encrypted segments
CN113728302B (en) * 2019-04-26 2024-03-15 Emc Ip控股有限公司 Cloud layered garbage collection for de-duplication
CN110618968A (en) * 2019-08-13 2019-12-27 数字视觉云(北京)科技发展有限公司 Media asset storage system based on ipfs
CN110636141B (en) * 2019-10-17 2021-11-09 中国人民解放军陆军工程大学 Multi-cloud storage system based on cloud and mist cooperation and management method thereof
CN110636141A (en) * 2019-10-17 2019-12-31 中国人民解放军陆军工程大学 Multi-cloud storage system based on cloud and mist cooperation and management method thereof
CN111291126B (en) * 2020-02-28 2023-09-05 深信服科技股份有限公司 Data recovery method, device, equipment and storage medium
CN111291126A (en) * 2020-02-28 2020-06-16 深信服科技股份有限公司 Data recovery method, device, equipment and storage medium
CN112115495A (en) * 2020-09-25 2020-12-22 平安国际智慧城市科技股份有限公司 Offline cloud data storage method and system, computer equipment and storage medium
CN112307233A (en) * 2020-10-30 2021-02-02 圆通速递有限公司 Repeated image deleting method and system in cloud storage based on block chain
CN112416878A (en) * 2020-11-09 2021-02-26 山西云时代技术有限公司 File synchronization management method based on cloud platform
CN114518850B (en) * 2022-02-23 2024-03-12 云链网科技(广东)有限公司 Safe re-deleting storage system based on trusted execution protection and comprising re-deleting and encryption
CN114518850A (en) * 2022-02-23 2022-05-20 云链网科技(广东)有限公司 Safe re-deletion storage system with re-deletion before encryption based on trusted execution protection
CN115242815A (en) * 2022-07-14 2022-10-25 山石网科通信技术股份有限公司 Data cloud storage method and device, management server and user terminal
CN115757328B (en) * 2022-11-15 2023-06-27 百润红科技有限公司 Data storage method and storage management system based on cloud platform
CN115757328A (en) * 2022-11-15 2023-03-07 百润红科技有限公司 Data storage method and storage management system based on cloud platform
CN117149724A (en) * 2023-10-30 2023-12-01 宁德思客琦智能装备有限公司 Method and system for deleting repeated data of cloud environment system
CN117149724B (en) * 2023-10-30 2024-03-15 宁德思客琦智能装备有限公司 Method and system for deleting repeated data of cloud environment system

Similar Documents

Publication Publication Date Title
CN103944988A (en) Repeating data deleting system and method applicable to cloud storage
US10552640B2 (en) In-situ data verification for the cloud
Li et al. Secure distributed deduplication systems with improved reliability
US8762743B2 (en) Encrypting data objects to back-up
CN106101257B (en) A kind of cloud storage data managing method and device based on Bloom filter
CN104331346B (en) A kind of data guard method
EP3769228B1 (en) Consenus of shared blockchain data storage based on error correction code
CN102045356B (en) Cloud-storage-oriented trusted storage verification method and system
CN104836862B (en) A kind of Intelligent terminal data storage method
CN104410683A (en) Data backup method
US11489660B2 (en) Re-encrypting data on a hash chain
CN110109617B (en) Efficient metadata management method in encrypted repeated data deleting system
Jayapandian et al. Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space
CN105120003A (en) Method for realizing data backup in cloud environment
US11595188B2 (en) Method for storing a data file
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
CN104331345A (en) Data recovery method
CN110968452A (en) Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid
Wang et al. A policy-based deduplication mechanism for securing cloud storage
CN104182418A (en) Method and device for obtaining node metadata
CN111026711A (en) Block chain based data storage method and device, computer equipment and storage medium
CN103118019B (en) A kind of file network clone method based on duplicate removal
WO2023216987A1 (en) Container image construction method and apparatus
Tian et al. Sed‐Dedup: An efficient secure deduplication system with data modifications
US20210320791A1 (en) Systems and methods for adaptive recursive descent data redundancy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140723

RJ01 Rejection of invention patent application after publication