CN103944988A - Repeating data deleting system and method applicable to cloud storage - Google Patents
Repeating data deleting system and method applicable to cloud storage Download PDFInfo
- Publication number
- CN103944988A CN103944988A CN201410164634.0A CN201410164634A CN103944988A CN 103944988 A CN103944988 A CN 103944988A CN 201410164634 A CN201410164634 A CN 201410164634A CN 103944988 A CN103944988 A CN 103944988A
- Authority
- CN
- China
- Prior art keywords
- data
- file
- cloud storage
- client
- data block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a repeating data deleting system and method applicable to cloud storage. The repeating data deleting system is based on strategies, a security agent and a random storage mechanism are adopted, a storage service is separated from a security service, the space utilization rate of cloud storage is improved, bandwidth occupation of redundant data is reduced, and security of user data and privacies is improved at the same time. The system is mainly composed of a client, the security agent and the cloud storage, wherein the security agent is the most secure core and is mainly used for ensuring the security of the user data and privacies. The repeating data deleting system and method applicable to cloud storage have the advantages of being high in security, system efficiency, bandwidth utilization rate and the like, and can resist replay attack, impersonation attack and security threats brought by partially trusted cloud storage providers.
Description
Technical field
The present invention relates to cloud storage and field of information security technology, particularly data de-duplication technology.
Background technology
Cloud storage is in cloud computing (Cloud Computing) conceptive extension and a development new concept out, refer to by functions such as cluster application, grid or distributed file systems, a large amount of various dissimilar memory devices in network are gathered to collaborative work by application software, a system of data storage and Operational Visit function is externally provided jointly.Cloud storage system utilizes data de-duplication technology, only retains a copy of redundant data, and the pointer that points to this copy is provided, rather than stores a plurality of copies, thereby can greatly reduce expense and the bandwidth demand of disk space.According to recent statistics data, data de-duplication technology is the most effective memory technology, will be applied in 75% standby system and cloud storage in ensuing several years.
Yet between data de-duplication technology and data encryption, exist and conflict, while using traditional encryption method, when encryption key is different, even identical plaintext, the ciphertext of generation is also diverse, and this makes to carry out the deletion of repeating data.Although convergent encryption can effectively be alleviated this conflict, also there is the threat of leaking privacy of user.
Also there is security threat in cloud storage provider for user in addition, it is generally acknowledged that provider is half believable, be that Cloud Server can be according to predefined agreement and strategy work, can not carry out obvious malicious attack, but cannot ensure the data uploaded not by cloud storage provider unauthorizedly check, scanning and show-and-tell, therefore cannot solve client's safety worries.
Convergent encryption is similar to symmetric cryptography, but encryption key from cryptographic Hash expressly, encryption method is based on xor operation.Same plaintext will be mapped to same encryption key, generates identical ciphertext, so this encryption method is widely applied in data deduplication system after encrypting.
Summary of the invention
The object of the invention has been to provide a kind of data deduplication system and method that is applicable to cloud storage environment, it is too many that the method has solved in cloud storage system redundant data, the problem that memory space utilance is low, and can effectively alleviate conflicting between data de-duplication technology and data encryption, and prevent the threat from cloud storage provider; The method can greatly improve memory space utilance, reduces bandwidth occupancy and improve user data and personal secrets.
The technical solution adopted for the present invention to solve the technical problems is: the invention provides the data deduplication system based on tactful in a kind of secure cloud storage, this system adopts TSM Security Agent and random memory mechanism, stores service is separated with security service, improve cloud memory property and safety; The cloud storage system that this system relates to mainly, by client, TSM Security Agent and three module compositions of cloud storage, specifically comprises as follows:
One, client
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file.
Hash: file or data block are calculated to hash value, as its fingerprint.What the most often use at present is MD5 and two kinds of hash methods of SHA-1.
Local fingerprint base: for storing file that this user uploads and the hash value of data block.
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning.
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation.
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time.During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server.
Data de-duplication operations of the present invention is carried out in client, takes the stratification superfluous strategy that disappears, and reduces overhead and the raising superfluous rate that disappears
Two, TSM Security Agent
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication.
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint.
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client.
Storage index: log file and the data block storage information in Cloud Server, as shown in table 1.
file_ID | file_Name | Location | Chunks | …… |
Table 1: file storage index
Three, cloud storage
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
Data management: Cloud Server carries out basic management, optimization etc. according to storage policy to data.
The random storage scheme that the memory location of user's uploading data in cloud storage generated by TSM Security Agent is definite, and is uniformly distributed in different cloud storage providers, has improved user data and privacy of user safety.
The present invention is a kind of data de-duplication method that is applicable to cloud storage also, and the method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, search fingerprint base, obtain each data block fingerprint Fingerprints (fg1, fg2, fg3 ...), deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
Beneficial effect:
1, the present invention significantly reduces bandwidth occupancy, has also improved cloud storage server performance and space utilisation simultaneously.
2, the present invention has improved convergent encryption fail safe, prevents that assailant from obtaining the threshold values of storage of subscriber data number of copies by uploading test file.
3, verification retransmission mechanism of the present invention effectively guarantees user data integrality, prevents from damaging, losing or even be maliciously tampered in the data block of data upload stage appearance.
4, timestamp of the present invention can effectively be resisted possible Replay Attack, improves cloud storage security.
Accompanying drawing explanation
Fig. 1 is data upload flow chart of the present invention.
Fig. 2 is that data of the present invention are downloaded flow chart.
Fig. 3 is system configuration schematic diagram of the present invention.
Embodiment
Below in conjunction with Figure of description, the invention is described in further detail.
As depicted in figs. 1 and 2, the invention provides a kind of data de-duplication method that is applicable to cloud storage, in fact execute two stages that mainly contain: data upload stage and data download phase, the method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, search fingerprint base, obtain each data block fingerprint Fingerprints (fg1, fg2, fg3 ...), deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
As shown in Figure 3, the invention provides the data deduplication system based on tactful in a kind of secure cloud storage, this system adopts TSM Security Agent and random memory mechanism, and stores service is separated with security service, improves cloud memory property and safety; The cloud storage system that this system relates to mainly, by client, TSM Security Agent and three module compositions of cloud storage, specifically comprises as follows:
One, client
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file.
Hash: file or data block are calculated to hash value, as its fingerprint.What the most often use at present is MD5 and two kinds of hash methods of SHA-1.
Local fingerprint base: for storing file that this user uploads and the hash value of data block.
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning.
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation.
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time.During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server.
Data de-duplication operations of the present invention is carried out in client, takes the stratification superfluous strategy that disappears, and reduces overhead and the raising superfluous rate that disappears
Two, TSM Security Agent
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication.
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint.
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client.
Storage index: log file and the data block storage information in Cloud Server, as shown in table 1.
file_ID | file_Name | Location | Chunka | …… |
Table 1: file storage index
Three, cloud storage
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
Data management: Cloud Server carries out basic management, optimization etc. according to storage policy to data.
The random storage scheme that the memory location of user's uploading data in cloud storage generated by TSM Security Agent is definite, and is uniformly distributed in different cloud storage providers, has improved user data and privacy of user safety.
Claims (5)
1. a data deduplication system that is applicable to cloud storage, is characterized in that, described system is that described system adopts TSM Security Agent and random memory mechanism, and stores service is separated with security service by client, TSM Security Agent, cloud storage three large module compositions;
Client, the client of described system comprises:
File block/assembling: to carrying out the file of block level repeating data detection, be fixed long piecemeal or content-based piecemeal; And in data downloading process, data chunk is dressed up to file;
Hash: file or data block are calculated to hash value, as its fingerprint;
Local fingerprint base: for storing file that this user uploads and the hash value of data block;
Data de-duplication: according to the hash value of file or data block, comparison TSM Security Agent fingerprint base, determines whether to carry out data de-duplication operations according to the comparison result returning;
Convergent encryption: utilize the hash value of file or data block as key, the data that needs are uploaded are carried out preliminary cryptographic operation;
Authorize: need to be to TSM Security Agent and the registration of cloud storage server when user uses for the first time; During upload and download data, need show its legal identity to TSM Security Agent and cloud storage server;
TSM Security Agent, the TSM Security Agent of described system comprises:
Access control: only have legal user ability query fingerprints storehouse and storage index, upload and download data also need to carry out authentication;
Overall situation fingerprint base: for storing the Hash fingerprint of global profile and data block, and according to file type classification storage, there is the function of comparison fingerprint;
Memory allocation: according to the finger print information of client upload, give each cloud storage provider by data block Random assignment, generate storage scheme and return to client;
Storage index: log file and the data block storage information in Cloud Server;
Cloud storage, the cloud storage of described system comprises:
Access control: Cloud Server need to carry out authentication to the client of request service and TSM Security Agent, by being used the service of request after checking.
2. a kind of data deduplication system that is applicable to cloud storage according to claim 1, is characterized in that: the data de-duplication operations of described system is carried out in client, takes the stratification superfluous strategy that disappears.
3. a kind of data deduplication system that is applicable to cloud storage according to claim 1, it is characterized in that: the random storage scheme that the memory location of user's uploading data of described system in cloud storage generated by TSM Security Agent is determined, and is uniformly distributed in different cloud storage providers.
4. a method that is applicable to the data deduplication system of cloud storage, is characterized in that, described method comprises the steps:
Step 1: data upload stage;
1) repeating data of carrying out file-level detects: 1. calculation document hash value, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, returns to comparison result to client, if file has existed and number of copies is greater than threshold values F, deletes the Location value that this document writes memory location this document storage index simultaneously; Otherwise judgement file size, carries out convergent encryption if be less than threshold values S, if be greater than threshold values S, carries out the detection of block level repeating data;
2) block level repeating data detects: 1. first file is carried out to piecemeal, calculate the hash value of each data block, and be sent to TSM Security Agent; 2. TSM Security Agent comparison fingerprint base, if existed and number of copies is greater than threshold values F, deletes this data block, and generates storage pointer, otherwise carry out convergent encryption;
3) TSM Security Agent generates random storage scheme, to ading up to the data block of N, randomly drawing N/M data block deposits to cloud storage server 1, randomly drawing N/M deposits to cloud storage server 2 again, by that analogy, then the party's case is sent to client, upgrade overall fingerprint base and file storage index database simultaneously;
4) each data block Di that client is uploaded need calculates MD5 check value Ci, then according to random storage scheme, data block Di and corresponding check value Ci case after compressing and is uploaded to corresponding cloud storage server;
5) each cloud storage server decompresses, and again calculate the check value Ci ' of data block Di, if Ci=Ci ' carries out the data management memory optimizing on data storage and basis, otherwise back-checking not by information to client, again upload this data block;
Step 2: data download phase;
1) client sends request and downloads certain file to TSM Security Agent;
2) first TSM Security Agent verifies request legitimacy, the file ID search storage index database of then downloading according to request, obtain each data block of file storage information A file_ID, FileName, Location, Chunks ..., and return to client;
3) client, according to the storage information A of returning, is sent data block download request to corresponding cloud storage server;
4) after each cloud storage server checking request legitimacy, return to requested data block Chunks{chunk1, chunk2, chunk3 ... to client;
5) client receives after Chunks, searches for fingerprint base, obtains the fingerprint Fingerprints of each data block, and deciphering obtains, after data block plaintext, giving file Knockdown block, restores original.
5. a kind of method that is applicable to the data deduplication system of cloud storage according to claim 4, is characterized in that: each data block fingerprint Fingerprints of described method is fg1, fg2, and fg3 ...
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410164634.0A CN103944988A (en) | 2014-04-22 | 2014-04-22 | Repeating data deleting system and method applicable to cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410164634.0A CN103944988A (en) | 2014-04-22 | 2014-04-22 | Repeating data deleting system and method applicable to cloud storage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103944988A true CN103944988A (en) | 2014-07-23 |
Family
ID=51192469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410164634.0A Pending CN103944988A (en) | 2014-04-22 | 2014-04-22 | Repeating data deleting system and method applicable to cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103944988A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778095A (en) * | 2015-01-20 | 2015-07-15 | 成都携恩科技有限公司 | Cloud platform data management method |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN104902010A (en) * | 2015-04-30 | 2015-09-09 | 浙江工商大学 | Cloud storage method and system for file |
CN104994069A (en) * | 2015-05-25 | 2015-10-21 | 南京信息工程大学 | Cloud-storage data integrity proving method based on data repeatability verification |
CN105072157A (en) * | 2015-07-15 | 2015-11-18 | 柳州首光科技有限公司 | Network-based data storage system having privacy protection function |
CN105893511A (en) * | 2016-03-30 | 2016-08-24 | 电子科技大学 | Method for data copy trace retention through agent cloud |
CN105955675A (en) * | 2016-06-22 | 2016-09-21 | 南京邮电大学 | Repeated data deletion system and method for de-centralization cloud environment |
CN106790711A (en) * | 2017-03-06 | 2017-05-31 | 苏州汉辰数字科技有限公司 | A kind of cloud storage system based on quantum Flow Technique |
CN107066352A (en) * | 2017-03-02 | 2017-08-18 | 陈辉 | With delete again and remote functionality portable intelligent device backup devices and methods therefor |
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
CN107566463A (en) * | 2017-08-21 | 2018-01-09 | 北京航空航天大学 | A kind of cloudy storage management system for improving storage availability |
CN107864220A (en) * | 2017-11-29 | 2018-03-30 | 佛山市因诺威特科技有限公司 | A kind of cloud monitoring server and cloud client computing device |
CN108241640A (en) * | 2016-12-23 | 2018-07-03 | 航天星图科技(北京)有限公司 | A kind of distributed file memory method |
CN109800218A (en) * | 2019-01-04 | 2019-05-24 | 平安科技(深圳)有限公司 | Distributed memory system, memory node equipment and data duplicate removal method |
CN110618968A (en) * | 2019-08-13 | 2019-12-27 | 数字视觉云(北京)科技发展有限公司 | Media asset storage system based on ipfs |
CN110636141A (en) * | 2019-10-17 | 2019-12-31 | 中国人民解放军陆军工程大学 | Multi-cloud storage system based on cloud and mist cooperation and management method thereof |
CN111291126A (en) * | 2020-02-28 | 2020-06-16 | 深信服科技股份有限公司 | Data recovery method, device, equipment and storage medium |
CN112115495A (en) * | 2020-09-25 | 2020-12-22 | 平安国际智慧城市科技股份有限公司 | Offline cloud data storage method and system, computer equipment and storage medium |
CN112307233A (en) * | 2020-10-30 | 2021-02-02 | 圆通速递有限公司 | Repeated image deleting method and system in cloud storage based on block chain |
CN112416878A (en) * | 2020-11-09 | 2021-02-26 | 山西云时代技术有限公司 | File synchronization management method based on cloud platform |
CN113728302A (en) * | 2019-04-26 | 2021-11-30 | Emc Ip控股有限公司 | Cloud layered garbage collection for de-duplication |
CN114518850A (en) * | 2022-02-23 | 2022-05-20 | 云链网科技(广东)有限公司 | Safe re-deletion storage system with re-deletion before encryption based on trusted execution protection |
CN115242815A (en) * | 2022-07-14 | 2022-10-25 | 山石网科通信技术股份有限公司 | Data cloud storage method and device, management server and user terminal |
CN115757328A (en) * | 2022-11-15 | 2023-03-07 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN117149724A (en) * | 2023-10-30 | 2023-12-01 | 宁德思客琦智能装备有限公司 | Method and system for deleting repeated data of cloud environment system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102035884A (en) * | 2010-12-03 | 2011-04-27 | 华中科技大学 | Cloud storage system and data deployment method thereof |
US20120144448A1 (en) * | 2010-12-01 | 2012-06-07 | Microsoft Corporation | Data Store Including a File Location Attribute |
CN102833298A (en) * | 2011-06-17 | 2012-12-19 | 英业达集团(天津)电子技术有限公司 | Distributed repeated data deleting system and processing method thereof |
CN103530201A (en) * | 2013-07-17 | 2014-01-22 | 华中科技大学 | Safety data repetition removing method and system applicable to backup system |
-
2014
- 2014-04-22 CN CN201410164634.0A patent/CN103944988A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120144448A1 (en) * | 2010-12-01 | 2012-06-07 | Microsoft Corporation | Data Store Including a File Location Attribute |
CN102035884A (en) * | 2010-12-03 | 2011-04-27 | 华中科技大学 | Cloud storage system and data deployment method thereof |
CN102833298A (en) * | 2011-06-17 | 2012-12-19 | 英业达集团(天津)电子技术有限公司 | Distributed repeated data deleting system and processing method thereof |
CN103530201A (en) * | 2013-07-17 | 2014-01-22 | 华中科技大学 | Safety data repetition removing method and system applicable to backup system |
Non-Patent Citations (2)
Title |
---|
沈瑞清: "云存储中避免重复数据存储机制研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
黎天翔: "智能网络存储系统中的重复数据删除技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778095B (en) * | 2015-01-20 | 2017-11-17 | 成都携恩科技有限公司 | A kind of cloud platform data managing method |
CN104778095A (en) * | 2015-01-20 | 2015-07-15 | 成都携恩科技有限公司 | Cloud platform data management method |
CN104902010A (en) * | 2015-04-30 | 2015-09-09 | 浙江工商大学 | Cloud storage method and system for file |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN104836656B (en) * | 2015-05-08 | 2018-04-10 | 厦门大学 | A kind of storage of video file and transmission method |
CN104994069A (en) * | 2015-05-25 | 2015-10-21 | 南京信息工程大学 | Cloud-storage data integrity proving method based on data repeatability verification |
CN104994069B (en) * | 2015-05-25 | 2019-01-01 | 南京信息工程大学 | Cloud storage data integrity method of proof based on data redundancy verifying |
CN105072157A (en) * | 2015-07-15 | 2015-11-18 | 柳州首光科技有限公司 | Network-based data storage system having privacy protection function |
CN105893511A (en) * | 2016-03-30 | 2016-08-24 | 电子科技大学 | Method for data copy trace retention through agent cloud |
CN105955675B (en) * | 2016-06-22 | 2018-11-09 | 南京邮电大学 | A kind of data deduplication system and method for removing center cloud environment |
CN105955675A (en) * | 2016-06-22 | 2016-09-21 | 南京邮电大学 | Repeated data deletion system and method for de-centralization cloud environment |
CN108241640A (en) * | 2016-12-23 | 2018-07-03 | 航天星图科技(北京)有限公司 | A kind of distributed file memory method |
CN107066352A (en) * | 2017-03-02 | 2017-08-18 | 陈辉 | With delete again and remote functionality portable intelligent device backup devices and methods therefor |
CN106790711A (en) * | 2017-03-06 | 2017-05-31 | 苏州汉辰数字科技有限公司 | A kind of cloud storage system based on quantum Flow Technique |
CN107295002B (en) * | 2017-07-12 | 2020-06-19 | 联动优势科技有限公司 | Cloud data storage method and server |
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
CN107566463A (en) * | 2017-08-21 | 2018-01-09 | 北京航空航天大学 | A kind of cloudy storage management system for improving storage availability |
CN107864220A (en) * | 2017-11-29 | 2018-03-30 | 佛山市因诺威特科技有限公司 | A kind of cloud monitoring server and cloud client computing device |
CN109800218B (en) * | 2019-01-04 | 2024-04-09 | 平安科技(深圳)有限公司 | Distributed storage system, storage node device and data deduplication method |
CN109800218A (en) * | 2019-01-04 | 2019-05-24 | 平安科技(深圳)有限公司 | Distributed memory system, memory node equipment and data duplicate removal method |
CN113728302A (en) * | 2019-04-26 | 2021-11-30 | Emc Ip控股有限公司 | Cloud layered garbage collection for de-duplication |
US11989124B2 (en) | 2019-04-26 | 2024-05-21 | EMC IP Holding Company LLC | Garbage collection for a deduplicated cloud tier with encrypted segments |
CN113728302B (en) * | 2019-04-26 | 2024-03-15 | Emc Ip控股有限公司 | Cloud layered garbage collection for de-duplication |
CN110618968A (en) * | 2019-08-13 | 2019-12-27 | 数字视觉云(北京)科技发展有限公司 | Media asset storage system based on ipfs |
CN110636141B (en) * | 2019-10-17 | 2021-11-09 | 中国人民解放军陆军工程大学 | Multi-cloud storage system based on cloud and mist cooperation and management method thereof |
CN110636141A (en) * | 2019-10-17 | 2019-12-31 | 中国人民解放军陆军工程大学 | Multi-cloud storage system based on cloud and mist cooperation and management method thereof |
CN111291126B (en) * | 2020-02-28 | 2023-09-05 | 深信服科技股份有限公司 | Data recovery method, device, equipment and storage medium |
CN111291126A (en) * | 2020-02-28 | 2020-06-16 | 深信服科技股份有限公司 | Data recovery method, device, equipment and storage medium |
CN112115495A (en) * | 2020-09-25 | 2020-12-22 | 平安国际智慧城市科技股份有限公司 | Offline cloud data storage method and system, computer equipment and storage medium |
CN112307233A (en) * | 2020-10-30 | 2021-02-02 | 圆通速递有限公司 | Repeated image deleting method and system in cloud storage based on block chain |
CN112416878A (en) * | 2020-11-09 | 2021-02-26 | 山西云时代技术有限公司 | File synchronization management method based on cloud platform |
CN114518850B (en) * | 2022-02-23 | 2024-03-12 | 云链网科技(广东)有限公司 | Safe re-deleting storage system based on trusted execution protection and comprising re-deleting and encryption |
CN114518850A (en) * | 2022-02-23 | 2022-05-20 | 云链网科技(广东)有限公司 | Safe re-deletion storage system with re-deletion before encryption based on trusted execution protection |
CN115242815A (en) * | 2022-07-14 | 2022-10-25 | 山石网科通信技术股份有限公司 | Data cloud storage method and device, management server and user terminal |
CN115757328B (en) * | 2022-11-15 | 2023-06-27 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN115757328A (en) * | 2022-11-15 | 2023-03-07 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN117149724A (en) * | 2023-10-30 | 2023-12-01 | 宁德思客琦智能装备有限公司 | Method and system for deleting repeated data of cloud environment system |
CN117149724B (en) * | 2023-10-30 | 2024-03-15 | 宁德思客琦智能装备有限公司 | Method and system for deleting repeated data of cloud environment system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103944988A (en) | Repeating data deleting system and method applicable to cloud storage | |
US10552640B2 (en) | In-situ data verification for the cloud | |
Li et al. | Secure distributed deduplication systems with improved reliability | |
US8762743B2 (en) | Encrypting data objects to back-up | |
CN106101257B (en) | A kind of cloud storage data managing method and device based on Bloom filter | |
CN104331346B (en) | A kind of data guard method | |
EP3769228B1 (en) | Consenus of shared blockchain data storage based on error correction code | |
CN102045356B (en) | Cloud-storage-oriented trusted storage verification method and system | |
CN104836862B (en) | A kind of Intelligent terminal data storage method | |
CN104410683A (en) | Data backup method | |
US11489660B2 (en) | Re-encrypting data on a hash chain | |
CN110109617B (en) | Efficient metadata management method in encrypted repeated data deleting system | |
Jayapandian et al. | Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space | |
CN105120003A (en) | Method for realizing data backup in cloud environment | |
US11595188B2 (en) | Method for storing a data file | |
CN106603561A (en) | Block level encryption method in cloud storage and multi-granularity deduplication method | |
CN104331345A (en) | Data recovery method | |
CN110968452A (en) | Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid | |
Wang et al. | A policy-based deduplication mechanism for securing cloud storage | |
CN104182418A (en) | Method and device for obtaining node metadata | |
CN111026711A (en) | Block chain based data storage method and device, computer equipment and storage medium | |
CN103118019B (en) | A kind of file network clone method based on duplicate removal | |
WO2023216987A1 (en) | Container image construction method and apparatus | |
Tian et al. | Sed‐Dedup: An efficient secure deduplication system with data modifications | |
US20210320791A1 (en) | Systems and methods for adaptive recursive descent data redundancy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140723 |
|
RJ01 | Rejection of invention patent application after publication |