CN106100832A - Key management method based on convergent encryption in a kind of cloud storage data deduplication - Google Patents
Key management method based on convergent encryption in a kind of cloud storage data deduplication Download PDFInfo
- Publication number
- CN106100832A CN106100832A CN201610411991.1A CN201610411991A CN106100832A CN 106100832 A CN106100832 A CN 106100832A CN 201610411991 A CN201610411991 A CN 201610411991A CN 106100832 A CN106100832 A CN 106100832A
- Authority
- CN
- China
- Prior art keywords
- key
- cloud storage
- server
- share
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to key management method based on convergent encryption in a kind of cloud storage data deduplication, n platform key server is added in cloud storage system, described server is for storing the Authentication theory share of client distribution, wherein Authentication theory share is based on (n by client, k, r) RSSS performs Share algorithm, is split by primary key and encodes acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;The arbitrarily Authentication theory share of k (k < n) station server can recover primary key S again, n station server can allow part server lost efficacy or damage, but being to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces random part that r part pseudorandom part replaces RSSS;According to the distribution management method of key in cloud storage system duplicate removal, convergence key is gone weight management and performs file data blocks deduplication operation to be stored.
Description
Technical field
The present invention relates to the key management technology of cloud storage, be specifically related in a kind of cloud storage data deduplication add based on convergence
Close key management method.
Background technology
Data deduplication is a kind of data trnascription deleting repeated and redundant and ensures that identical data file only stores portion
The technology realized.Data deduplication technology is widely used in cloud storage system, it is possible to reduce memory space and uploading bandwidth.Data
The sorting technique of duplicate removal includes: (1) is divided from the granule size of duplicate removal: data deduplication can be divided into data block layer duplicate removal and file
Level duplicate removal;(2) divide from the position angle of duplicate removal: data deduplication can be divided into client duplicate removal and server end duplicate removal;(3) from
Stage of duplicate removal point: data deduplication can be divided into heavily deleting online heavy deletes with rear;(4) divide from the scope of duplicate removal, data deduplication
Local data's duplicate removal and global data duplicate removal can be divided into.
Traditional cloud storage system file-level duplicate removal process is as follows:
1. the label of user's calculation document, generally uses hash function data mark unique to each file generated one
Sign;
2. file label is uploaded to cloud storage server, detects whether to repeat, if repeated, then operating file proprietary rights
Prove.If proof of ownership is passed through, then return to user-accessible and stored the pointer of data;
If do not repeated, carry out block level duplicate removal.A piecemeal operation is increased than file-level.If the detection of block level does not weighs
Multiple, then data block file encrypted and upload on cloud storage server;
If 4. user need obtain data, from cloud storage server download file and decipher file detection file complete
Property, if passed through, then decrypting ciphertext obtains original document.
From above-mentioned data deduplication process it is known that existing data duplicate removal method great majority do not mention the management of key
Problem.But the operation of the encrypting and decrypting of data is all close with cipher key relation.Along with the storage of mass data is backed up, the most efficiently manage
Reason key becomes a hot issue the most concerned in cloud storage system develops.Key managing project includes: (1) basis
Ground management, key storage is in this locality, and user needs to download ciphertext from high in the clouds every time, uses local key to be decrypted;(2) cloud is deposited
Storage management, is stored in Cloud Server, and user downloads key from Cloud Server and is decrypted;(3) it is stored in server after encryption, close
Literary composition uses master key to be encrypted, and the key ciphertext after encryption is stored in Cloud Server, and master key is stored in this locality.
Shortcoming/the deficiency of prior art: during the key being stored in this locality is managed by user, be likely to result in portion
Divide the loss of key to such an extent as to corresponding data cannot be deciphered.It is stored in this locality to need take a large amount of memory space and cannot answer
Challenge to various external assailants.Along with the data being contracted out to Cloud Server are gradually increased, corresponding convergence key also can be in
Linear dependence increases, and user needs to undertake the hugest storage overhead.Key storage is at server, after part is dishonest
Platform manager can reproducible secret key decryption data, obtain content interested, thus expose the privacy of user.Key can not be with
Plaintext version is stored on Cloud Server, and user uses the master key encryption convergence key of oneself and master key locally stored,
Convergence key storage can be reduced take expense and protect data-privacy, but the single point failure of master key and Fault-Tolerant Problems
Still should not be underestimated.
Summary of the invention
It is an object of the invention to the shortcoming overcoming prior art cannot be fault-tolerant with deficiency, such as key storage management, single-point
The problems such as inefficacy, it is provided that key management method based on convergent encryption in a kind of cloud storage data deduplication, it is ensured that user and
The management of the high efficient and reliable of cloud storage aspect convergence key.
The purpose of the present invention is achieved through the following technical solutions:
Key management method based on convergent encryption in a kind of cloud storage data deduplication, including:
A, in cloud storage system add n platform key server, described server for store client distribution key
Sharing share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is divided by primary key by client
Cut and encode acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform
The Authentication theory share of server can recover primary key S again, n station server can allow part server lost efficacy or
Person's damage etc., but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces r part pseudorandom part
Replace random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and
Perform file data blocks deduplication operation to be stored.
Further, described cloud storage system is cloud storage service system based on HDFS.
Further, described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Further, described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares
Relatively.
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored weighs
Multiple.If cloud storage exists the label value repeated, then this document repeats, and stops upload operation.Client and cloud service carry out literary composition
Part proprietary rights is verified, if passed through, then client obtains to point to and stored the pointer of file to access.Otherwise, client obtains
Get failure signal.If file does not repeats, then perform step B3 and perform block level duplicate removal.
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into
Block { Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent
(Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends
To jth platform key server.Wherein TagGenCE() is that label produces algorithm.
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical
Label.If the most stored, then user and jth platform key server operation block layer proof of ownership.If proving to pass through, then the
J platform key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve
Tag (Bi) and perform B5.
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki=
KeyGenCE(Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence key
CKi=EncryptSE(,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server.Wherein, l is the master key of user.Wherein,
KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm.
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform cipher key service
Device.
B7, user need to download file, need to send request at least k platform key server, obtain at least k part secret altogether
Enjoy.Original convergence key K is recovered by Recover () algorithmi.From storage server download data ciphertext, use convergence close
Key KiDeciphering obtains data clear text.
Further, described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part
Replace random part of RSSS.CalculateProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash
(Ki+2)…Hm=Hash (Ki+m).By outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence.
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate n part formed objects to k number
Code block is distributed to the storage of n platform key server.
Further, the data block label of the described label having stored file and file to be stored all uses SHA-1 Hash
Algorithm is calculated.
The present invention has such advantages as relative to prior art and effect:
(1) in tradition machining system, it is distributed to multiple stage key server by convergence key and realizes the height in convergence key
Effect duplicate removal.Present invention substantially reduces convergence key storage overhead and can fault-tolerant recovery key.Even if part server
Unexpected Lost Security Key data, key data still can be recovered by algorithm.
(2) share key by secret sharing scheme, key storage can be avoided in local single point failure problem.In peace
Full property aspect, but secret can be passed through any k part Shared restoration can not be by less than k part Shared restoration;Arbitrarily r part shares nothing
Method is inferred about secret information.Present configuration realizes the safety of outsourcing data based on safety encryption duplicate removal, convergence key with
Distributed security is stored in key server, it is ensured that even if the r platform key server confederate, also cannot obtain key information.
Accompanying drawing explanation
Fig. 1 is present invention file system structure based on cloud storage schematic diagram.
Fig. 2 is the flow process that present invention file system based on cloud storage carries out duplicate removal to file data blocks to be stored.
Fig. 3 is the convergence key K of present invention file system based on cloud storageiPrivacy share flow process.
Detailed description of the invention
Key management method Dekey based on convergent encryption in a kind of cloud storage data deduplication, including:
A, in cloud storage system add n platform key server, described server for store client distribution key
Sharing share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is divided by primary key by client
Cut and encode acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform
The Authentication theory share of server can recover primary key S again, n station server can allow part server lost efficacy or
Person's damage etc., but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces r part pseudorandom part
Replace random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and
Perform file data blocks deduplication operation to be stored.
Further, described cloud storage system is cloud storage service system based on HDFS.
Further, described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Reference Fig. 2, described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares
Relatively.
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored weighs
Multiple.If cloud storage exists the label value repeated, then this document repeats, and stops upload operation.Client and cloud service carry out literary composition
Part proprietary rights is verified, if passed through, then client obtains to point to and stored the pointer of file to access.Otherwise, client obtains
Get failure signal.If file does not repeats, then perform step B3 and perform block level duplicate removal.
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into
Block { Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent
(Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends
To jth platform key server.Wherein TagGenCE() is that label produces algorithm.
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical
Label.If the most stored, then user and jth platform key server operation block layer proof of ownership.If proving to pass through, then the
J platform key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve
Tag (Bi) and perform B5.
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki=
KeyGenCE(Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence key
CKi=EncryptSE(l,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server.Wherein, l is the master key of user.Its
In, KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm.
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform cipher key service
Device.
B7, user need to download file, need to send request at least k platform key server, obtain at least k part secret altogether
Enjoy.Original convergence key K is recovered by Recover () algorithmi.From storage server download data ciphertext, use convergence close
Key KiDeciphering obtains data clear text.
Reference Fig. 3, described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part
Replace random part of RSSS.CalculateProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash
(Ki+2)…Hm=Hash (Ki+m).By outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence.
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate n part formed objects to k number
Code block is distributed to the storage of n platform key server.
It is further used as preferred embodiment, the described label having stored file and the data block mark of file to be stored
Sign and all use SHA-1 hash algorithm to be calculated.
The embodiment of the present invention, when user uploads data, calculates the cryptographic Hash of data by hash algorithm, and by comparing
Cryptographic Hash determines whether there is record in cloud storage file system, and then performs deduplication operation.Simultaneously close to convergence
Key carries out weight management, uses Multi Secrets Sharing scheme, reduces storage overhead and can have certain fault freedom.
Above example is only in order to illustrate that technical scheme is not intended to limit;Although with reference to preferred embodiment pair
The present invention has been described in detail, and those of ordinary skill in the field are it is understood that still can concrete to the present invention
Embodiment is modified or portion of techniques feature is carried out equivalent;Without deviating from the spirit of technical solution of the present invention,
It all should be contained in the middle of the technical scheme scope that the present invention is claimed.
Claims (6)
1. key management method based on convergent encryption in a cloud storage data deduplication, it is characterised in that: including:
A, in cloud storage system add n platform key server, described server for store client distribution Authentication theory
Share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is split also by primary key by client
Coding obtains;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform service
The Authentication theory share of device can recover primary key S again, part server can be allowed to lose efficacy or damage in n station server
Bad, but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces the replacement of r part pseudorandom part
Random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and execution
File data blocks deduplication operation to be stored.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 1, its feature exists
In: described cloud storage system is cloud storage service system based on HDFS.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 1, its feature exists
In: described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 2, its feature exists
In: described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares;
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored repeats, as
Really there is the label value repeated in cloud storage, then this document repeats, and stops upload operation, and client and cloud service carry out file owns
Power checking, if passed through, then client obtains to point to and has stored the pointer of file to access, and otherwise, client gets mistake
Lose signal, if file does not repeats, then perform step B3 and perform block level duplicate removal;
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into block
{Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent
(Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends
To jth platform key server, wherein TagGenCE() is that label produces algorithm;
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical label,
If the most stored, then user and jth platform key server operation block layer proof of ownership, if proving to pass through, then jth platform is close
Key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve Tag
And perform B5 (Bi);
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki=KeyGenCE
(Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence ciphering key Ki=
EncryptSE(l,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server, wherein, l is the master key of user, wherein,
KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm;
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform key server;
B7, user need to download file, need to send request at least k platform key server, obtain at least k part privacy share,
Original convergence key K is recovered by Recover () algorithmi, from storage server download data ciphertext, use convergence key Ki
Deciphering obtains data clear text.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 4, its feature exists
In: described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part and replace
Random part of RSSS, calculatesProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash (Ki+
2)…Hm=Hash (Ki+ m), by outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence;
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate the code block of n part formed objects to k number
It is distributed to the storage of n platform key server.
6. according to key management method based on convergent encryption in the cloud storage data deduplication described in any one of claim 2-5,
It is characterized in that: the data block label of the label and file to be stored that have stored file all uses SHA-1 hash algorithm to calculate
Obtain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610411991.1A CN106100832A (en) | 2016-06-12 | 2016-06-12 | Key management method based on convergent encryption in a kind of cloud storage data deduplication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610411991.1A CN106100832A (en) | 2016-06-12 | 2016-06-12 | Key management method based on convergent encryption in a kind of cloud storage data deduplication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106100832A true CN106100832A (en) | 2016-11-09 |
Family
ID=57846829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610411991.1A Withdrawn CN106100832A (en) | 2016-06-12 | 2016-06-12 | Key management method based on convergent encryption in a kind of cloud storage data deduplication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106100832A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
CN108400970A (en) * | 2018-01-20 | 2018-08-14 | 西安电子科技大学 | Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment |
CN108494552A (en) * | 2018-03-16 | 2018-09-04 | 西安电子科技大学 | Support the cloud storage data duplicate removal method of efficiently convergence key management |
CN108566277A (en) * | 2017-12-22 | 2018-09-21 | 西安电子科技大学 | Deletion data copy method based on data storage location in cloud storage |
CN108574575A (en) * | 2017-03-07 | 2018-09-25 | 罗伯特·博世有限公司 | Data processing method and data processing equipment |
CN109347788A (en) * | 2018-08-17 | 2019-02-15 | 广东工业大学 | A kind of data duplicate removal method, system and device based on storage gateway |
CN109962776A (en) * | 2017-12-25 | 2019-07-02 | 亚旭电脑股份有限公司 | Encryption method and decryption method |
CN110099097A (en) * | 2019-03-18 | 2019-08-06 | 广东工业大学 | A kind of data duplicate removal method for resisting side-channel attack |
CN110175169A (en) * | 2019-05-30 | 2019-08-27 | 青岛大学 | A kind of encryption data De-weight method, system and relevant apparatus |
CN110430042A (en) * | 2019-06-28 | 2019-11-08 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method storing code key in isomery redundant system |
CN110602147A (en) * | 2019-10-09 | 2019-12-20 | 吴新胜 | Data encryption safe storage method, system and storage medium based on cloud platform |
WO2020114377A1 (en) * | 2018-12-03 | 2020-06-11 | Foris Limited | Secure distributed key management system |
CN111314090A (en) * | 2020-03-25 | 2020-06-19 | 北京航空航天大学 | Secure multi-cloud password management method based on bit level threshold |
CN111615701A (en) * | 2017-11-23 | 2020-09-01 | 华为技术有限公司 | System and method for storing encrypted data |
CN112152798A (en) * | 2020-08-31 | 2020-12-29 | 中大编码有限公司 | Distributed cipher text shared key management method and system based on encrypted data deduplication |
CN112385176A (en) * | 2018-08-09 | 2021-02-19 | 赫尔实验室有限公司 | Anonymous distribution and majority voting in a compromised environment |
CN112650628A (en) * | 2020-12-30 | 2021-04-13 | 浪潮云信息技术股份公司 | High-availability and expandable data deduplication method |
CN112866299A (en) * | 2021-04-12 | 2021-05-28 | 南京大学 | Encrypted data deduplication and sharing device and method for mobile edge computing network |
CN112906056A (en) * | 2021-03-17 | 2021-06-04 | 广东工业大学 | Cloud storage key security management method based on block chain |
CN113474829A (en) * | 2019-02-22 | 2021-10-01 | 松下电器产业株式会社 | Secure secret shared storage system using cloud services |
CN113630448A (en) * | 2021-07-26 | 2021-11-09 | 重庆邮电大学 | Distributed encryption storage method and system, computer device and readable storage medium |
CN115102699A (en) * | 2022-06-21 | 2022-09-23 | 西安邮电大学 | Data security deduplication and data recovery method, system, medium, device and terminal |
CN116980184A (en) * | 2023-06-28 | 2023-10-31 | 中国石化销售股份有限公司广东石油分公司 | SDWAN network key distribution method and system based on multiple redundancy algorithm |
CN118590316A (en) * | 2024-08-02 | 2024-09-03 | 山东浪潮科学研究院有限公司 | Cloud encrypted data deduplication method and device based on secret sharing and storage medium |
-
2016
- 2016-06-12 CN CN201610411991.1A patent/CN106100832A/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
JIN LI,ET AL: "Secure Deduplication with Efficient and Reliable Convergent Key Management", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》 * |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108574575A (en) * | 2017-03-07 | 2018-09-25 | 罗伯特·博世有限公司 | Data processing method and data processing equipment |
CN107295002B (en) * | 2017-07-12 | 2020-06-19 | 联动优势科技有限公司 | Cloud data storage method and server |
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
CN111615701B (en) * | 2017-11-23 | 2024-02-09 | 华为技术有限公司 | System and method for storing encrypted data |
CN111615701A (en) * | 2017-11-23 | 2020-09-01 | 华为技术有限公司 | System and method for storing encrypted data |
CN108566277A (en) * | 2017-12-22 | 2018-09-21 | 西安电子科技大学 | Deletion data copy method based on data storage location in cloud storage |
CN108566277B (en) * | 2017-12-22 | 2020-04-21 | 西安电子科技大学 | Data storage position-based data copy deleting method in cloud storage |
CN109962776B (en) * | 2017-12-25 | 2022-02-08 | 亚旭电脑股份有限公司 | Encryption method and decryption method |
CN109962776A (en) * | 2017-12-25 | 2019-07-02 | 亚旭电脑股份有限公司 | Encryption method and decryption method |
CN108400970A (en) * | 2018-01-20 | 2018-08-14 | 西安电子科技大学 | Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment |
CN108400970B (en) * | 2018-01-20 | 2020-10-02 | 西安电子科技大学 | Similar data message locking, encrypting and de-duplicating method in cloud environment and cloud storage system |
CN108494552A (en) * | 2018-03-16 | 2018-09-04 | 西安电子科技大学 | Support the cloud storage data duplicate removal method of efficiently convergence key management |
CN112385176B (en) * | 2018-08-09 | 2024-04-16 | 赫尔实验室有限公司 | System, method and medium for anonymous work allocation and majority voting |
CN112385176A (en) * | 2018-08-09 | 2021-02-19 | 赫尔实验室有限公司 | Anonymous distribution and majority voting in a compromised environment |
CN109347788A (en) * | 2018-08-17 | 2019-02-15 | 广东工业大学 | A kind of data duplicate removal method, system and device based on storage gateway |
WO2020114377A1 (en) * | 2018-12-03 | 2020-06-11 | Foris Limited | Secure distributed key management system |
CN111971929A (en) * | 2018-12-03 | 2020-11-20 | 福瑞斯有限公司 | Secure distributed key management system |
CN113474829B (en) * | 2019-02-22 | 2024-03-15 | 松下控股株式会社 | Secure secret sharing storage system using cloud services |
CN113474829A (en) * | 2019-02-22 | 2021-10-01 | 松下电器产业株式会社 | Secure secret shared storage system using cloud services |
CN110099097A (en) * | 2019-03-18 | 2019-08-06 | 广东工业大学 | A kind of data duplicate removal method for resisting side-channel attack |
CN110099097B (en) * | 2019-03-18 | 2021-12-17 | 广东工业大学 | Data deduplication method for resisting side channel attack |
CN110175169A (en) * | 2019-05-30 | 2019-08-27 | 青岛大学 | A kind of encryption data De-weight method, system and relevant apparatus |
CN110175169B (en) * | 2019-05-30 | 2023-05-09 | 青岛大学 | Encrypted data deduplication method, system and related device |
CN110430042A (en) * | 2019-06-28 | 2019-11-08 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method storing code key in isomery redundant system |
CN110430042B (en) * | 2019-06-28 | 2022-11-22 | 中国人民解放军战略支援部队信息工程大学 | Device and method for storing secret key in heterogeneous redundant system |
CN110602147A (en) * | 2019-10-09 | 2019-12-20 | 吴新胜 | Data encryption safe storage method, system and storage medium based on cloud platform |
CN110602147B (en) * | 2019-10-09 | 2021-07-30 | 合肥中科深谷科技发展有限公司 | Data encryption safe storage method, system and storage medium based on cloud platform |
CN111314090A (en) * | 2020-03-25 | 2020-06-19 | 北京航空航天大学 | Secure multi-cloud password management method based on bit level threshold |
CN112152798A (en) * | 2020-08-31 | 2020-12-29 | 中大编码有限公司 | Distributed cipher text shared key management method and system based on encrypted data deduplication |
CN112152798B (en) * | 2020-08-31 | 2023-10-03 | 云链网科技(广东)有限公司 | Distributed ciphertext sharing key management method and system based on encrypted data deduplication |
CN112650628A (en) * | 2020-12-30 | 2021-04-13 | 浪潮云信息技术股份公司 | High-availability and expandable data deduplication method |
CN112906056A (en) * | 2021-03-17 | 2021-06-04 | 广东工业大学 | Cloud storage key security management method based on block chain |
CN112866299A (en) * | 2021-04-12 | 2021-05-28 | 南京大学 | Encrypted data deduplication and sharing device and method for mobile edge computing network |
CN113630448B (en) * | 2021-07-26 | 2024-01-12 | 广州云强信息科技有限公司 | Distributed encryption storage method and system, computer device, and readable storage medium |
CN113630448A (en) * | 2021-07-26 | 2021-11-09 | 重庆邮电大学 | Distributed encryption storage method and system, computer device and readable storage medium |
CN115102699A (en) * | 2022-06-21 | 2022-09-23 | 西安邮电大学 | Data security deduplication and data recovery method, system, medium, device and terminal |
CN116980184A (en) * | 2023-06-28 | 2023-10-31 | 中国石化销售股份有限公司广东石油分公司 | SDWAN network key distribution method and system based on multiple redundancy algorithm |
CN116980184B (en) * | 2023-06-28 | 2024-08-13 | 中国石化销售股份有限公司广东石油分公司 | SDWAN network key distribution method and system based on multiple redundancy algorithm |
CN118590316A (en) * | 2024-08-02 | 2024-09-03 | 山东浪潮科学研究院有限公司 | Cloud encrypted data deduplication method and device based on secret sharing and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106100832A (en) | Key management method based on convergent encryption in a kind of cloud storage data deduplication | |
CN109995505B (en) | Data security duplicate removal system and method in fog computing environment and cloud storage platform | |
CN103685162A (en) | File storing and sharing method | |
CN109241754B (en) | Cloud file repeated data deleting method based on block chain | |
Akhila et al. | A study on deduplication techniques over encrypted data | |
KR101285281B1 (en) | Security system and its security method for self-organization storage | |
CN106101257A (en) | A kind of cloud storage data managing method based on Bloom filter and device | |
CN104809407A (en) | Method and system for encrypting, decrypting and verifying cloud storage front end data | |
CN108400970A (en) | Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment | |
CN103780607A (en) | Repeating-data deleting method based on different permissions and system thereof | |
CN112565434A (en) | Cloud storage safety duplicate removal method and device based on Mercker hash tree | |
Mukundan et al. | Replicated Data Integrity Verification in Cloud. | |
Mahalakshmi et al. | Effectuation of secure authorized deduplication in hybrid cloud | |
Gang et al. | Secure image deduplication in cloud storage | |
CN108494552B (en) | Cloud storage data deduplication method supporting efficient convergence key management | |
Brindha et al. | Securing cloud data using visual cryptography | |
WO2008111835A1 (en) | Method for saving a file | |
Hu et al. | SSeCloud: Using secret sharing scheme to secure keys | |
Reddy et al. | Secure Data Deduplication by Using Convergent Key | |
Shaikh et al. | Achieving secure deduplication by using private cloud and public cloud | |
Sun et al. | Cloud storage architecture achieving privacy protection and sharing | |
Anitha et al. | Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments | |
Patil et al. | A survey on: secure data deduplication on hybrid cloud storage architecture | |
Jacob et al. | Secured and reliable file sharing system with de-duplication using erasure correction code | |
Bhadrappa et al. | Implementation of De-Duplication Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161109 |
|
WW01 | Invention patent application withdrawn after publication |