CN106100832A - Key management method based on convergent encryption in a kind of cloud storage data deduplication - Google Patents

Key management method based on convergent encryption in a kind of cloud storage data deduplication Download PDF

Info

Publication number
CN106100832A
CN106100832A CN201610411991.1A CN201610411991A CN106100832A CN 106100832 A CN106100832 A CN 106100832A CN 201610411991 A CN201610411991 A CN 201610411991A CN 106100832 A CN106100832 A CN 106100832A
Authority
CN
China
Prior art keywords
key
cloud storage
server
share
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610411991.1A
Other languages
Chinese (zh)
Inventor
刘竹松
尹勤勤
李进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610411991.1A priority Critical patent/CN106100832A/en
Publication of CN106100832A publication Critical patent/CN106100832A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to key management method based on convergent encryption in a kind of cloud storage data deduplication, n platform key server is added in cloud storage system, described server is for storing the Authentication theory share of client distribution, wherein Authentication theory share is based on (n by client, k, r) RSSS performs Share algorithm, is split by primary key and encodes acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;The arbitrarily Authentication theory share of k (k < n) station server can recover primary key S again, n station server can allow part server lost efficacy or damage, but being to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces random part that r part pseudorandom part replaces RSSS;According to the distribution management method of key in cloud storage system duplicate removal, convergence key is gone weight management and performs file data blocks deduplication operation to be stored.

Description

Key management method based on convergent encryption in a kind of cloud storage data deduplication
Technical field
The present invention relates to the key management technology of cloud storage, be specifically related in a kind of cloud storage data deduplication add based on convergence Close key management method.
Background technology
Data deduplication is a kind of data trnascription deleting repeated and redundant and ensures that identical data file only stores portion The technology realized.Data deduplication technology is widely used in cloud storage system, it is possible to reduce memory space and uploading bandwidth.Data The sorting technique of duplicate removal includes: (1) is divided from the granule size of duplicate removal: data deduplication can be divided into data block layer duplicate removal and file Level duplicate removal;(2) divide from the position angle of duplicate removal: data deduplication can be divided into client duplicate removal and server end duplicate removal;(3) from Stage of duplicate removal point: data deduplication can be divided into heavily deleting online heavy deletes with rear;(4) divide from the scope of duplicate removal, data deduplication Local data's duplicate removal and global data duplicate removal can be divided into.
Traditional cloud storage system file-level duplicate removal process is as follows:
1. the label of user's calculation document, generally uses hash function data mark unique to each file generated one Sign;
2. file label is uploaded to cloud storage server, detects whether to repeat, if repeated, then operating file proprietary rights Prove.If proof of ownership is passed through, then return to user-accessible and stored the pointer of data;
If do not repeated, carry out block level duplicate removal.A piecemeal operation is increased than file-level.If the detection of block level does not weighs Multiple, then data block file encrypted and upload on cloud storage server;
If 4. user need obtain data, from cloud storage server download file and decipher file detection file complete Property, if passed through, then decrypting ciphertext obtains original document.
From above-mentioned data deduplication process it is known that existing data duplicate removal method great majority do not mention the management of key Problem.But the operation of the encrypting and decrypting of data is all close with cipher key relation.Along with the storage of mass data is backed up, the most efficiently manage Reason key becomes a hot issue the most concerned in cloud storage system develops.Key managing project includes: (1) basis Ground management, key storage is in this locality, and user needs to download ciphertext from high in the clouds every time, uses local key to be decrypted;(2) cloud is deposited Storage management, is stored in Cloud Server, and user downloads key from Cloud Server and is decrypted;(3) it is stored in server after encryption, close Literary composition uses master key to be encrypted, and the key ciphertext after encryption is stored in Cloud Server, and master key is stored in this locality.
Shortcoming/the deficiency of prior art: during the key being stored in this locality is managed by user, be likely to result in portion Divide the loss of key to such an extent as to corresponding data cannot be deciphered.It is stored in this locality to need take a large amount of memory space and cannot answer Challenge to various external assailants.Along with the data being contracted out to Cloud Server are gradually increased, corresponding convergence key also can be in Linear dependence increases, and user needs to undertake the hugest storage overhead.Key storage is at server, after part is dishonest Platform manager can reproducible secret key decryption data, obtain content interested, thus expose the privacy of user.Key can not be with Plaintext version is stored on Cloud Server, and user uses the master key encryption convergence key of oneself and master key locally stored, Convergence key storage can be reduced take expense and protect data-privacy, but the single point failure of master key and Fault-Tolerant Problems Still should not be underestimated.
Summary of the invention
It is an object of the invention to the shortcoming overcoming prior art cannot be fault-tolerant with deficiency, such as key storage management, single-point The problems such as inefficacy, it is provided that key management method based on convergent encryption in a kind of cloud storage data deduplication, it is ensured that user and The management of the high efficient and reliable of cloud storage aspect convergence key.
The purpose of the present invention is achieved through the following technical solutions:
Key management method based on convergent encryption in a kind of cloud storage data deduplication, including:
A, in cloud storage system add n platform key server, described server for store client distribution key Sharing share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is divided by primary key by client Cut and encode acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform The Authentication theory share of server can recover primary key S again, n station server can allow part server lost efficacy or Person's damage etc., but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces r part pseudorandom part Replace random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and Perform file data blocks deduplication operation to be stored.
Further, described cloud storage system is cloud storage service system based on HDFS.
Further, described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Further, described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares Relatively.
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored weighs Multiple.If cloud storage exists the label value repeated, then this document repeats, and stops upload operation.Client and cloud service carry out literary composition Part proprietary rights is verified, if passed through, then client obtains to point to and stored the pointer of file to access.Otherwise, client obtains Get failure signal.If file does not repeats, then perform step B3 and perform block level duplicate removal.
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into Block { Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent (Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends To jth platform key server.Wherein TagGenCE() is that label produces algorithm.
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical Label.If the most stored, then user and jth platform key server operation block layer proof of ownership.If proving to pass through, then the J platform key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve Tag (Bi) and perform B5.
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki= KeyGenCE(Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence key CKi=EncryptSE(,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server.Wherein, l is the master key of user.Wherein, KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm.
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform cipher key service Device.
B7, user need to download file, need to send request at least k platform key server, obtain at least k part secret altogether Enjoy.Original convergence key K is recovered by Recover () algorithmi.From storage server download data ciphertext, use convergence close Key KiDeciphering obtains data clear text.
Further, described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part Replace random part of RSSS.CalculateProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash (Ki+2)…Hm=Hash (Ki+m).By outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence.
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate n part formed objects to k number Code block is distributed to the storage of n platform key server.
Further, the data block label of the described label having stored file and file to be stored all uses SHA-1 Hash Algorithm is calculated.
The present invention has such advantages as relative to prior art and effect:
(1) in tradition machining system, it is distributed to multiple stage key server by convergence key and realizes the height in convergence key Effect duplicate removal.Present invention substantially reduces convergence key storage overhead and can fault-tolerant recovery key.Even if part server Unexpected Lost Security Key data, key data still can be recovered by algorithm.
(2) share key by secret sharing scheme, key storage can be avoided in local single point failure problem.In peace Full property aspect, but secret can be passed through any k part Shared restoration can not be by less than k part Shared restoration;Arbitrarily r part shares nothing Method is inferred about secret information.Present configuration realizes the safety of outsourcing data based on safety encryption duplicate removal, convergence key with Distributed security is stored in key server, it is ensured that even if the r platform key server confederate, also cannot obtain key information.
Accompanying drawing explanation
Fig. 1 is present invention file system structure based on cloud storage schematic diagram.
Fig. 2 is the flow process that present invention file system based on cloud storage carries out duplicate removal to file data blocks to be stored.
Fig. 3 is the convergence key K of present invention file system based on cloud storageiPrivacy share flow process.
Detailed description of the invention
Key management method Dekey based on convergent encryption in a kind of cloud storage data deduplication, including:
A, in cloud storage system add n platform key server, described server for store client distribution key Sharing share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is divided by primary key by client Cut and encode acquisition;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform The Authentication theory share of server can recover primary key S again, n station server can allow part server lost efficacy or Person's damage etc., but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces r part pseudorandom part Replace random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and Perform file data blocks deduplication operation to be stored.
Further, described cloud storage system is cloud storage service system based on HDFS.
Further, described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Reference Fig. 2, described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares Relatively.
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored weighs Multiple.If cloud storage exists the label value repeated, then this document repeats, and stops upload operation.Client and cloud service carry out literary composition Part proprietary rights is verified, if passed through, then client obtains to point to and stored the pointer of file to access.Otherwise, client obtains Get failure signal.If file does not repeats, then perform step B3 and perform block level duplicate removal.
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into Block { Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent (Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends To jth platform key server.Wherein TagGenCE() is that label produces algorithm.
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical Label.If the most stored, then user and jth platform key server operation block layer proof of ownership.If proving to pass through, then the J platform key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve Tag (Bi) and perform B5.
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki= KeyGenCE(Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence key CKi=EncryptSE(l,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server.Wherein, l is the master key of user.Its In, KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm.
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform cipher key service Device.
B7, user need to download file, need to send request at least k platform key server, obtain at least k part secret altogether Enjoy.Original convergence key K is recovered by Recover () algorithmi.From storage server download data ciphertext, use convergence close Key KiDeciphering obtains data clear text.
Reference Fig. 3, described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part Replace random part of RSSS.CalculateProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash (Ki+2)…Hm=Hash (Ki+m).By outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence.
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate n part formed objects to k number Code block is distributed to the storage of n platform key server.
It is further used as preferred embodiment, the described label having stored file and the data block mark of file to be stored Sign and all use SHA-1 hash algorithm to be calculated.
The embodiment of the present invention, when user uploads data, calculates the cryptographic Hash of data by hash algorithm, and by comparing Cryptographic Hash determines whether there is record in cloud storage file system, and then performs deduplication operation.Simultaneously close to convergence Key carries out weight management, uses Multi Secrets Sharing scheme, reduces storage overhead and can have certain fault freedom.
Above example is only in order to illustrate that technical scheme is not intended to limit;Although with reference to preferred embodiment pair The present invention has been described in detail, and those of ordinary skill in the field are it is understood that still can concrete to the present invention Embodiment is modified or portion of techniques feature is carried out equivalent;Without deviating from the spirit of technical solution of the present invention, It all should be contained in the middle of the technical scheme scope that the present invention is claimed.

Claims (6)

1. key management method based on convergent encryption in a cloud storage data deduplication, it is characterised in that: including:
A, in cloud storage system add n platform key server, described server for store client distribution Authentication theory Share, wherein Authentication theory share is based on (n, k, r)-RSSS performs Share algorithm, is split also by primary key by client Coding obtains;Key recovery algorithm is Recover algorithm, and shared share is reverted to primary key S;Arbitrarily k (k < n) platform service The Authentication theory share of device can recover primary key S again, part server can be allowed to lose efficacy or damage in n station server Bad, but be to ensure that and exceed minimum threshold k station server safe operation, wherein Share algorithm produces the replacement of r part pseudorandom part Random part of RSSS;
B, according to the distribution management method of key in cloud storage system duplicate removal to convergence key go weight management and execution File data blocks deduplication operation to be stored.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 1, its feature exists In: described cloud storage system is cloud storage service system based on HDFS.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 1, its feature exists In: described convergence key is the key using convergent encryption algorithm to generate in described cloud storage system.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 2, its feature exists In: described step B, comprising:
B1, calculate the cryptographic Hash of file F to be stored as label, label Tag (F) is uploaded to cloud storage and compares;
According to the result of retrieval, the label search cloud storage system that B2, basis are uploaded, judges whether file to be stored repeats, as Really there is the label value repeated in cloud storage, then this document repeats, and stops upload operation, and client and cloud service carry out file owns Power checking, if passed through, then client obtains to point to and has stored the pointer of file to access, and otherwise, client gets mistake Lose signal, if file does not repeats, then perform step B3 and perform block level duplicate removal;
B3, for blocks of files level duplicate removal, client executing is calculated below: 1) by file F use block algorithm be divided into block {Bi};2) for each blocks of data { Bi, computing block label Tag (Bi)=TagGenCE(Bi);3) block tag set Tag is sent (Bi) to each key server, and for 1≤j≤n, calculation document label Tagj(F)=TagGenCE(F j) sends To jth platform key server, wherein TagGenCE() is that label produces algorithm;
B4, key server receive block label Tag (Bi), jth platform key server detects whether the most stored identical label, If the most stored, then user and jth platform key server operation block layer proof of ownership, if proving to pass through, then jth platform is close Key server returns one and points to Authentication theory convergence key KiPointer to user;If label does not repeats, then preserve Tag And perform B5 (Bi);
B5, { Bi}, user uses the convergence key { K of hash function computing block for all non-repetitive piecei},Ki=KeyGenCE (Bi), use convergence key encrypting plaintext to generate ciphertext Ci=EncryptCE(Ki,Bi), and encrypt convergence ciphering key Ki= EncryptSE(l,Ki), finally by ciphertext { CiIt is uploaded to cloud storage server, wherein, l is the master key of user, wherein, KeyGenCE() is convergence encryption key generating algorithms, EncryptCE() is symmetric encipherment algorithm;
B6, user use (n, k, r)-RSSS execution Share (Ki) algorithm will convergence key KiShare to n platform key server;
B7, user need to download file, need to send request at least k platform key server, obtain at least k part privacy share, Original convergence key K is recovered by Recover () algorithmi, from storage server download data ciphertext, use convergence key Ki Deciphering obtains data clear text.
Key management method based on convergent encryption in cloud storage data deduplication the most according to claim 4, its feature exists In: described step B6, comprising:
B61, Share algorithm is by key KiIt is divided into the data of the equal size of (k-r) part, then produces r part pseudorandom part and replace Random part of RSSS, calculatesProduce the cryptographic Hash outside m share: H1=Hash (Ki+1),H2=Hash (Ki+ 2)…Hm=Hash (Ki+ m), by outer for m share cryptographic Hash H1, H2…HmJoin the random part of r part and obtain k number evidence;
B62, the error correcting code using generator matrix to be Cauchy matrix according to encoding, generate the code block of n part formed objects to k number It is distributed to the storage of n platform key server.
6. according to key management method based on convergent encryption in the cloud storage data deduplication described in any one of claim 2-5, It is characterized in that: the data block label of the label and file to be stored that have stored file all uses SHA-1 hash algorithm to calculate Obtain.
CN201610411991.1A 2016-06-12 2016-06-12 Key management method based on convergent encryption in a kind of cloud storage data deduplication Withdrawn CN106100832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610411991.1A CN106100832A (en) 2016-06-12 2016-06-12 Key management method based on convergent encryption in a kind of cloud storage data deduplication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610411991.1A CN106100832A (en) 2016-06-12 2016-06-12 Key management method based on convergent encryption in a kind of cloud storage data deduplication

Publications (1)

Publication Number Publication Date
CN106100832A true CN106100832A (en) 2016-11-09

Family

ID=57846829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610411991.1A Withdrawn CN106100832A (en) 2016-06-12 2016-06-12 Key management method based on convergent encryption in a kind of cloud storage data deduplication

Country Status (1)

Country Link
CN (1) CN106100832A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
CN108400970A (en) * 2018-01-20 2018-08-14 西安电子科技大学 Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment
CN108494552A (en) * 2018-03-16 2018-09-04 西安电子科技大学 Support the cloud storage data duplicate removal method of efficiently convergence key management
CN108566277A (en) * 2017-12-22 2018-09-21 西安电子科技大学 Deletion data copy method based on data storage location in cloud storage
CN108574575A (en) * 2017-03-07 2018-09-25 罗伯特·博世有限公司 Data processing method and data processing equipment
CN109347788A (en) * 2018-08-17 2019-02-15 广东工业大学 A kind of data duplicate removal method, system and device based on storage gateway
CN109962776A (en) * 2017-12-25 2019-07-02 亚旭电脑股份有限公司 Encryption method and decryption method
CN110099097A (en) * 2019-03-18 2019-08-06 广东工业大学 A kind of data duplicate removal method for resisting side-channel attack
CN110175169A (en) * 2019-05-30 2019-08-27 青岛大学 A kind of encryption data De-weight method, system and relevant apparatus
CN110430042A (en) * 2019-06-28 2019-11-08 中国人民解放军战略支援部队信息工程大学 A kind of device and method storing code key in isomery redundant system
CN110602147A (en) * 2019-10-09 2019-12-20 吴新胜 Data encryption safe storage method, system and storage medium based on cloud platform
WO2020114377A1 (en) * 2018-12-03 2020-06-11 Foris Limited Secure distributed key management system
CN111314090A (en) * 2020-03-25 2020-06-19 北京航空航天大学 Secure multi-cloud password management method based on bit level threshold
CN111615701A (en) * 2017-11-23 2020-09-01 华为技术有限公司 System and method for storing encrypted data
CN112152798A (en) * 2020-08-31 2020-12-29 中大编码有限公司 Distributed cipher text shared key management method and system based on encrypted data deduplication
CN112385176A (en) * 2018-08-09 2021-02-19 赫尔实验室有限公司 Anonymous distribution and majority voting in a compromised environment
CN112650628A (en) * 2020-12-30 2021-04-13 浪潮云信息技术股份公司 High-availability and expandable data deduplication method
CN112866299A (en) * 2021-04-12 2021-05-28 南京大学 Encrypted data deduplication and sharing device and method for mobile edge computing network
CN112906056A (en) * 2021-03-17 2021-06-04 广东工业大学 Cloud storage key security management method based on block chain
CN113474829A (en) * 2019-02-22 2021-10-01 松下电器产业株式会社 Secure secret shared storage system using cloud services
CN113630448A (en) * 2021-07-26 2021-11-09 重庆邮电大学 Distributed encryption storage method and system, computer device and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JIN LI,ET AL: "Secure Deduplication with Efficient and Reliable Convergent Key Management", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》 *

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574575A (en) * 2017-03-07 2018-09-25 罗伯特·博世有限公司 Data processing method and data processing equipment
CN107295002B (en) * 2017-07-12 2020-06-19 联动优势科技有限公司 Cloud data storage method and server
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
CN111615701B (en) * 2017-11-23 2024-02-09 华为技术有限公司 System and method for storing encrypted data
CN111615701A (en) * 2017-11-23 2020-09-01 华为技术有限公司 System and method for storing encrypted data
CN108566277A (en) * 2017-12-22 2018-09-21 西安电子科技大学 Deletion data copy method based on data storage location in cloud storage
CN108566277B (en) * 2017-12-22 2020-04-21 西安电子科技大学 Data storage position-based data copy deleting method in cloud storage
CN109962776A (en) * 2017-12-25 2019-07-02 亚旭电脑股份有限公司 Encryption method and decryption method
CN109962776B (en) * 2017-12-25 2022-02-08 亚旭电脑股份有限公司 Encryption method and decryption method
CN108400970A (en) * 2018-01-20 2018-08-14 西安电子科技大学 Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment
CN108400970B (en) * 2018-01-20 2020-10-02 西安电子科技大学 Similar data message locking, encrypting and de-duplicating method in cloud environment and cloud storage system
CN108494552A (en) * 2018-03-16 2018-09-04 西安电子科技大学 Support the cloud storage data duplicate removal method of efficiently convergence key management
CN112385176B (en) * 2018-08-09 2024-04-16 赫尔实验室有限公司 System, method and medium for anonymous work allocation and majority voting
CN112385176A (en) * 2018-08-09 2021-02-19 赫尔实验室有限公司 Anonymous distribution and majority voting in a compromised environment
CN109347788A (en) * 2018-08-17 2019-02-15 广东工业大学 A kind of data duplicate removal method, system and device based on storage gateway
WO2020114377A1 (en) * 2018-12-03 2020-06-11 Foris Limited Secure distributed key management system
CN111971929A (en) * 2018-12-03 2020-11-20 福瑞斯有限公司 Secure distributed key management system
CN113474829A (en) * 2019-02-22 2021-10-01 松下电器产业株式会社 Secure secret shared storage system using cloud services
CN113474829B (en) * 2019-02-22 2024-03-15 松下控股株式会社 Secure secret sharing storage system using cloud services
CN110099097A (en) * 2019-03-18 2019-08-06 广东工业大学 A kind of data duplicate removal method for resisting side-channel attack
CN110099097B (en) * 2019-03-18 2021-12-17 广东工业大学 Data deduplication method for resisting side channel attack
CN110175169A (en) * 2019-05-30 2019-08-27 青岛大学 A kind of encryption data De-weight method, system and relevant apparatus
CN110175169B (en) * 2019-05-30 2023-05-09 青岛大学 Encrypted data deduplication method, system and related device
CN110430042B (en) * 2019-06-28 2022-11-22 中国人民解放军战略支援部队信息工程大学 Device and method for storing secret key in heterogeneous redundant system
CN110430042A (en) * 2019-06-28 2019-11-08 中国人民解放军战略支援部队信息工程大学 A kind of device and method storing code key in isomery redundant system
CN110602147B (en) * 2019-10-09 2021-07-30 合肥中科深谷科技发展有限公司 Data encryption safe storage method, system and storage medium based on cloud platform
CN110602147A (en) * 2019-10-09 2019-12-20 吴新胜 Data encryption safe storage method, system and storage medium based on cloud platform
CN111314090A (en) * 2020-03-25 2020-06-19 北京航空航天大学 Secure multi-cloud password management method based on bit level threshold
CN112152798B (en) * 2020-08-31 2023-10-03 云链网科技(广东)有限公司 Distributed ciphertext sharing key management method and system based on encrypted data deduplication
CN112152798A (en) * 2020-08-31 2020-12-29 中大编码有限公司 Distributed cipher text shared key management method and system based on encrypted data deduplication
CN112650628A (en) * 2020-12-30 2021-04-13 浪潮云信息技术股份公司 High-availability and expandable data deduplication method
CN112906056A (en) * 2021-03-17 2021-06-04 广东工业大学 Cloud storage key security management method based on block chain
CN112866299A (en) * 2021-04-12 2021-05-28 南京大学 Encrypted data deduplication and sharing device and method for mobile edge computing network
CN113630448A (en) * 2021-07-26 2021-11-09 重庆邮电大学 Distributed encryption storage method and system, computer device and readable storage medium
CN113630448B (en) * 2021-07-26 2024-01-12 广州云强信息科技有限公司 Distributed encryption storage method and system, computer device, and readable storage medium

Similar Documents

Publication Publication Date Title
CN106100832A (en) Key management method based on convergent encryption in a kind of cloud storage data deduplication
CN109995505B (en) Data security duplicate removal system and method in fog computing environment and cloud storage platform
CN103763362A (en) Safe distributed duplicated data deletion method
CN103685162A (en) File storing and sharing method
KR101285281B1 (en) Security system and its security method for self-organization storage
CN106101257A (en) A kind of cloud storage data managing method based on Bloom filter and device
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
Akhila et al. A study on deduplication techniques over encrypted data
CN108400970A (en) Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment
CN104994068A (en) Multimedia content protection and safe distribution method in cloud environment
CN103780607A (en) Repeating-data deleting method based on different permissions and system thereof
CN112565434A (en) Cloud storage safety duplicate removal method and device based on Mercker hash tree
Mukundan et al. Replicated Data Integrity Verification in Cloud.
Mahalakshmi et al. Effectuation of secure authorized deduplication in hybrid cloud
Gang et al. Secure image deduplication in cloud storage
CN108494552B (en) Cloud storage data deduplication method supporting efficient convergence key management
EP2135190A1 (en) Method for saving a file
Hu et al. SSeCloud: Using secret sharing scheme to secure keys
Reddy et al. Secure Data Deduplication by Using Convergent Key
Sun et al. Cloud storage architecture achieving privacy protection and sharing
Anitha et al. Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments
Patil et al. A survey on: secure data deduplication on hybrid cloud storage architecture
Shaikh et al. Achieving secure deduplication by using private cloud and public cloud
Jacob et al. Secured and reliable file sharing system with de-duplication using erasure correction code
Bhadrappa et al. Implementation of De-Duplication Algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20161109

WW01 Invention patent application withdrawn after publication