CN109491591A - A kind of information diffusion method suitable for cloudy storage system - Google Patents
A kind of information diffusion method suitable for cloudy storage system Download PDFInfo
- Publication number
- CN109491591A CN109491591A CN201811080554.1A CN201811080554A CN109491591A CN 109491591 A CN109491591 A CN 109491591A CN 201811080554 A CN201811080554 A CN 201811080554A CN 109491591 A CN109491591 A CN 109491591A
- Authority
- CN
- China
- Prior art keywords
- share
- storage system
- data
- algorithm
- diffusion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
- G06F3/0607—Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
- G06F3/0641—De-duplication techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to data deduplication technical fields, and in particular to a kind of information diffusion method suitable for cloudy storage system, storage method are that file F is divided into n data block using diffusion of information algorithm, obtain { F1, F2 ..., Fn };Convergence key { K1, K2 ..., Kn } is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm;It is encrypted using convergence key pair { F1, F2 ..., Fn }, obtains n parts of share;Share is uploaded to n cloud storage service device respectively;Cloud storage service device checks for duplicate share, carries out deduplication operation if repeating;Otherwise, which is stored;One aspect of the present invention, which remains SSMS algorithm, has the characteristics that reliability, there is fault-tolerance, on the other hand convergent encryption is taken to replace the random information in SSMS algorithm, it ensure that identical data always generate identical diffusion result, therefore it can realize data deduplication in cloud storage system, there is very strong creativeness.
Description
Technical field
The present invention relates to data deduplication technical fields, and in particular to a kind of diffusion of information side suitable for cloudy storage system
Method.
Background technique
With the continuous development of cloud computing and big data technology, more and more users using cloud storage service to data into
Row storage and management, therefore unavoidably cause mass of redundancy data.In order to save the memory space and net of cloud storage system
Network bandwidth consumption, researchers propose data deduplication (deduplication) technology, i.e. data de-duplication technology.Cloud clothes
The text of the redundancy in cloud storage system is eliminated in business provider (CSP, Cloud Service Provider) by taking the technology
The redundant data of part or file internal only retains a data copy.
For the angle of storage system framework, cloud data deduplication can be based on following two system: (1) single cloud storage system
System, is made of a CSP and provides cloud storage service;(2) cloudy (multicloud) storage system, also referred to as cloud medium cloud
(cloud-of-clouds) storage system is made of multiple CSP, and user data is dispersedly stored in the cloudy system.
The drawbacks of single cloud storage system: 1, availability of data problem, availability of data refer to that CSP can be provided a user and continue
Continuous service, however once repeatedly occurred the case where interrupting service in actual cloud storage system, that is, single point failure occurs;
2, Information Security problem, Information Security refer to that user is stored in the data in CSP and is not checked or revealed, deposit in actual cloud
In storage system, after privacy of user data are revealed by CSP or meet with hacker attack, serious safety problem will lead to;3, the ridge CSP
Disconnected problem, after user stores mass data into the same CSP, user's migrating data to other CSP must pay high
Expense or user meet with CSP the case where improving price, monopolization problem can be all caused to the user.
After diffusion of information algorithm (IDA, Information Dispersal Algorithm) is proposed by Rabin, occur
Many modified hydrothermal process, applicable scene different from, one of which can be used for carrying out big file the algorithm of privacy sharing
SSMS(Secret Sharing Made Short).SSMS algorithm is defined as follows: given portion user data i.e. secret, benefit
N share is obtained after being diffused processing to secret with (n, m) broadcast algorithm (wherein n >=m >=1), then (1) is by any m
Share can recover complete secret;(2) any secret data cannot be obtained by any m-1 share.
Convergent encryption (CE, Convergent Encryption) algorithm is a kind of determinacy encryption algorithm, convergence key by
Data content generates, it is ensured that obtains identical key by identical data.Convergent encryption algorithm is usually former by following basic code
Language is constituted:
KeyGen (F)=> K: convergence encryption key generating algorithms.Input data plaintext F, output convergence key K.Wherein, key K
It is usually generated by hash function H, i.e. K=H (F).
Encrypt (K, F)=> C: Encryption Algorithm.Encrypted ciphertext C is passed through in input convergence key K and plaintext F, output.
Decrypt (K, C)=> F: decipherment algorithm.Input convergence key K and ciphertext C, exports the plaintext F after decryption.
TagGen (F)=> TF: label generates algorithm.Input data plaintext F exports corresponding label TF.
The characteristics of for cloudy storage system, the invention patent propose a kind of combination convergence on the basis of SSMS algorithm
The information diffusion method of Encryption Algorithm is applicable to support the cloudy storage system of data deduplication.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses a kind of information diffusion methods suitable for cloudy storage system, originally
On the one hand invention remains SSMS algorithm has the characteristics that reliability, that is, has fault-tolerance, on the other hand take convergent encryption generation
For the random information in SSMS algorithm, it ensure that identical data always generate identical diffusion as a result, therefore can realize that cloud is deposited
Data deduplication in storage system;
The present invention is achieved by the following technical programs:
A kind of information diffusion method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1,
F2,…,Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;After Fi is i-th of diffusion
Data block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained
To K1, K2 ..., Kn };Ki is the convergence key of Fi;
S3: encryption Encrypt (Ki, Fi) is carried out to { F1, F2 ..., Fn } respectively using convergence key { K1, K2 ..., Kn }
=> Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is
I-th part of share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data and go
It operates again;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
Preferably, in the S1, n is data number of blocks of the file F after diffusion;M is minimum number required for restoring F
According to number of blocks;Wherein n >=m >=1.
Preferably, the S4 are as follows: Si is uploaded to corresponding CSPi.
A kind of information recovering method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: using corresponding convergence key { K1, K2 ..., Km } to m parts of share be decrypted Decrypt (Ki, Si)=>
Fi obtains m data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
Preferably, the S3 is defined according to SSMS algorithm, recovers file F by any m data block.
The invention has the benefit that
The information diffusion method suitable for cloudy storage system that the present invention is mentioned has the advantage that compared to existing technology
It is as follows:
(1) storage efficiency is high.Due to taking convergent encryption to replace the random information in SSMS algorithm, identical number ensure that
According to always generating identical diffusion as a result, being therefore suitable for supporting the cloudy storage system of data deduplication, for same part data
(obtaining n parts of share after diffusion) only needs to store once in cloudy storage system, therefore storage efficiency is high;
(2) fault-tolerance enhances.Data in cloudy storage system have reliability, it is only necessary to which any m CSP is operated normally
Can restoring user data, effectively prevent single point failure, and if single cloud storage system failure will lead to service disruption;
(3) Information Security enhances.Attacker must at least obtain m share (controlling m CSP) and could be used
User data, and need to restrain key and can just be decrypted, otherwise attacker can not obtain any effective information.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is system model figure of the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1
A kind of information diffusion method suitable for cloudy storage system as shown in Figure 1, comprising the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1,
F2,…,Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;After Fi is i-th of diffusion
Data block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained
To K1, K2 ..., Kn };Ki is the convergence key of Fi;
S3: encryption Encrypt (Ki, Fi) is carried out to { F1, F2 ..., Fn } respectively using convergence key { K1, K2 ..., Kn }
=> Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is
I-th part of share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data and go
It operates again;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
In S1, n is data number of blocks of the file F after diffusion;M is minimum data number of blocks required for restoring F;Its
Middle n >=m >=1.
S4 are as follows: Si is uploaded to corresponding CSPi.
Embodiment 2
A kind of information recovering method suitable for cloudy storage system, comprising the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: using corresponding convergence key { K1, K2 ..., Km } to m parts of share be decrypted Decrypt (Ki, Si)=>
Fi obtains m data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
Preferably, the S3 is defined according to SSMS algorithm, recovers file F by any m data block.
One aspect of the present invention, which remains SSMS algorithm, has the characteristics that reliability, that is, has fault-tolerance, therefore can be used for more
Cloud storage system, in the cloudy framework for possessing n CSP, as long as m CSP is operated normally it is ensured that user data is available, i.e.,
It is at best able to n-m CSP of tolerance while failing;On the other hand it takes convergent encryption to replace the random information in SSMS algorithm, protects
It has demonstrate,proved identical data and has always generated identical diffusion as a result, therefore can realize data deduplication in cloud storage system.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (5)
1. a kind of information diffusion method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1, F2 ...,
Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;Fi is the data after i-th of diffusion
Block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained
{K1,K2,…,Kn};Ki is the convergence key of Fi;
S3: using convergence key { K1, K2 ..., Kn } respectively to { F1, F2 ..., Fn } carry out encryption Encrypt (Ki, Fi)=>
Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is i-th
Part share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data deduplication behaviour
Make;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
2. the information diffusion method according to claim 1 suitable for cloudy storage system, it is characterised in that: in the S1, n
For data number of blocks of the file F after diffusion;M is minimum data number of blocks required for restoring F;Wherein n >=m >=1.
3. the information diffusion method according to claim 1 suitable for cloudy storage system, it is characterised in that: the S4 are as follows:
Si is uploaded to corresponding CSPi.
4. a kind of information recovering method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: being decrypted Decrypt (Ki, Si)=> Fi to m parts of share using corresponding convergence key { K1, K2 ..., Km },
M data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
5. according to shown in claim 4 be suitable for cloudy storage system information recovering method, it is characterised in that: the S3 according to
The definition of SSMS algorithm, recovers file F by any m data block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811080554.1A CN109491591A (en) | 2018-09-17 | 2018-09-17 | A kind of information diffusion method suitable for cloudy storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811080554.1A CN109491591A (en) | 2018-09-17 | 2018-09-17 | A kind of information diffusion method suitable for cloudy storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109491591A true CN109491591A (en) | 2019-03-19 |
Family
ID=65690665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811080554.1A Pending CN109491591A (en) | 2018-09-17 | 2018-09-17 | A kind of information diffusion method suitable for cloudy storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109491591A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110381066A (en) * | 2019-07-23 | 2019-10-25 | 广东工业大学 | Enhance the resource data transmission method of privacy in a kind of block chain |
CN112565434A (en) * | 2020-12-09 | 2021-03-26 | 广东工业大学 | Cloud storage safety duplicate removal method and device based on Mercker hash tree |
CN114143098A (en) * | 2021-12-03 | 2022-03-04 | 建信金融科技有限责任公司 | Data storage method and data storage device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
CN103139300A (en) * | 2013-02-05 | 2013-06-05 | 杭州电子科技大学 | Virtual machine image management optimization method based on data de-duplication |
CN103327059A (en) * | 2012-03-23 | 2013-09-25 | 神盾股份有限公司 | Cloud storage system, cloud storage management method and electronic device thereof |
CN103931156A (en) * | 2011-05-14 | 2014-07-16 | 比特卡萨公司 | Cloud file system with server-side deduplication of user-agnostic encrypted files |
CN103929467A (en) * | 2013-01-14 | 2014-07-16 | 埃森哲环球服务有限公司 | Secure Online Distributed Data Storage Services |
CN104754055A (en) * | 2015-04-03 | 2015-07-01 | 易云捷讯科技(北京)有限公司 | Safety cloud storage method for use in multi-cloud environment |
CN104902010A (en) * | 2015-04-30 | 2015-09-09 | 浙江工商大学 | Cloud storage method and system for file |
CN104915609A (en) * | 2015-05-28 | 2015-09-16 | 武汉科技大学 | Data hiding method based on Lagrange interpolation method and multiple clouds |
CN106911770A (en) * | 2017-02-20 | 2017-06-30 | 北京古盘创世科技发展有限公司 | A kind of data sharing method and system based on many cloud storages |
CN107977168A (en) * | 2017-12-15 | 2018-05-01 | 安徽长泰信息安全服务有限公司 | A kind of data based on cloud storage disperse storage system |
-
2018
- 2018-09-17 CN CN201811080554.1A patent/CN109491591A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103931156A (en) * | 2011-05-14 | 2014-07-16 | 比特卡萨公司 | Cloud file system with server-side deduplication of user-agnostic encrypted files |
CN103327059A (en) * | 2012-03-23 | 2013-09-25 | 神盾股份有限公司 | Cloud storage system, cloud storage management method and electronic device thereof |
CN103929467A (en) * | 2013-01-14 | 2014-07-16 | 埃森哲环球服务有限公司 | Secure Online Distributed Data Storage Services |
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
CN103139300A (en) * | 2013-02-05 | 2013-06-05 | 杭州电子科技大学 | Virtual machine image management optimization method based on data de-duplication |
CN104754055A (en) * | 2015-04-03 | 2015-07-01 | 易云捷讯科技(北京)有限公司 | Safety cloud storage method for use in multi-cloud environment |
CN104902010A (en) * | 2015-04-30 | 2015-09-09 | 浙江工商大学 | Cloud storage method and system for file |
CN104915609A (en) * | 2015-05-28 | 2015-09-16 | 武汉科技大学 | Data hiding method based on Lagrange interpolation method and multiple clouds |
CN106911770A (en) * | 2017-02-20 | 2017-06-30 | 北京古盘创世科技发展有限公司 | A kind of data sharing method and system based on many cloud storages |
CN107977168A (en) * | 2017-12-15 | 2018-05-01 | 安徽长泰信息安全服务有限公司 | A kind of data based on cloud storage disperse storage system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110381066A (en) * | 2019-07-23 | 2019-10-25 | 广东工业大学 | Enhance the resource data transmission method of privacy in a kind of block chain |
CN110381066B (en) * | 2019-07-23 | 2021-07-06 | 广东工业大学 | Resource data transmission method for enhancing privacy in block chain |
CN112565434A (en) * | 2020-12-09 | 2021-03-26 | 广东工业大学 | Cloud storage safety duplicate removal method and device based on Mercker hash tree |
CN114143098A (en) * | 2021-12-03 | 2022-03-04 | 建信金融科技有限责任公司 | Data storage method and data storage device |
CN114143098B (en) * | 2021-12-03 | 2023-08-15 | 建信金融科技有限责任公司 | Data storage method and data storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110169015B (en) | Achieving consensus among network nodes in a distributed system | |
CN109756582B (en) | Information recording method, device, node and storage medium in block chain network | |
CN110213354B (en) | Cloud storage data confidentiality protection method | |
CN101964080B (en) | Method and system for storing a file as slices on storage elements | |
US10764261B2 (en) | System and method for enabling a scalable public-key infrastructure on a smart grid network | |
CN111526197B (en) | Cloud data secure sharing method | |
CN109450881B (en) | A kind of data transmission system, method and device | |
CN107154945A (en) | A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes | |
CN104331346A (en) | Data protection method | |
CN109491591A (en) | A kind of information diffusion method suitable for cloudy storage system | |
CN104410683A (en) | Data backup method | |
CN109587178A (en) | A kind of intelligent appliance encryption control system and method based on MQTT | |
CN104331345B (en) | A kind of data reconstruction method | |
Xia et al. | Secure and trust-oriented edge storage for Internet of Things | |
CN109241754A (en) | A kind of cloud file data de-duplication method based on block chain | |
CN105120003A (en) | Method for realizing data backup in cloud environment | |
CN109640299B (en) | Aggregation method and system for ensuring M2M communication integrity and fault tolerance | |
CN103326822A (en) | Data-fragment-based method and system for protecting privacy of participatory perception system | |
CN108964911A (en) | A kind of stream media service system based on block chain and quantum flow data block technology | |
Ueno et al. | Performance evaluation of a disaster recovery system and practical network system applications | |
WO2018208787A1 (en) | High-performance access management and data protection for distributed messaging applications | |
CN108494552B (en) | Cloud storage data deduplication method supporting efficient convergence key management | |
CN116032499A (en) | Distributed cloud file storage method and system, user terminal and cloud device thereof | |
CN113360924A (en) | Data processing method, device, electronic equipment and medium | |
Balaji et al. | Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190319 |