CN112637153B - Method and system for storing encryption and deduplication - Google Patents

Method and system for storing encryption and deduplication Download PDF

Info

Publication number
CN112637153B
CN112637153B CN202011462625.1A CN202011462625A CN112637153B CN 112637153 B CN112637153 B CN 112637153B CN 202011462625 A CN202011462625 A CN 202011462625A CN 112637153 B CN112637153 B CN 112637153B
Authority
CN
China
Prior art keywords
data
plaintext
data block
deduplication
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011462625.1A
Other languages
Chinese (zh)
Other versions
CN112637153A (en
Inventor
李毅
张有成
顾正
钱金凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace One System Jiangsu Information Technology Co ltd
Original Assignee
Aerospace One System Jiangsu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerospace One System Jiangsu Information Technology Co ltd filed Critical Aerospace One System Jiangsu Information Technology Co ltd
Priority to CN202011462625.1A priority Critical patent/CN112637153B/en
Publication of CN112637153A publication Critical patent/CN112637153A/en
Application granted granted Critical
Publication of CN112637153B publication Critical patent/CN112637153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Abstract

The invention discloses a method and a system for storing encryption and de-duplication, wherein the method comprises the steps of utilizing a block algorithm to conduct variable length block on a source data plaintext to obtain a plurality of data block plaintext; calculating the hash characteristic value of the plaintext of each data block; comparing each hash characteristic value with characteristic data index inquiry on the deduplication storage; if the hash characteristic value does not exist in the deduplication storage, encrypting the data block plaintext corresponding to the hash characteristic value, transmitting the data block plaintext to the deduplication storage, and completing storage encryption deduplication. The invention generates the unique and safe encryption key according to different characteristics of the source data, thereby ensuring the safety of the data, ensuring the accessibility of the data and being capable of de-duplicating the encrypted data.

Description

Method and system for storing encryption and deduplication
Technical Field
The invention belongs to the technical field of encryption, and particularly relates to a method and a system for storing encryption and deduplication.
Background
The data encryption generally adopts a symmetric encryption algorithm, and plaintext original data and an encryption key are subjected to encryption processing together to generate a complex encrypted ciphertext for transmission. If different keys are used to encrypt the same original data, the final ciphertext will be different even with the same encryption algorithm.
Data deduplication, also called data deduplication, is to store the same data in one copy only. The data de-duplication technology generally adopts a block algorithm (a fixed-length or variable-length equal-block algorithm) to divide data into different small blocks of data, calculates characteristic values of the data after the block by a hash algorithm, compares the characteristic values with the characteristic values of stored data, and if the characteristic values are the same, the characteristic values are repeated data, and the repeated storage is not performed.
Since the same data is encrypted by different keys, the ciphertext is different, and the characteristic value calculated by the hash algorithm is also different, the duplicate data cannot be removed based on the comparison result.
Disclosure of Invention
Aiming at the problems, the invention provides a method and a system for storing encryption and deduplication, which generate unique and safe encryption keys according to different characteristics of source data, ensure the safety of the data, ensure the accessibility of the data and can deduplicate the encrypted data.
In order to achieve the technical purpose and achieve the technical effect, the invention is realized by the following technical scheme:
in a first aspect, the present invention provides a method for storing encryption deduplication, comprising:
the method comprises the steps of performing variable length block division on a source data plaintext by using a block division algorithm to obtain a plurality of data block plaintext;
calculating the hash characteristic value of the plaintext of each data block;
comparing each hash characteristic value with characteristic data index inquiry on the deduplication storage;
if the hash characteristic value does not exist in the deduplication storage, encrypting the data block plaintext corresponding to the hash characteristic value, transmitting the data block plaintext to the deduplication storage, and completing storage encryption deduplication.
Optionally, if a hash feature value does not exist on the deduplication storage, encrypting the plaintext of the data block corresponding to the hash feature value, and transmitting the plaintext to the deduplication storage, and specifically comprising the following steps:
based on the data set S, the user A generates an asymmetric key pair Kp and Ki by utilizing an asymmetric encryption algorithm, and stores the asymmetric key pair Kp and Ki in a user key index stored in a duplicate-deletion mode, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext to the confusion value Sa to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted using the private key Ki for a, and is stored as metadata for the data set S in the data set metadata index stored in the deduplication.
Optionally, the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication further includes, after encrypting the data encryption key Kd using the private key Ki:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication storage according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by utilizing the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by utilizing the Kd to acquire the plaintext of the original data block.
Optionally, the step of comparing each feature value with the feature data index query on the deduplication store further includes:
if a certain characteristic value exists in the deduplication storage, increasing the plaintext reference count of the corresponding data block by 1 on the characteristic data index;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
Optionally, the calculating method of the hash characteristic value specifically includes: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
In a second aspect, the invention provides a system for storing encryption and deduplication, which comprises a production server, a network switch and deduplication storage which are connected in sequence;
the production server performs variable length blocking on the source data plaintext by using a blocking algorithm to obtain a plurality of data block plaintext;
the production server calculates a hash characteristic value of a plaintext of each data block;
the production server compares each hash characteristic value with the characteristic data index query on the deduplication storage;
if the hash characteristic value does not exist in the deduplication storage, the production server encrypts the data block plaintext corresponding to the hash characteristic value, and transmits the data block plaintext to the deduplication storage through the network switch to finish storage encryption deduplication.
Optionally, if a hash feature value does not exist on the deduplication storage, encrypting the plaintext of the data block corresponding to the hash feature value, and transmitting the plaintext to the deduplication storage, and specifically comprising the following steps:
based on the data set S, the user A generates an asymmetric key pair Kp and Ki by utilizing an asymmetric encryption algorithm, and stores the asymmetric key pair Kp and Ki in a user key index stored in a duplicate-deletion mode, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext to the confusion value Sa to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted using the private key Ki for a, and is stored as metadata for the data set S in the data set metadata index stored in the deduplication.
Optionally, the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication further includes, after encrypting the data encryption key Kd using the private key Ki:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication storage according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by utilizing the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by utilizing the Kd to acquire the plaintext of the original data block.
Optionally, the step of comparing each feature value with the feature data index query on the deduplication store further includes:
if a certain characteristic value exists in the deduplication storage, increasing the plaintext reference count of the corresponding data block by 1 on the characteristic data index;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
Optionally, the calculating method of the hash characteristic value specifically includes: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
Compared with the prior art, the invention has the beneficial effects that:
for the safety of encrypted data, different encryption keys are adopted for different users without data sets, and ciphertext of the same source data encrypted by different keys is different, so that the traditional deduplication algorithm cannot process the same source data of the type. The invention generates the unique and safe encryption key according to different characteristics of the source data, thereby ensuring the safety of the data, ensuring the accessibility of the data and being capable of de-duplicating the encrypted data.
Drawings
In order that the invention may be more readily understood, a more particular description of the invention will be rendered by reference to specific embodiments that are illustrated in the appended drawings, in which:
FIG. 1 is a schematic diagram of a method for storing encryption deduplication according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a method for storing encryption deduplication according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a system for storing encryption and deduplication according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the detailed description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the invention.
The principle of application of the invention is described in detail below with reference to the accompanying drawings.
Example 1
The embodiment of the invention provides a method for storing encryption and de-duplication, which is shown in fig. 1 and comprises the following steps:
(1) The method comprises the steps of performing variable length block division on a source data plaintext by using a block division algorithm to obtain a plurality of data block plaintext;
(2) Calculating a hash characteristic value of each data block plaintext, wherein the data block plaintext with the same heat dissipation characteristic value and the same data content can be considered as the data block plaintext with the same data content;
(3) Comparing each hash characteristic value with characteristic data index inquiry on the deduplication storage;
(4) If the hash characteristic value does not exist in the deduplication storage, encrypting the data block plaintext corresponding to the hash characteristic value, transmitting the data block plaintext to the deduplication storage, and completing storage encryption deduplication.
In a specific implementation manner of the embodiment of the present invention, as shown in fig. 2, if a hash feature value does not exist on the deduplication storage, encrypting a plaintext of a data block corresponding to the hash feature value, and transmitting the encrypted plaintext to the deduplication storage, and specifically includes the following steps:
the user A generates asymmetric key pairs Kp and Ki by utilizing an asymmetric encryption algorithm based on a data set S (namely the data set needing encryption and erasure processing), and stores the asymmetric key pairs Kp and Ki in an erasure stored user key index, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext Dt to the confusion value Sa (the confusion value can be randomly generated) to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext Dt by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted by using the private key Ki for A, and is stored in the data set metadata index stored in a repeated deleting way as metadata of the data set S user A, so that the security of the data encryption key Kd can be protected, the Kd is not acquired by other users, and the user' S own key Ki is used by different user encryption Kds.
In a specific implementation manner of the embodiment of the present invention, the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication further includes:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication storage according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by utilizing the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by utilizing the Kd to acquire the plaintext of the original data block.
In a specific implementation manner of the embodiment of the present invention, after the step of querying and comparing each feature value with the feature data index on the deduplication store, the method further includes:
if a certain characteristic value exists in the deduplication storage, increasing the corresponding data block plaintext reference count by 1 on the characteristic data index, and marking different places of the data block plaintext for use;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
In a specific implementation manner of the embodiment of the present invention, the method for calculating the hash feature value specifically includes: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
To sum up:
for the safety of encrypted data, different encryption keys are adopted for different users without data sets, and ciphertext of the same source data encrypted by different keys is different, so that the traditional deduplication algorithm cannot process the same source data of the type. The invention generates the unique and safe encryption key according to different characteristics of the source data, thereby ensuring the safety of the data, ensuring the accessibility of the data and being capable of de-duplicating the encrypted data.
Example 2
The embodiment of the invention provides a system for encrypting and deduplicating storage, which is shown in figure 3 and comprises a production server, a network switch and deduplication storage which are connected in sequence;
the production server performs variable length blocking on the source data plaintext by using a blocking algorithm to obtain a plurality of data block plaintext;
the production server calculates a hash characteristic value of a plaintext of each data block;
the production server compares each hash characteristic value with the characteristic data index query on the deduplication storage;
if the hash characteristic value does not exist in the deduplication storage, the production server encrypts the data block plaintext corresponding to the hash characteristic value, and transmits the data block plaintext to the deduplication storage through the network switch to finish storage encryption deduplication.
In a specific implementation manner of the embodiment of the present invention, as shown in fig. 2, if a hash feature value does not exist on the deduplication storage, encrypting a plaintext of a data block corresponding to the hash feature value, and transmitting the encrypted plaintext to the deduplication storage, and specifically includes the following steps:
based on the data set S, the user A generates an asymmetric key pair Kp and Ki by utilizing an asymmetric encryption algorithm, and stores the asymmetric key pair Kp and Ki in a user key index stored in a duplicate-deletion mode, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext to the confusion value Sa to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted using the private key Ki for a, and is stored as metadata for the data set S in the data set metadata index stored in the deduplication.
In a specific implementation manner of the embodiment of the present invention, the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication further includes:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication storage according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by utilizing the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by utilizing the Kd to acquire the plaintext of the original data block.
In a specific implementation manner of the embodiment of the present invention, after the step of querying and comparing each feature value with the feature data index on the deduplication store, the method further includes:
if a certain characteristic value exists in the deduplication storage, increasing the plaintext reference count of the corresponding data block by 1 on the characteristic data index;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
In a specific implementation manner of the embodiment of the present invention, the method for calculating the hash feature value specifically includes: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
The foregoing has shown and described the basic principles and main features of the present invention and the advantages of the present invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made without departing from the spirit and scope of the invention, which is defined in the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (4)

1. A method of storing encrypted deduplication, comprising:
the method comprises the steps of performing variable length block division on a source data plaintext by using a block division algorithm to obtain a plurality of data block plaintext;
calculating the hash characteristic value of the plaintext of each data block;
comparing each hash characteristic value with characteristic data index inquiry on the deduplication storage;
if the hash characteristic value does not exist in the deduplication storage, encrypting the plaintext of the data block corresponding to the hash characteristic value, transmitting the encrypted plaintext to the deduplication storage, and completing storage encryption deduplication;
if some hash characteristic value does not exist on the deduplication storage, encrypting the data block plaintext corresponding to the hash characteristic value and transmitting the data block plaintext to the deduplication storage, and specifically comprising the following steps:
based on the data set S, the user A generates an asymmetric key pair Kp and Ki by utilizing an asymmetric encryption algorithm, and stores the asymmetric key pair Kp and Ki in a user key index stored in a duplicate-deletion mode, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext to the confusion value Sa to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted by using the private key Ki of the user A, and is stored in the data set metadata index stored in a repeated deleting mode as metadata of the data set S;
the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication storage by using the private key Ki further includes:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication store according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by using the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by using the Kd to acquire the plaintext of the original data block;
the step of querying and comparing the characteristic values with the characteristic data indexes on the deduplication storage respectively further comprises the following steps:
if a certain characteristic value exists in the deduplication storage, increasing the plaintext reference count of the corresponding data block by 1 on the characteristic data index;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
2. The method for storing encryption and decryption according to claim 1, wherein the calculating method of the hash feature value specifically comprises: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
3. A system for storing encryption deduplication, comprising: the method comprises a production server, a network switch and a deduplication store which are connected in sequence;
the production server performs variable length blocking on the source data plaintext by using a blocking algorithm to obtain a plurality of data block plaintext;
the production server calculates a hash characteristic value of a plaintext of each data block;
the production server compares each hash characteristic value with the characteristic data index query on the deduplication storage;
if the hash characteristic value does not exist on the deduplication storage, the production server encrypts the plaintext of the data block corresponding to the hash characteristic value, and transmits the plaintext to the deduplication storage through the network switch to finish storage encryption deduplication;
if some hash characteristic value does not exist on the deduplication storage, encrypting the data block plaintext corresponding to the hash characteristic value and transmitting the data block plaintext to the deduplication storage, and specifically comprising the following steps:
based on the data set S, the user A generates an asymmetric key pair Kp and Ki by utilizing an asymmetric encryption algorithm, and stores the asymmetric key pair Kp and Ki in a user key index stored in a duplicate-deletion mode, wherein Kp is a public key and Ki is a private key;
acquiring a data block plaintext corresponding to the hash characteristic value;
adding the hash characteristic value of the data block plaintext to the confusion value Sa to generate a data encryption key Kd;
generating a data block ciphertext De from the data block plaintext by using a data encryption key Kd through an encryption algorithm, and storing the data block ciphertext De in a deduplication data set stored in a deduplication mode;
the data encryption key Kd is encrypted by using the private key Ki of the user A, and is stored in the data set metadata index stored in a repeated deleting mode as metadata of the data set S;
the step of storing the data encryption key Kd as metadata of the data set S in the data set metadata index stored in the deduplication storage by using the private key Ki further includes:
when a user needs to acquire the plaintext of an original data block, acquiring a corresponding public key Kp from a user key index by utilizing a deduplication store according to user authentication information, acquiring metadata of a data set S from a data set metadata index, decrypting by using the acquired public key Kp of the user to acquire an encryption key Kd of the data set S, and decrypting a data block ciphertext De by using the Kd to acquire the plaintext of the original data block;
the step of querying and comparing the characteristic values with the characteristic data indexes on the deduplication storage respectively further comprises the following steps:
if a certain characteristic value exists in the deduplication storage, increasing the plaintext reference count of the corresponding data block by 1 on the characteristic data index;
when deleting data, the corresponding data block plaintext reference count is decremented, and when the data block plaintext reference count is 0, the corresponding data block plaintext is indicated as being disposable.
4. A system for storing encryption de-duplication according to claim 3, wherein the method for calculating the hash feature value specifically comprises: and carrying out hash calculation on the plaintext of the data block by using a hash algorithm to generate a hash characteristic value.
CN202011462625.1A 2020-12-14 2020-12-14 Method and system for storing encryption and deduplication Active CN112637153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011462625.1A CN112637153B (en) 2020-12-14 2020-12-14 Method and system for storing encryption and deduplication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011462625.1A CN112637153B (en) 2020-12-14 2020-12-14 Method and system for storing encryption and deduplication

Publications (2)

Publication Number Publication Date
CN112637153A CN112637153A (en) 2021-04-09
CN112637153B true CN112637153B (en) 2024-02-20

Family

ID=75312325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011462625.1A Active CN112637153B (en) 2020-12-14 2020-12-14 Method and system for storing encryption and deduplication

Country Status (1)

Country Link
CN (1) CN112637153B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system
CN103699854A (en) * 2013-12-31 2014-04-02 华为技术有限公司 Data storing method, data access method and storing equipment
CN104932841A (en) * 2015-06-17 2015-09-23 南京邮电大学 Saving type duplicated data deleting method in cloud storage system
CN106612320A (en) * 2016-06-14 2017-05-03 四川用联信息技术有限公司 Encrypted data dereplication method for cloud storage
AU2019101343A4 (en) * 2019-11-05 2019-12-12 Anson, Mark Rodney Mr A computer system implemented method for generating a symmetric encryption key for encrypting and decrypting secure data
CN110569245A (en) * 2019-09-10 2019-12-13 天津理工大学 Fingerprint index prefetching method based on reinforcement learning in data de-duplication system
CN111143343A (en) * 2019-12-27 2020-05-12 南京壹进制信息科技有限公司 Data efficient deleting method and system based on source-end deduplication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160050713A (en) * 2014-10-30 2016-05-11 삼성전자주식회사 Method and Electronic Device for storing audio data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system
CN103699854A (en) * 2013-12-31 2014-04-02 华为技术有限公司 Data storing method, data access method and storing equipment
CN104932841A (en) * 2015-06-17 2015-09-23 南京邮电大学 Saving type duplicated data deleting method in cloud storage system
CN106612320A (en) * 2016-06-14 2017-05-03 四川用联信息技术有限公司 Encrypted data dereplication method for cloud storage
CN110569245A (en) * 2019-09-10 2019-12-13 天津理工大学 Fingerprint index prefetching method based on reinforcement learning in data de-duplication system
AU2019101343A4 (en) * 2019-11-05 2019-12-12 Anson, Mark Rodney Mr A computer system implemented method for generating a symmetric encryption key for encrypting and decrypting secure data
CN111143343A (en) * 2019-12-27 2020-05-12 南京壹进制信息科技有限公司 Data efficient deleting method and system based on source-end deduplication

Also Published As

Publication number Publication date
CN112637153A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
US11023477B2 (en) Method and system for fuzzy keyword search over encrypted data
US9977918B2 (en) Method and system for verifiable searchable symmetric encryption
Raykova et al. Secure anonymous database search
Li et al. Secure deduplication storage systems supporting keyword search
CN108400970B (en) Similar data message locking, encrypting and de-duplicating method in cloud environment and cloud storage system
Yao et al. Privacy-preserving search over encrypted personal health record in multi-source cloud
CN109361644B (en) Fuzzy attribute based encryption method supporting rapid search and decryption
CN112800445B (en) Boolean query method for forward and backward security and verifiability of ciphertext data
CN108768639B (en) Public key order-preserving encryption method
WO2024077948A1 (en) Private query method, apparatus and system, and storage medium
WO2019090841A1 (en) Encrypted file retrieval method and system, terminal device and storage medium
CN107094075B (en) Data block dynamic operation method based on convergence encryption
CN110263570B (en) Gene data desensitization method for realizing efficient similarity query and access control
Zhang et al. Dynamic and Efficient Private Keyword Search over Inverted Index--Based Encrypted Data
Singh et al. Database security using encryption
CN104077356A (en) Homomorphic encryption based cloud storage platform retrieval method
CN112199698A (en) Robust searchable symmetric encryption method and system
CN115580402A (en) Data hiding query method for secure multi-party computation
Almrezeq ‏ An Enhanced Approach to Improve the Security and Performance for Deduplication
Kim et al. Survey on Data Deduplication in Cloud Storage Environments.
CN108011713B (en) Ciphertext retrieval method based on homomorphic encryption in cloud storage
Park et al. PKIS: practical keyword index search on cloud datacenter
CN110851848B (en) Privacy protection method for symmetric searchable encryption
CN112637153B (en) Method and system for storing encryption and deduplication
Liu et al. Multi-user image retrieval with suppression of search pattern leakage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: China

Address after: Building 1, 6th Floor, Changfeng Building, No.14 Xinghuo Road, Research and Innovation Park, Jiangbei New District, Nanjing City, Jiangsu Province, 210031

Applicant after: Aerospace One System (Jiangsu) Information Technology Co.,Ltd.

Address before: 210014 Building C, Building 3, No. 5 Baixia High-tech Park, No. 5 Yongzhi Road, Qinhuai District, Nanjing City, Jiangsu Province

Applicant before: NANJING UNARY INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant