Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe and effective client deduplication protocol based on proofs of ownership

A client and protocol technology, applied in the field of communication, can solve problems such as security risks

Active Publication Date: 2018-09-28
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Judging whether the data is repeated using the above method has brought great security risks to data deduplication. The attacker only needs to steal the hash value of the file to prove to the cloud server that he owns the file. At the same time, the cloud server adds the attacker to the The file owner list, and then the attacker requests the specific content of the file from the cloud server to steal the entire file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with examples.

[0028] This embodiment provides a secure and effective client deduplication protocol based on proof of possession, including:

[0029] Initialization: This protocol includes three subjects, namely the client, the key server and the cloud server; the system initializes the security factor, and the key server selects its own private key and public key for communication with the client; secondly, the cloud server selects its own private key and public key;

[0030] The client interacts with the key server to obtain the encryption key of the file: in order to obtain the encryption key of the uploaded file, the client needs to communicate with the key server; the client first uses the hash function to process the message to be uploaded, and then blindly The key server signs the blinded message with its own private key, and then returns the signature to the client. The client verifies the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe and effective client deduplication protocol based on proofs of ownership and belongs to the technical field of communications. The client deduplication protocol comprises that a system initializes a safety factor and parameter, a client and a key server communicate and obtain a key of an encrypted file by blind signature, and a cloud server and the client communicateto implement a challenge-response mechanism; the key server introduces a Rate-limiting policy to limit the number of times of the client initiating a request to the key server within a certain periodof time. The safe and effective client deduplication protocol of the present scheme resists an exhaustive attack and a spoofing attack, and ensures the security and efficiency of the proofs-of-ownership protocol. The safe and effective client deduplication protocol in the invention can improve the efficiency of authentication, save storage space, and ensure a constant communication cost.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a safe and effective client deduplication protocol based on proof of ownership. Background technique [0002] Proofs of Ownership (Proofs of Ownership) is a proof technology that the client proves to the cloud server that it owns the entire data file instead of partial data or a simple file hash value. In the proof of possession technology, the communication between the client and the cloud server adopts a challenge-response mechanism. The cloud server initiates an inquiry, the client responds, and finally the cloud server verifies whether it is established. [0003] In the era of data explosion, more and more users choose to store data in cloud servers. In order to reduce storage costs, cloud servers only store one copy of the same data. Client deduplication means that the client judges whether the data is duplicated with the cloud server data without uploadin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06H04L9/08
CPCH04L9/0643H04L9/0869H04L63/0428H04L67/06
Inventor 许春香李闪闪张源薛婧婷李闯
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products