Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for supporting dense data deduplication and integrity verification

A technology of integrity verification and data, which is applied in the field of communication, can solve the problems of not having absolute control over personal data in the cloud, no anti-key scheme, and inability to update keys, etc.

Inactive Publication Date: 2019-01-29
XIDIAN UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Users do not have absolute control over personal data in the cloud, and data security cannot be guaranteed
[0005] (2) Mechanically combining data deduplication with integrity verification will inevitably lead to confusion of the identity of the uploader and the resulting data security issues
[0006] (3) The existing technology cannot achieve key update, so it cannot resist key leakage, so that the user's key may be stolen during the integrity audit process
[0008] Although the existing data integrity verification schemes have achieved data deduplication or anti-key leakage, there is still no scheme that can simultaneously achieve the three functions of anti-key leakage, data deduplication and integrity verification.
Furthermore, if the encryption key is simply updated in a verification audit scheme that supports deduplication, it may result in failure to successfully deduplicate due to different user private keys in different time periods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for supporting dense data deduplication and integrity verification
  • Method and system for supporting dense data deduplication and integrity verification
  • Method and system for supporting dense data deduplication and integrity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] Aiming at the problem that the data security in the prior art cannot be guaranteed; the identity of the uploader is confused; the user’s key may be stolen during the integrity audit process; Periodic user’s signature private key is the product of two parts, one part is the update message generated by the auditor based on its own private key, and the other part is calculated from the user’s private key and the current time period, the signature private key of any time period needs Generated jointly by users and auditors.

[0047] The application principle of the present invention will be described in detail below in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to a communication technology, and discloses a method and system for supporting dense data deduplication and integrity verification. In each time period, the user's signature private key is a product of two parts, the first part is an update message generated by an auditor according to his private key, and the second part is calculated by the user's private key and the current time period; the signature private key of any time period needs to be generated jointly by the user and the auditor; and in the data deduplication, the client deduplication of the file is implemented by using a Bloom filter. The invention utilizes the Bloom filter to implement the client deduplication of the file, and does not need to perform secondary uploading when the cloud server has alreadystored the same file, and prevents the malicious user from illegally obtaining the file through the fake certificate value while the malicious user does not possess the file. During the challenge andresponse process, the cloud server picks up a part of the message block of the file for verification, and the auditor cannot obtain the file through the response value sent by the cloud server.

Description

technical field [0001] The invention belongs to the communication technology, and in particular relates to a method and system supporting deduplication and integrity verification of encrypted state data. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the rapid development of cloud computing, various applications built on the cloud platform are gradually integrated into people's work and life. Through cloud computing technology, users and enterprises do not need to spend too much on the purchase and maintenance of hardware in the early stage. In addition, powerful computing and storage capabilities also make users more willing to rely on the cloud to handle various complex tasks. Users' computing resources and management capabilities are very limited, and they cannot undertake large-scale computing tasks; by storing data in cloud servers, users can be freed from heavy computing tasks. As a development t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0891H04L9/3236H04L9/3247H04L9/3263H04L63/123H04L67/06
Inventor 刘振华李晨刘要辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products