Font Size: a A A

Research And Implementation Of Ciphertext Deduplication In Cloud Storage

Posted on:2021-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:J GongFull Text:PDF
GTID:2428330614965954Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The increasing development of informatization has brought constant convenience to people and also brought about explosive growth of digital information.Traditional storage methods have been unable to meet the demand for massive data storage.Because of its massive storage,low cost,and on-demand billing,cloud storage effectively solves the problem of insufficient local storage space for users,so more and more users choose to back up data to the cloud.However,because the same data is stored multiple times by different users or even the same user,a large amount of redundant data in the cloud is formed,which brings a huge waste of storage space.It is relatively easy to deduplicate data in the form of cleartext,but due to the semi-honest nature of the cloud server,users usually encrypt the data in order to protect the privacy of their own data,and finally upload the data cipher text,because different users choose different Encryption keys result in very different data ciphertexts even for the same data plaintext.Therefore,the research on data ciphertext deduplication in cloud storage is urgent.How to delete duplicate data in the cloud has become a hot research issue in the field of cryptography in recent years,and how to design a secure and efficient ciphertext deduplication scheme has become one of the important research directions in the cloud storage field.This paper focuses on ciphertext deduplication in cloud storage.The specific work is as follows:(1)This paper studies the deduplication matching process in deduplication.Aiming at the problem that different ciphertexts generated by the same plaintext cannot be directly compared,searchable encryption and equality testing technology are combined with deduplication technology for the first time.The general structure of data deduplication based on searchable encryption and equality test,and two scheme examples are given.Analysis shows that the proposed schemes can effectively resist violent dictionary attacks.(2)This paper studies the client ciphertext deduplication scheme.By analyzing the latest client deduplication scheme,it is pointed out that the scheme has the problems of low duplicate verification label generation efficiency,authentication information in the ownership authentication process that cannot withstand replay attacks,and thekey management efficiency is lowly.This paper designs an improved client-side ciphertext deduplication scheme,uses the HAMC function to generate repeated verification tags to improve the generation efficiency,adds random factors to the authentication information to resist replay attacks,and finally uses the ideas of the three-party key agreement scheme to design a flexible The key management process improves the efficiency of key management.Experimental analysis shows that while the new scheme improves the security in ownership certification,the overall efficiency of the scheme has also been improved.(3)The client ciphertext deduplication scheme proposed in this paper is simulated.Hire Baidu Cloud Server to build a simulated cloud storage server,and use the JPBC cryptography package to develop the simulation system.The simulation system implements the main functions of the proposed scheme,including data upload,deduplication authentication,and data download.Finally,a complete performance test of the proposed scheme is performed based on the system.The experimental results show that the proposed scheme is in an actual cloud environment has better efficiency.
Keywords/Search Tags:Cloud storage, ciphertext deduplication, ownership authentication, key management, deduplication matching process
PDF Full Text Request
Related items