无可信第三方的加密重复数据安全删除方法

重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源...

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 5; no. 3; p. 286
Main Authors ZHANG, Shu-Guang, He-Qun, XIAN, Li-Ming, WANG, Hong-Yan, LIU, Rui-Tao, HOU, 张曙光, 咸鹤群, 王利明, 刘红燕, 侯瑞涛
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 22.06.2018
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000239

Cover

Abstract 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源自相同明文数据. 采用同态加密算法设计加密密钥传递算法, 初识上传者能够通过云服务器将加密密钥安全传递至后继上传者. 持有相同数据的用户能够获取相同加密密钥, 使云服务器能够实现加密数据重复删除. 安全性分析与性能评估体现本文方案拥有较高的安全性与执行效率.
AbstractList 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源自相同明文数据. 采用同态加密算法设计加密密钥传递算法, 初识上传者能够通过云服务器将加密密钥安全传递至后继上传者. 持有相同数据的用户能够获取相同加密密钥, 使云服务器能够实现加密数据重复删除. 安全性分析与性能评估体现本文方案拥有较高的安全性与执行效率.
Author 张曙光
Hong-Yan, LIU
He-Qun, XIAN
侯瑞涛
ZHANG, Shu-Guang
Rui-Tao, HOU
刘红燕
咸鹤群
王利明
Li-Ming, WANG
Author_xml – sequence: 1
  givenname: Shu-Guang
  surname: ZHANG
  fullname: ZHANG, Shu-Guang
– sequence: 2
  givenname: XIAN
  surname: He-Qun
  fullname: He-Qun, XIAN
– sequence: 3
  givenname: WANG
  surname: Li-Ming
  fullname: Li-Ming, WANG
– sequence: 4
  givenname: LIU
  surname: Hong-Yan
  fullname: Hong-Yan, LIU
– sequence: 5
  givenname: HOU
  surname: Rui-Tao
  fullname: Rui-Tao, HOU
– sequence: 6
  fullname: 张曙光
– sequence: 7
  fullname: 咸鹤群
– sequence: 8
  fullname: 王利明
– sequence: 9
  fullname: 刘红燕
– sequence: 10
  fullname: 侯瑞涛
BookMark eNotjT1Lw0AYgG-oYK39A67Oiffe5S7vjVL8goKLziWXXqBRkprYf-BXheDUik4ROjiUVnDRyT_TS-m_sKDTszw8zxapJWliCNkB6gJHiXuxGyYXPTcOM5dSyriqkTqjync8ALlJmnne01QIyZF5UCeqei7t03zx87acThdfw2r8vXy9sY-lnd-t7gs7KarRR1XM7Gxob9_tQ7l6mayd6nO0TTai4DI3zX82yPnhwVnr2GmfHp209ttOHxhKh4OQKE2kOA0ZM9jtajBoQITKpxo0og6VMQwiwUM0CpQfREabgEbSB6p5g-z-dftZejUw-XUnTgdZsl52GCoBvofI-S_HzF6e
ContentType Journal Article
Copyright 2018. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2018. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000239
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p1286-315686ef930c22e8ddb1e8e15c970b1b88bc9ee21f53c8e9197afebea0f6710b3
ISSN 2097-4116
IngestDate Mon Jun 30 13:49:04 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 3
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1286-315686ef930c22e8ddb1e8e15c970b1b88bc9ee21f53c8e9197afebea0f6710b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2895174883
PQPubID 6503834
ParticipantIDs proquest_journals_2895174883
PublicationCentury 2000
PublicationDate 2018-06-22
PublicationDateYYYYMMDD 2018-06-22
PublicationDate_xml – month: 06
  year: 2018
  text: 2018-06-22
  day: 22
PublicationDecade 2010
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2018
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.171123
Snippet 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相...
SourceID proquest
SourceType Aggregation Database
StartPage 286
SubjectTerms Algorithms
Cloud computing
Cryptography
Cybersecurity
Data encryption
Encryption
Performance evaluation
Privacy
Redundancy
Trusted third parties
Title 无可信第三方的加密重复数据安全删除方法
URI https://www.proquest.com/docview/2895174883
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  issn: 2097-4116
  databaseCode: BENPR
  dateStart: 20140101
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.proquest.com/central
  omitProxy: true
  ssIdentifier: ssib055638241
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LbtNAcNWmQuKCQIB4FNQDy83Bz_XM0QmOUtSGVyLCKYodmxaktJTkQM-8ilRxKghOQeqBQ9UicYETP1On6l8wu3YeUiJeUrSazHrWu5n1zGQ9D8auua3QgEhEGtmioNmxHmiBMEGzAgxcG2NID9yWK6Jcs2_VnfrM7Ikxr6VuJ8iHm1PjSv6Hq4Qjvsoo2X_g7HBQQhBM_KWWOEztX_GY-4Kjyz2d-w6HEvdK3Ld5gQCD-4Qvyo_EAAdUFwteQNmFHgdbUXkZOdGC4D5ycDncVBhbAUTl8IIuAfrq-arLVwMSOcGgAFDjIEeUhKN7UWvxtMLlFCO4uPF8vZPK36ET4PAsu-ylAVX3V7oabeVMx6qDW-1uV4nL-qI3fJe0tKotZxVaHniVYc2w8lr7kfYwC7FYrI0fcxgg3bHM0Z9iWU08kqlaRptW-WFOm2b67uHPK1FS1tTR1WwjDfgcqARnbOdb4-I9Tds9oXYsEKD0Tth-spp_HG7kVSIhHCnZgWNB5XajVFtaalT9evX6-lNNlj-TbgJZLZhZNmeSetJzbK7gV-7cG4hGmcYNzJHl6tANwVQ-E8MFZCFhci43JmYyYWoo-6l6mp3KfqkFL93FZ9jM5spZhv0PveTdweHPz0d7e4fft_rvfxx9epG87SUHr45fbye72_2dr_3t_WR_K3n5JXnTO_64S9f0v-2cY7WSXy2WtayYh7ZOJpAgXe8IEFGMlh6aZgStVmBEEBlOiK4eGAFAEGIUmUbsWCFEaKDbjEnCNPVYkBUcWOdZrr3Wji6wBT1wEJrCcdFs2dSLcZOMfgHYQmzFoXWRzQ_W2sie1mcNE1AmZQewLv2--zI7Odp_8yzX2ehGV8jw7ARXM6b8AkjGgXw
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E6%97%A0%E5%8F%AF%E4%BF%A1%E7%AC%AC%E4%B8%89%E6%96%B9%E7%9A%84%E5%8A%A0%E5%AF%86%E9%87%8D%E5%A4%8D%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%88%A0%E9%99%A4%E6%96%B9%E6%B3%95&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=ZHANG%2C+Shu-Guang&rft.au=He-Qun%2C+XIAN&rft.au=Li-Ming%2C+WANG&rft.au=Hong-Yan%2C+LIU&rft.date=2018-06-22&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=5&rft.issue=3&rft.spage=286&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000239&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon