• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 论文 • 上一篇    下一篇

面向数据去重的基于二次哈希的收敛加密策略

周玉坤1,2,冯丹1,2,夏文1,2,付忞1,2   

  1. (1.武汉光电国家实验室,湖北 武汉 430074;
    2.华中科技大学计算机科学与技术学院信息存储系统教育部重点实验室,湖北 武汉 430074)
  • 收稿日期:2015-12-10 修回日期:2016-03-15 出版日期:2016-09-25 发布日期:2016-09-25
  • 基金资助:

    国家973计划(2011CB302301);国家自然科学重点基金(6140050892);国家自然科学基金(61502190);华中科技大学基础研究基金(2014QNRC019)

A twice-Hash based convergent  encryption strategy for data deduplication       

ZHOU Yu kun1,2,FENG Dan1,2,XIA Wen1,2,FU Min1,2   

  1. (1.Wuhan National Laboratory for Optoelectronics,Wuhan 430074;
    2.Key Laboratory of Data Storage Systems,Ministry of Education of China,
    College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China)
  • Received:2015-12-10 Revised:2016-03-15 Online:2016-09-25 Published:2016-09-25

摘要:

在云存储和备份系统等领域,数据去重被广泛地用来消除冗余数据及节约传输带宽,数据去重的安全问题受到越来越多的关注。现有收敛加密(CE)存在两大挑战:(1)由于密钥确定化导致的线下暴力破解问题;(2)对重复数据的无用加密操作使得计算开销随着数据负载去重率的提高而增加。针对上述两个问题,提出了基于二次哈希的收敛加密策略(TCE)。具体而言,TCE首先计算数据块的哈希生成密钥,密钥经过可信第三方添加秘密信息后增加随机化程度;然后针对该哈希值再次哈希得到数据块指纹。 TCE增加了线下暴力破解的难度,消除了对重复数据的加密操作。实验测试结果表明,TCE比CE的备份窗口减少了30%~50%。

关键词: 数据去重, 收敛加密, 暴力破解攻击, 备份窗口

Abstract:

With the explosive growth of digital data, data deduplication has been widely used in cloud storage to reduce storage space and network bandwidth. Although the existing solutions use the convergent encryption (CE) to improve data confidentiality, the CE faces two main challenges: 1) the CE is subject to offline bruteforce dictionary attacks because it is deterministic and keyless; 2) the CE has to encrypt all data and calculate the fingerprint based on its ciphertext, thus the computation cost increases as the data deduplication  ratio increases. In order to solve these problems, we propose a twicehash based convergent encryption strategy (TCE). The TCE encrypts data after deduplication via computing the hash twice. And the trusted third party adds secret information to make random convergent keys. The TCE uses the second hash as the fingerprint and eliminates  useless operations for duplicate data encryption. Experimental results show that the TCE can reduce the backup window by 30%~50% in comparison with the CE.

Key words: data de-duplication, convergent encryption, brute force attack, backup window