Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient cloud storage data possession verification method

A technology of possession verification and cloud storage, which is applied in the field of cloud computing security, can solve the problems that hinder the implementation of cloud architecture and cannot guarantee data integrity and availability, and achieve reduced computing overhead, small data volume, and high confidence Effect

Inactive Publication Date: 2012-08-22
BEIHANG UNIV
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

All in all, although data outsourcing to the cloud is relatively economical in terms of cost and complexity in terms of long-term and large-scale storage, it cannot guarantee the integrity and availability of data. If this problem is not handled correctly, it will be huge. barriers to cloud architecture implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient cloud storage data possession verification method
  • Efficient cloud storage data possession verification method
  • Efficient cloud storage data possession verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention includes two entities, a user and a cloud server. The effective verification method for the data holder will be described in detail below in conjunction with the accompanying drawings. figure 1 It is a flow chart of the present invention; figure 2 is the calculation graph of the data block label in the present invention; image 3 It is an interaction flowchart of data possession authentication in the present invention.

[0035] Main symbols and algorithm explanations:

[0036] (1) π=(p,G,G T ,e,g) are system parameters, where p is a large prime number and is the order of the cyclic group G; e:G×G →G T is a non-degenerate bilinear map. G= , g is the generator of G;

[0037] (2)x 1 , x 2 ,...x l , is a random number in the group G, which is generated by a pseudo-random number generator with a key, and the user only needs to store the corresponding key k 1 ;

[0038] (3) π k ( ) is a pseudorandom permutation (PRP), which satisfi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient cloud storage data possession verification method. The method comprises the following steps of: step 1, file partitioning {F->(f1, f2...fl)}; step 2: label computation {(sk, F) ->Ti}; step 3: cloud storage of data {(F, Ti->S}; step 4: initiating challenge by a user (chal); step 5: making a response by a server; step 6: verification {(R, sk) ->('success', 'failure')}; and step 7: reporting {Report}: if verification output is 'failure', sending a warning notice to the server by the user. According to the method, a double-line pair technology is used for realizing the possession verification for the cloud data, in the challenge-response interactive process, data blocks are sampled randomly, the communication traffic is low and fixed, and is independent from the size of the file, and moreover, the verification times is not limited. The method has better practical value and wide application foreground in the technical field of cloud computing security.

Description

(1) Technical field [0001] The present invention relates to an efficient cloud storage data possession verification method, in particular to a data possession verification method based on bilinear mapping in a cloud storage environment, which enables users to independently verify data stored in cloud servers The integrity and possession of data belong to the field of cloud computing security. (2) Background technology [0002] As an information system, cloud computing has attractive advantages, but it also brings new security challenges and threats to data protection. Due to some advantages of cloud computing: on-demand self-service, ubiquitous network access, location-independent resource pool, scalability, faster product development, risk transfer, etc., it is regarded as the next-generation architecture of IT enterprises . As a far-reaching technology, cloud computing is changing the characteristics of business organizations using information technology. One of the fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 毛剑张晏刘建伟徐先栋冯克尚涛
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products