Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Distributed cloud storage data integrity protection method

A data integrity and cloud storage technology, applied in the field of cloud computing security, can solve problems such as difficulties, achieve high confidence, reduce computing overhead, and reduce storage.

Inactive Publication Date: 2012-10-03
BEIHANG UNIV
View PDF2 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its security is based on the discrete logarithm problem on the elliptic curve, that is, the Abel group E composed of the elliptic curve p Consider the equation Q=kP on (a,b), where P,Q∈E p (a,b),k

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed cloud storage data integrity protection method
  • Distributed cloud storage data integrity protection method
  • Distributed cloud storage data integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The integrity protection method described will be described in detail below in conjunction with the accompanying drawings, figure 1 It is a flow chart of the present invention; figure 2 It is a schematic diagram of distributed storage after data preprocessing in the present invention; image 3 It is an interaction diagram of the challenge-response mechanism of the present invention.

[0035] Main symbols and algorithm explanations:

[0036] (1) F represents the user's original data, and M represents the encoded data, including n×l data blocks. is the i-th block of the j-th data vector, which will be stored in the server S j ·G * =(I (n-r)×(n-r) |P T ) represents the generation matrix of the Goppa code, where P is the generation matrix of the redundancy check block; M * Represents the data blocks stored in error in the server.

[0037] (2) E() and D() are the encryption algorithm and decryption algorithm of the Paillier cipher algorithm respectively, k 1 is it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed cloud storage data integrity protection method. The method comprises: (1) data division and coding {F--M}; (2) generation of homomorphic verifiable tags (HVTs) {(sk,F)--HVTs}; (3) remote data storage {(M(j),HVT--Sj)}; (4) a user launching a challenge {chal}; (5) a server making a response {R}; (6) verification{(R,sk)--('success', 'failure')}; and (7) data recovery {(M*,P)--F}. According to the method provided by the invention, the communication cost is reduced by adopting random data block sampling; data error location and error recovery can be realized by using linear coding; and the method has no limits to the number of times for data possession verification, is high in the verification confidence, safe and reliable. Accordingly, the method provided by the invention has good practical value and wide application prospect in the technical field of cloud security.

Description

(1) Technical field [0001] The invention relates to a distributed cloud storage data integrity protection method, which is also a method for verifying the integrity of user data stored in a cloud server and performing data error correction, and belongs to the field of cloud computing security. (2) Background technology [0002] The rapid development and popularization of Internet network application technology, coupled with the development of Web2.0 has led to the rapid growth of network users and network data volume, and users have put forward higher requirements for data processing capabilities. The characteristics of cloud computing cater to these needs. Cloud computing provides great convenience for user storage, and users no longer need to care about complicated hardware management. [0003] Although cloud computing has these attractive advantages, it also brings new security challenges and threats to data protection: First, because users no longer physically own their ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 毛剑徐先栋刘建伟张晏李坤修春娣
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products