Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Efficient Multi-Writer Model Public Audit Method for Cloud Data Security

A multi-write, auditing technology, applied in the field of cloud computing security, can solve the problems of unfaithful cloud server providers, complex key management problems, indistinguishability, etc., to achieve privacy protection for multiple writers, and to achieve multiple writes the effect of reducing the burden

Inactive Publication Date: 2016-05-18
SOUTHEAST UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, outsourcing data can lead to new security concerns
The first issue is data integrity
The second problem is dishonest cloud server provider (CSP)
However, the cloud server CS cannot distinguish which data owner DO generates which signature
This may lead to a new problem: once any data owner DO of the shared key material is attacked, the attacker can maliciously modify the file by imitating other legitimate multiple data owners DOs
[0008] (2) Complex key management issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Multi-Writer Model Public Audit Method for Cloud Data Security
  • An Efficient Multi-Writer Model Public Audit Method for Cloud Data Security
  • An Efficient Multi-Writer Model Public Audit Method for Cloud Data Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] In this embodiment, the KDP protocol is designed and completed. The purpose of this protocol is to complete the generation and distribution of a series of keys. Including but not limited to the following steps (expressed in a table):

[0049]

[0050] The KDP protocol is as follows image 3 shown.

[0051] The steps in Embodiment 1 are described as follows:

[0052] (1) Step 100: The key server creates a base point as , the order is elliptic curve . The parameters of the elliptic curve are known to the third auditor TPA, the cloud server CS and all data owners DO.

[0053] (2) Step 102: The key server randomly generates a key , Denote the residual class ring modulo n and assign it to DOs on the secure channel between the key server and DOs. therefore, is the shared key of DOs. The key server then utilizes the key base point corresponding key , and put Announced to the cloud server CS, the third auditor TPA and all DOs.

[0054] (3) Step 104...

Embodiment 2

[0056] This embodiment defines the DWP protocol. The purpose of this protocol is to realize that the data owner DO signs the data and correctly stores the data and its corresponding signature in the cloud server CS. Including but not limited to the following steps (expressed in a table):

[0057] steps

content

106

do use Algorithm to get and send it to CS.

108

take over When, CS utilizes Algorithm verification , and send a reply message to DO.

[0058] The DWP protocol is as follows Figure 4 shown.

[0059] The steps and the protocol flowchart in Embodiment 2 are described as follows:

[0060] (1) Step 106: When DO to sign documents (E.g ) blocks in , Represents a collection of files, Represents a collection of data blocks, the data owner DO uses the signature algorithm and combines the function (This function can realize the string file and blocks converted to a point on the elliptic curve) to cal...

Embodiment 3

[0063] This embodiment defines the MWAP protocol. The purpose of this agreement is: to complete the third auditor TPA's audit of the data written by DOs stored in the cloud server CS. Including but not limited to the following steps (expressed in a table):

[0064] steps

content

110

TPA to be audited by When writing data in DOs, she selects a set of , and put sent to CS.

112

receiving When, CS utilizes Algorithm to get and send it to TPA.

114

receiving When, TPA utilizes Algorithms audit data in CS.

[0065] The protocol flow of this embodiment is as follows Figure 5 shown.

[0066] The steps in Embodiment 3 and the protocol flow chart are described as follows:

[0067] (1) Step 110: When the third auditor TPA wants to audit the When writing data in DOs, she uses a suitable algorithm to select a set of flag data corresponding to the document to be verified , and put Send to the cloud server CS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an effective multi-writer model public auditing method for safety of cloud data and belongs to the technical field of cloud computing safety. The method comprises the following steps: (1) executing a key distribution protocol, i.e. generating key materials for DOs (Data Owners), a CS (Cloud Server) and a TPA (Third Party of Audit) by a key server through utilizing a key material generating algorithm; (2) executing a data writing protocol, i.e. completing interaction of the DOs and the CS by a signature algorithm and a complete checking algorithm, namely, carrying out signing on data by the DOs and correctly storing the data and the corresponding signatures in the CS; and (3) executing a multi-writer auditing protocol, i.e. by a verification algorithm and a proving algorithm, completing auditing of the TPA on the data which is stored in the CS and is written by the DOs. The effective multi-writer model public auditing method can be independent of the number of the DOs, reduces the load of the CS and also enjoys public auditing and privacy protecting functions.

Description

technical field [0001] The invention relates to an effective multi-writer model public audit method for cloud data security, belonging to the technical field of cloud computing security. Background technique [0002] Cloud computing (data outsourcing to the cloud) is a business model that obtains services from shared and configurable computing resource pools (these resources include networks, servers, storage, applications, and services) in a convenient and on-demand manner through the network. . However, outsourcing data can lead to new security concerns. The first problem is data integrity. The second problem is dishonest cloud server providers (CSPs). [0003] In order to solve these two problems, the following proof needs to be shown to data owners and consumers: CSP stores data, and the data is not modified by entities other than the data owner. This introduces the method of public auditing. [0004] Cloud data storage services define a publicly auditable architect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 万长胜周琳
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products