Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A publicly verifiable cloud data possession verification method

A verification method and public verification technology, applied in the field of cloud computing security, can solve problems such as security threats, dishonesty, and data loss, and achieve the effect of low storage complexity and low computational complexity

Active Publication Date: 2016-05-11
BEIHANG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method makes users lose control over their data, and the data may be leaked, tampered, deleted, modified and other malicious acts without authorization; although the cloud storage infrastructure has stronger computing power and reliability than personal computing devices higher, but still face internal and external security threats; hackers coveting cloud data are also constantly trying to analyze and detect product vulnerabilities of service providers, in order to cause data leakage and obtain valuable data; out of interest considerations, cloud storage providers There may be dishonesty in user data, such as discarding outsourced data that is rarely accessed, hiding the fact of data loss, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A publicly verifiable cloud data possession verification method
  • A publicly verifiable cloud data possession verification method
  • A publicly verifiable cloud data possession verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The described integrity verification method will be described in detail below in conjunction with the accompanying drawings, see Figure 1-8 shown. Figure 5 It is a system block diagram of the present invention; Figure 6 It is the data preprocessing flowchart of the present invention, Figure 7 It is a flow chart of an integrity verification process, Figure 8 For Challenge Information I 1 , evidence information I 2 data structure diagram.

[0056] Main symbols and algorithm explanations:

[0057] (1) represents the original user data, which is divided into n data blocks, f i is the i-th data vector block.

[0058] (2) E() and D() are the encryption algorithm and decryption algorithm of the Paillier cipher algorithm respectively, k 1 is its public key, k 2 is its private key, N is the modulus, and the paillier encryption algorithm satisfies the property of additive homomorphism.

[0059] (3) G is the elliptic curve E P The generator of (a, b), where the lar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A publicly-verifiable cloud data possession checking method is provided. The method includes the three stages of initialization, user challenge-response verification and TTP arbitration; the three stages comprise the following ten steps that: step 1, data segmentation [F->F'] is performed; step 2, verification tag generation [(SK, F)-> HVT] is performed; step 3, data and tag information upload [(F, HVT)->S] is performed; step 4, secret parameters are recorded to a TTP (trusted third party); step 5, the TTP verifies recorded parameters; step 6, [chal] is initiated by a user, and the chal and the verification information of the chal are handed over to the TTP so as to be record; step 7, a server makes a response; step 8, [(R, sk)->(' success', 'failure')] is verified; step 9, relevant information acquisition is verified; and step 10, the trusted third party performs verification publicly. With the publicly-verifiable cloud data possession checking method of the invention adopted, the user can verify the existence and integrity of data in a cloud storage server. The publicly-verifiable cloud data possessions checking method is advantageous in no limitation on the number of user authentication times as well as small storage capacity and low computational complexity of a client, and has great practical value and broad application prospect.

Description

(1) Technical field [0001] The present invention provides a publicly verifiable cloud data possession verification method, which relates to a verification method for verifying the existence and integrity of user data stored in a cloud server, and realizing the fairness verification of user data remote storage services The method belongs to the field of cloud computing security. (2) Background technology [0002] Cloud storage is a cloud computing system built with data storage and management as its core business. It aims to integrate a large number of different types of storage devices in the network through application software through functions such as cluster applications, grid technology, or distributed file systems. Work together to jointly provide data storage and business access functions. [0003] But cloud storage also brings new security challenges and threats to data protection. The root cause of data security risks in cloud storage is that user data is centrali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 毛剑冯克李腾刘建伟张晏张键红
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products