Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud data integrity verification method and system based on biological characteristics

A technology of integrity verification and biometrics, applied in the field of cloud data integrity verification based on biometrics, can solve problems such as falsification of certification materials, cumbersome background management, and complicated user use

Active Publication Date: 2017-03-08
SHAANXI NORMAL UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the PKI-based cloud data integrity verification protocol has two obvious defects: first, the issuance, management and revocation of digital certificates bring a great burden to the system, since each user needs to apply for a digital certificate in advance, the user The use is complicated, and the background management is extremely cumbersome; secondly, the certificate authoritative CA may not be completely trusted, and the use of digital certificates issued by untrusted CAs will bring great losses to users
Although in the identity-based cryptosystem, the burden of complex certificate management is eliminated, but there are still the following problems: (1) Before using the identity claimed by the user, the user needs to submit additional materials to the key generation center to prove his identity; Identity, the process is complicated and time-consuming, and the proof materials may also be falsified; (2) The user needs to save the identity string locally, which increases the management burden of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data integrity verification method and system based on biological characteristics
  • Cloud data integrity verification method and system based on biological characteristics
  • Cloud data integrity verification method and system based on biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0059] Based on the theory of cryptography, the present invention provides a method for realizing the verification of cloud data integrity based on biometrics. Compared with the traditional PKI-based or identity-based cloud data integrity verification method, the method of the present invention can provide higher security, and at the same time, the client and the third-party verifier do not need to maintain digital certificates, and do not need to save identity identifiers The verification can be completed, which greatly reduces the key management burden of the system. The fault tolerance provided by this scheme can perfectly deal with the problem of incomplete matching of biometric identity in two samplings. Therefore, the present invention not only promotes the development of cloud computing, bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, in particular to a cloud data integrity verification method and system based on biological characteristics. The method comprises: the system is initialized and generates public parameters; a client uploads biological characteristic identity, and a key generation central server generates keys for a user; the client uploads files and tags to a cloud server; an auditing server transmits a challenge value to the cloud server, the cloud server computes a response value by utilizing the challenge value, user data and the tag and transmits the response value to the auditing server, and the auditing server verifies the validity of the response value in order to check whether the cloud server completely saves the data of the client. According to the cloud data integrity verification method and system based on the biological characteristics, complex key management load of the traditional verification protocol is simplified, and the system complexity is reduced; and meanwhile, fault tolerance, which the cloud data integrity auditing scheme based on identity does not have, is provided, so that the practicability is better. The invention further relates to a system of the cloud data integrity verification method based on the biological characteristics.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a biometric-based cloud data integrity verification method and system. Background technique [0002] In recent years, cloud computing has attracted more and more attention from academia and industry, and is one of the important trends in the development of information technology. Cloud storage is a data outsourcing storage service technology derived and developed from cloud computing. Users can store data in the cloud and enjoy the on-demand services brought by cloud computing. Through data outsourcing, users do not need to purchase, maintain and manage related hardware devices, but only need to access the cloud when needed, which saves the workload and cost of management and maintenance. In the cloud storage environment, users store data in the server of an untrusted cloud service provider, and do not save it locally. The security of the data is completely ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/0861H04L63/123
Inventor 禹勇李艳楠杨波丁玉洁
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products