Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Batch verification cloud data public audit method with error data positioning function

A wrong data and batch processing technology, applied in the field of network security, can solve the problems of not considering the location of wrong data, not being able to determine the owner of the wrong data, and not locating the server, etc., so as to reduce the time to find wrong data, make it easier to judge, and improve efficiency Effect

Active Publication Date: 2017-06-30
ZHONGBEI UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2016, Mao et al. also used BLS short signatures to propose a data integrity verification scheme that supports batch processing in a single-user multi-cloud server environment, but the scheme does not consider the problem of wrong data location
In 2013, He et al. proposed a data integrity verification scheme that can identify damaged data and support batch processing by using a recoverable coding method. server at
In 2015, Shin et al. also proposed a batch data integrity verification scheme to identify damaged data. However, when there are errors in the data returned by multiple servers, the scheme can only determine the last wrong server, and Unable to determine owner of bad data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch verification cloud data public audit method with error data positioning function
  • Batch verification cloud data public audit method with error data positioning function
  • Batch verification cloud data public audit method with error data positioning function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. All other embodiments obtained by those skilled in the art without creative work belong to this invention. scope of invention protection.

[0019] The method process of the present invention is as figure 1 As shown, the steps are:

[0020] 1. The CA server performs initialization parameter settings;

[0021] ●Taking k as the safety parameter, choose two multiplicative cyclic groups G with order q 1 and G 2 , q is a large prime number and satisfies q>2 k , take G 1 The generator of is g, in the group G 1 and G 2 Choose a bilinear map on e:G 1 ×G 1 →G 2 .

[0022] ●Choose four cryptographic Hash functions H 1 ,H 2 ,H 3 ,H 4 and a pseudorandom function f, where H 1 :{0, 1} * →G 1 , H 2 :{0, 1} * → Z q , H 3 :{0, 1} * →G 1 , H 4 :{0, 1} * → Z q ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a batch verification cloud data public audit method with an error data positioning function. The method comprises the steps that each cloud user stores the file block and data label in a cloud server, and sends the positioning label of the file block to TPA; the TPA challenges the data stored on a number of cloud servers by users after receiving the audit request of the users; after receiving a returned proof, the TPA carries out validity verification based on the sent challenge and the proof returned by of the servers; if the verification is passed, a data audit result is passed; if the verification is not passed, the TPA verifies the positioning label; if the verification of the positioning label is passed, the audit result is passed, otherwise the cloud user index of error data and the index of the server are output; and finally, the TPA sends audit success to the cloud user whose audit result is passed, and sends the index of the server of error data to the cloud user whose audit result is not passed. According to the invention, the users can conveniently and quickly locate damaged data.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a cloud data public audit method that supports batch verification and has the function of locating error data. Background technique [0002] The Provable Data Possession (PDP) scheme allows users to remotely verify the integrity of the data stored on the untrusted server with a high probability without having to retrieve the data without local backup. Communication bandwidth is saved. At present, most PDP schemes perform integrity verification on data stored on a single server by a single user. But in reality, the services provided by cloud storage are oriented to many users. At the same time, there is not a single cloud service provider, and each cloud service provider has more than just a single server. In order to better adapt to the reality, in recent years, PDP schemes under the scenarios of multi-user single server, single user multi-server, and multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/06
CPCH04L9/0643H04L9/3073H04L9/3271H04L63/062H04L63/123H04L67/06H04L67/1097
Inventor 庞晓琼王田琪陈文俊
Owner ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products