Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion-tolerant cloud storage data auditing method

A technology of data auditing and intrusion tolerance, applied in the field of cloud computing security

Active Publication Date: 2020-07-17
ANHUI UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (2) The key of TPA and user has been leaked multiple times, but there is a key refresh operation between TPA and user's key leak in the same period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion-tolerant cloud storage data auditing method
  • Intrusion-tolerant cloud storage data auditing method
  • Intrusion-tolerant cloud storage data auditing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict. Hereinafter, the present invention will be described in detail with reference to the drawings and in conjunction with the embodiments.

[0055] Such as figure 1 with Figure 8 As shown, the system members used in the intrusion-tolerant cloud storage data audit method provided by the present invention include system parameter generation centers, cloud servers, users, and third-party audits (TPA). The parameter generation center generates various parameters required for system operation, including user private keys, user public keys, etc.; cloud servers provide users with storage services; users upload a large number of data files to the cloud server for storage; third-party audits provide users with Audit service to check the integrity of the data on the cloud server stored by the user.

[0056] The following embodiments are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion-tolerant cloud storage data audit method and a data audit system. The method includes: a system parameter generation step in which various system parameters are generated by a system parameter generation center; TPA assists users in periodically updating audit keys Key update step; TPA assists the user to refresh the audit key in each cycle; after the user generates a verification tag for the file, upload the file and the verification tag to the cloud server, and TPA audits the file for verification Whether the file is complete and stored on the cloud server is the data upload and audit steps. In this method, a third-party audit (TPA) is introduced to perform audit operations, and at the same time, it assists users in performing periodic key update and key refresh operations in each time period. Even if the keys on the user and the TPA are leaked multiple times, except for the few cycles where the user's key is leaked, data auditing in any other cycle is still safe.

Description

Technical field [0001] The invention relates to the technical field of cloud computing security, in particular to an intrusion-tolerant cloud storage data audit method. Background technique [0002] With the rapid development of cloud computing, more and more users store data on cloud servers. This storage service brings a lot of convenience to users, but users will have concerns about the security of data stored on cloud servers. Cloud services may hide data loss for the sake of reputation, or delete data that users do not frequently access to save storage space. Therefore, users need to check the integrity of the data stored on the cloud server. [0003] Among the currently feasible cloud storage data audit schemes, public audit is a widely used data integrity verification technology. This technology entrusts the audit work to a capable third-party auditor (Third-party Auditor, TPA). The user uploads the data file and the generated file label to the cloud server, and only nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/0891H04L9/32H04L9/3247
Inventor 许艳丁冉仲红崔杰石润华
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products