Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Efficient and Safe Outsourcing Big Data Auditing Method in Cloud Environment

A cloud environment and big data technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of high computing overhead, proving that information is not completely random, insecure, etc., and achieve low communication costs and save The effect of storage overhead and low computational overhead

Active Publication Date: 2021-10-08
JINAN UNIVERSITY
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme is insecure, there are replay attacks, and the challenge information does not contain random values, so the proof information generated by the cloud server is not completely random
[0005] So far, most of the data audit schemes either have high computational overhead or have security problems. How to design an efficient and safe outsourced big data security audit scheme has become a key issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient and Safe Outsourcing Big Data Auditing Method in Cloud Environment
  • An Efficient and Safe Outsourcing Big Data Auditing Method in Cloud Environment
  • An Efficient and Safe Outsourcing Big Data Auditing Method in Cloud Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Formal definition of an outsourced big data audit solution:

[0032] An efficient and secure outsourced big data auditing solution in a cloud environment consists of the following five polynomial time algorithms:

[0033] (1) System establishment algorithm Setup(1 λ ): Input security parameter λ, output system public parameter params and private key sk;

[0034](2) Tag generation algorithm TagBlock(params, sk, F): input system public parameter params, private key sk and file F. Assuming that the file F is divided into n blocks, each file block is represented as F[i] (1≤i≤n), and the output file label T i ;

[0035] (3) Challenge algorithm Challenge: output challenge information chal;

[0036] (4) Proof algorithm Proof(params, F, T i ,chal): input system public parameters params, file F, file label T i and challenge information chal, output proof information prf;

[0037] (5) Verification algorithm Verificati on(params, sk, chal, prf): input system public paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient and safe outsourced big data auditing method in a cloud environment. Based on algebraic signatures and XOR homomorphic functions, by adopting algebraic signature technology, the invention has lower calculation overhead and communication costs compared with the prior art. In addition, the present invention introduces TTPA, a trusted third-party auditor, to implement big data integrity verification through TTPA, effectively reducing the computing overhead of data owners. The security proof shows that the proposed scheme is provably secure under the security model. The performance analysis shows that, compared with the existing schemes, the present invention has less calculation overhead for the server, and effectively reduces the calculation, storage and communication costs of the verifier during the verification process.

Description

technical field [0001] The invention relates to the technical field of security auditing of outsourced storage data in a cloud environment, in particular to an outsourced big data auditing scheme based on algebraic signatures and XOR homomorphic functions. Background technique [0002] With the development of networking and the explosive growth of data, the era of big data has arrived. Big data appears in all aspects of people's lives, including information records, trend analysis, and digital online services. Usually, these data are stored on the cloud server side and are managed by the cloud service provider. Because in the cloud computing environment, the cloud server is not completely trustworthy, for example, the cloud server may delete files that are rarely accessed to save storage costs, and the enterprise or individual outsources data to the cloud, which means that the enterprise or individual loses If you have full control over the data, then there are issues of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64H04L29/06H04L29/08
CPCG06F21/645H04L63/123H04L67/10
Inventor 王晓明甘庆晴晏嘉俊李素玉
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products