Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based public cloud storage data integrity verification method

A technology for integrity inspection and data storage, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as destroying public inspection functionality, destroying user data, and internal security threats

Active Publication Date: 2021-07-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the cloud server utilizes more secure storage technology and provides more reliable storage devices, in the actual cloud environment, there are many malicious adversaries who try to tamper with or destroy the data stored on the cloud server for their own interests. user data on
[0005] 2. Internal Security Threats
The first type of deception is that TPA colludes with the cloud server, and after the integrity of the outsourced data stored on the cloud is destroyed, it still deceives the user and conceals the fact that the data has been destroyed; the second type of deception is the collusion between TPA and the cloud server, The data integrity of the outsourced storage is not checked at the specified time. We call such a TPA a lazy TPA
Such malicious behavior will fundamentally destroy the functionality of the public inspection, so that users will not be informed as soon as the data integrity is compromised.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based public cloud storage data integrity verification method
  • Blockchain-based public cloud storage data integrity verification method
  • Blockchain-based public cloud storage data integrity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Applied to bilinear mapping in the present invention, its description is as follows:

[0016] A bilinear map e:G×G→G T , where G and G T They are multiplicative cyclic groups, their order is a prime number p, their generator is g, and e has bilinearity, computability and non-degeneration.

[0017] (1) System initialization stage

[0018] user Generate system parameters in the following steps:

[0019] 1. According to security parameters user Select the corresponding group G, G T And the corresponding bilinear map G×G→G T .

[0020] 2. From Z p Randomly select an α as the private key, and calculate v=g α As a public key, where g is a generator of G.

[0021] 3. Choose a pseudorandom function f() and a pseudorandom permutation function π().

[0022] 4. Select the appropriate hash function H:{0,1} * →G,h:{0,1} * → Z p ,h 1 :{0,1} * → π.key, h 2 :{0,1} * →f.key, where π.key is the key space of the pseudo-random permutation function π(), and f.key is th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a block chain-based public cloud storage data integrity inspection method, based on the Ethereum block chain technology, its security depends on the security of the Ethereum block chain, and the existing cloud data integrity inspection method Compared with this scheme, this scheme can effectively resist malicious TPA and lazy TPA: when TPA deviates from the correct protocol content, it will not threaten the security of this scheme, and cannot successfully deceive cloud users; when TPA does not perform data integrity within the specified time When tested, users will find the lazy behavior of TPA.

Description

technical field [0001] The present invention is a cloud storage data integrity inspection method capable of resisting lazy and malicious auditors, which belongs to the field of communication technology, and solves the problem of data integrity assurance stored on cloud servers, because it utilizes the Ethereum block chain technology , so it solves the problem of being unable to resist lazy auditors and malicious auditors in the traditional data integrity inspection method, and provides a stronger security guarantee. Background technique [0002] Cloud storage service provides users with a simple and efficient data management method, enabling users to store their own massive data in cloud servers and access outsourced stored data on demand. Cloud storage service frees users from the pressure of local data storage and maintenance, and provides users with extremely flexible and convenient data access methods. Data outsourcing to cloud storage is an important means and trend of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3271H04L63/123H04L63/20H04L67/1097
Inventor 许春香张源
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products