Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method of three-dimensional model file based on secret sharing in cloud environment

A 3D model and secret sharing technology, applied in the field of cloud storage, can solve problems such as data loss, unavailability, and inability to guarantee data integrity, and achieve the effect of ensuring consistency and accuracy and solving model distortion problems

Active Publication Date: 2019-12-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problem that the existing 3D model data exists in cloud storage where multiple node data are lost or unavailable, node data is easily destroyed and data integrity cannot be guaranteed, the present invention proposes a method based on secret sharing in cloud environment The 3D model authentication method can effectively reduce the fraudulent behavior of secret 3D model data in the process of cloud storage and cloud transmission, and can restore the 3D model without loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of three-dimensional model file based on secret sharing in cloud environment
  • Authentication method of three-dimensional model file based on secret sharing in cloud environment
  • Authentication method of three-dimensional model file based on secret sharing in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0050] Such as figure 1 with image 3 As shown, a three-dimensional model authentication method based on secret sharing in a cloud environment has the following steps:

[0051] Step 1: Select the original STL 3D model secret file from the standard picture library as the source file, use Lagrange interpolation polynomial to construct the secret polynomial to generate secret fragments from the source file, and distribute it to multiple secret...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method for a three-dimensional model file based on secret sharing in a cloud environment, which comprises the following steps of constructing a secret polynomial by adopting a Lagrange interpolation polynomial, generating the secret fragments from a source file, and transmitting and storing the secret fragments in a plurality of secret participants in a distributed manner; taking the source file and the secret fragments as the original structure carriers, respectively generating the digital abstracts from the secret fragments of the source file by utilizing an SM3 hash algorithm, and uploading the digital abstracts generated by the secret fragments to a cloud in a distributed manner; and recovering the digital digest of the three-dimensional model file based on a (k, n) threshold secret sharing method of Shamir, and performing consistency verification on the digital digest of the three-dimensional model file before encryption and after recovery.The invisibility, robustness and analysis resistance of the method are improved, and the fraudulent behaviors during the secret sharing process are effectively prevented. The method has the good performance at the aspect of protecting the integrity of the file, and particularly has the obvious advantages at the aspect of efficiency.

Description

Technical field [0001] The invention relates to the technical field of cloud storage, in particular to a method for authenticating a three-dimensional model file based on secret sharing in a cloud environment. Background technique [0002] Due to the continuous maturity of 5G mobile technology and the in-depth application of the future market, cloud computing puts forward higher requirements for data security. As an important form of infrastructure and services in cloud computing, cloud storage has caused most people to worry about the security of private information storage in public clouds. As the basic component of virtual reality technology, 3D model data has been expanding continuously in recent years, which makes more and more users choose to transplant 3D model data and its applications to the cloud. Moreover, the 3D model design and modeling process belong to the original work of the designer, which contains huge commercial value and independent copyright. In particular...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/62
CPCG06F21/62G06F21/64
Inventor 张建伟孙海燕吴作栋梁树军蔡增玉王文倩栗京晓杜春锋
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products