Cloud-storage-oriented trusted storage verification method and system

A verification method and cloud storage technology, applied in the field of computer software, can solve problems such as failure to access documents, potential safety hazards, signature results that cannot reflect the real situation of documents, etc., and achieve the effect of avoiding leakage and small calculation costs

Active Publication Date: 2011-05-04
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two problems faced by this method: one is the efficiency problem, each verification process needs to access all the document content and calculate the signature for it, so the access and calculation cost of large documents is high; the second and more important is There are security risks
If the server retains the Hash value H(D) of the document (D) for efficiency reasons, and generates a signature based on this value each time, then the final signature result cannot reflect the real situation of the current document
If the cloud storage service provider does it maliciously, the user may not be able to find that the document has been tampered with until the access to the document fails
[0005] In short, the current cloud storage system lacks credible and efficient verification methods for the existence and correctness of user data, so a rapid detection method is needed to help users confirm whether the massive files stored in the cloud storage system have not been damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-storage-oriented trusted storage verification method and system
  • Cloud-storage-oriented trusted storage verification method and system
  • Cloud-storage-oriented trusted storage verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0074] In this embodiment, the user uploads the file file1 to the untrusted network storage server, and the file size is 100MB. The user requires storage verification of the file, which needs to be verified once a day for two years, so the maximum number of verifications is 730. The user requested a confidence level of "0.9" for storage verification.

[0075] The flow process of the storage verification of the present invention is as follows,

[0076] 1) The user initiates a file storage verification preparation request

[0077] 2) The storage verification preparation module determines the file that the user needs to prepare for storage verification: NAME (file1);

[0078] 3) The storage verification preparation module determines the size of the file: SIZE (104857600Byte);

[0079] 4) The storage verification preparation module determines the number of times N that requires storage verification: 730;

[0080] 5) The storage verification preparation module determines the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted storage verification method and a trusted storage verification system for cloud storage and belongs to the technical field of computer software. In the method and the system, before a file is transmitted to an untrusted cloud storage server, a series of random positions are generated according to the key held by a user and other generated related verification parameters, the contents at the random positions in the file are read, a plurality of verification labels are generated for the file, and all necessary parameters are stored and maintained; and when the storage state of the file is required to be checked, a user can initiate an interaction process with a cloud storage system according to related parameters, and the cloud storage system can generate new verification labels again according to parameters corresponding to the verification. In the method disclosed by the invention, a higher verification reliability can be acquired at a lower computingcost, the contents at different positions in the file are selected at each time of generation of the file verification labels, and different keys are adopted to prevent a server from generating a correct signature by using a stored correct signature or by storing the file contents at a specific position.

Description

technical field [0001] The invention relates to a trusted storage certification method and system for cloud storage, which can be used for trusted verification of the existence and correctness of data stored in the cloud, and belongs to the technical field of computer software. Background technique [0002] With the continuous growth of individual and business users' demand for file storage, the application of various cloud storage and network systems has received more and more attention. This type of storage system can provide enterprises and individual users with massive data file storage and management services at a relatively low price without requiring users to perform special maintenance and management of the file storage system, so it has been welcomed by the market in recent years. [0003] However, in the past two years, Google, Amazon and other large cloud computing manufacturers have experienced various security failures that show that cloud storage systems are no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 付艳艳冯登国张敏陈驰徐震
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products