Data safety audit method based on identification

A technology for data security and identity, applied in the field of information security, can solve the problems of inability to resist malicious cloud server attacks, complex maintenance and management of certificate systems, high computing and communication overhead, etc., to achieve effective auditing, ensure security and effectiveness, The effect of reducing computational complexity

Inactive Publication Date: 2013-04-24
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme still has loopholes in security: it cannot prevent the authenticated server from replacing the challenged data with unchallenged legitimate data
In this way, the scheme cannot resist the attack of malicious cloud server, and malicious cloud server can arbitrarily modify user stored data without being discovered by TPA
[0008] On the other hand, the existing auditing schemes are all base

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety audit method based on identification
  • Data safety audit method based on identification
  • Data safety audit method based on identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below by taking cloud storage data security audit as an example.

[0025] The identity-based cloud storage data security audit method is as follows:

[0026] 1.1 Meaning of symbols used

[0027] F represents the file storing data, which consists of n data blocks composition, Represents the set of integer modulo q remainder classes, where q is a large prime number;

[0028] ID i ∈{0,1} * is the identity of user i, w∈{0,1} * The state parameters held by all users, in is an additive cyclic group of order prime q, Secret value held for PKG, {0,1} * represent a binary number,

[0029] S j , T j are data blocks m j The signature value and random tag value of S, T are the aggregated signature value and aggregated random tag value of the challenge data block respectively;

[0030] h 1 (·),H 2 ( ) all represent a one-way hash function, and the definition mapping is:

[0031] h( ) represents a one-way hash ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data safety audit method based on identification. The data safety audit method based on the identification can guarantee data authenticity and integrity of an audited server through small calculated amount and communication amount. In the step of data block signing, a data block serial number and data block data together generate flag value, in an audit step of challenging of response value, the data block serial number is participated into the audit process of the data block, therefore, the audited server can be prevented from using unchallenged legal data to replace the challenged data, and safety and effectiveness of data audit are guaranteed.

Description

technical field [0001] The present invention relates to information security technology. Background technique [0002] Cloud computing, this emerging Internet technology, is profoundly affecting the industrial structure and personal life. It has powerful data computing, storage capabilities and hardware resources to provide users with on-demand services. Especially as a supporting technology in the era of big data (BigData), it has attracted more and more attention from academia and industry. [0003] Cloud storage, as a basic component of cloud computing, can free individual or business users from the shackles of their own resources and enjoy many conveniences: (1) have massive data storage capabilities; (2) be able to access resources independent of the location ; (3) Reduce the cost of software and hardware purchase and resource maintenance. However, it is this centralized and outsourced data storage mode that makes cloud computing bring benefits to people, but also ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 许春香赵继宁
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products