Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity-based data security audit method

A data security and identity technology, applied in the field of information security, can solve problems such as inability to resist malicious cloud server attacks, complicated certificate system maintenance and management, high calculation and communication overhead, etc., to achieve effective auditing, ensure security and effectiveness, The effect of computational complexity reduction

Inactive Publication Date: 2015-10-28
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme still has loopholes in security: it cannot prevent the authenticated server from replacing the challenged data with unchallenged legitimate data
In this way, the scheme cannot resist the attack of malicious cloud server, and malicious cloud server can arbitrarily modify user stored data without being discovered by TPA
[0008] On the other hand, the existing auditing schemes are all based on the traditional certificate system
Since the public key of each user is a random value that is self-generated and has nothing to do with identity, CA (certificate center) is required to issue a certificate in the form of digital signature to bind the public key and the identity of the user. The maintenance and management of the certificate system is complicated, calculation, high communication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based data security audit method
  • An identity-based data security audit method
  • An identity-based data security audit method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below by taking cloud storage data security audit as an example.

[0025] The identity-based cloud storage data security audit method is as follows:

[0026] 1.1 Meaning of symbols used

[0027] F represents the file storing data, which consists of n data blocks composition, Represents the set of integer modulo q remainder classes, where q is a large prime number;

[0028] ID i ∈{0,1} * is the identity of user i, w∈{0,1} * The state parameters held by all users, in is an additive cyclic group of order prime q, Secret value held for PKG, {0,1} * represent a binary number,

[0029] S j , T j are data blocks m j The signature value and random tag value of S, T are the aggregated signature value and aggregated random tag value of the challenge data block respectively;

[0030] h 1 (·),H 2 ( ) all represent a one-way hash function, and the definition mapping is:

[0031] h( ) represents a one-way hash ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data safety audit method based on identification. The data safety audit method based on the identification can guarantee data authenticity and integrity of an audited server through small calculated amount and communication amount. In the step of data block signing, a data block serial number and data block data together generate flag value, in an audit step of challenging of response value, the data block serial number is participated into the audit process of the data block, therefore, the audited server can be prevented from using unchallenged legal data to replace the challenged data, and safety and effectiveness of data audit are guaranteed.

Description

technical field [0001] The present invention relates to information security technology. Background technique [0002] Cloud computing, this emerging Internet technology, is profoundly affecting the industrial structure and personal life. It has powerful data computing, storage capabilities and hardware resources to provide users with on-demand services. Especially as a supporting technology in the era of big data (BigData), it has attracted more and more attention from academia and industry. [0003] Cloud storage, as a basic component of cloud computing, can free individual or business users from the shackles of their own resources and enjoy many conveniences: (1) have massive data storage capabilities; (2) be able to access resources independent of the location ; (3) Reduce the cost of software and hardware purchase and resource maintenance. However, it is this centralized and outsourced data storage mode that makes cloud computing bring benefits to people, but also ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 许春香赵继宁
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products