An identity-based data security audit method
A data security and identity technology, applied in the field of information security, can solve problems such as inability to resist malicious cloud server attacks, complicated certificate system maintenance and management, high calculation and communication overhead, etc., to achieve effective auditing, ensure security and effectiveness, The effect of computational complexity reduction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be further described below by taking cloud storage data security audit as an example.
[0025] The identity-based cloud storage data security audit method is as follows:
[0026] 1.1 Meaning of symbols used
[0027] F represents the file storing data, which consists of n data blocks composition, Represents the set of integer modulo q remainder classes, where q is a large prime number;
[0028] ID i ∈{0,1} * is the identity of user i, w∈{0,1} * The state parameters held by all users, in is an additive cyclic group of order prime q, Secret value held for PKG, {0,1} * represent a binary number,
[0029] S j , T j are data blocks m j The signature value and random tag value of S, T are the aggregated signature value and aggregated random tag value of the challenge data block respectively;
[0030] h 1 (·),H 2 ( ) all represent a one-way hash function, and the definition mapping is:
[0031] h( ) represents a one-way hash ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com