Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hash tree-based data dynamic operation verifiability method

A data dynamic and data technology, applied in the computer field, can solve problems such as not considering the impact of computing efficiency

Inactive Publication Date: 2013-07-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A data block verification model based on the POR model is given in the prior art, which is also based on the Merkle Hash Tree data structure, but does not consider the impact of the geographic location of data storage on computing efficiency in a distributed environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash tree-based data dynamic operation verifiability method
  • Hash tree-based data dynamic operation verifiability method
  • Hash tree-based data dynamic operation verifiability method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0093] security assumption

[0094] The scheme assumes that all communication channels do not have a large area of ​​data packet loss (communication channels include three parts between USER and CDC, between CDC and TPA, and between TPA and USER). At the same time, the TPA in the scheme is an unbiased and completely credible third-party audit organization, which can faithfully complete all tasks entrusted by USER. The security assumption of CDC in the scheme is slightly different from previous studies. CDC is no longer completely untrustworthy, but has a certain degree of curiosity but can faithfully complete all tasks. CDC guarantees the correctness, non-deception and non-repudiation of all parameter calculation results undertaken by itself, and can unconditionally respond to audit requests for any user da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hash tree-based data dynamic operation verifiability method, which consists of three parts, i.e., a USER, a cloud data center (CDC) and a third party administrator (TPA) connected through a communication network, wherein the USER is used as a party of making a data memory service request, who hopes to store a data file owned by the party into a cloud storage space of the cloud data center, and can be both a personal user and an enterprise user; the CDC is used for responding to the data storage service request of the USER, storing the data file of the USER into the huge data center of the CDC according to a certain rule and managing and maintaining the data file; and the TPA is used as a reliable TPA and is commissioned by the USER to check the completeness and the consistency of the data file stored in the CDC data center. According to the hash tree-based data dynamic operation verifiability method, the verification problem of the completeness and the consistency of the user data file under a cloud computing environment is solved.

Description

technical field [0001] The invention belongs to the technical field of computers and relates to a hash tree-based data dynamic operation verifiability method. Background technique [0002] At present, although cloud computing service providers can enable users to obtain convenient and efficient remote data storage access services through stable and high-speed network connections, due to the many characteristics of cloud computing, such as virtualization, large-scale, dynamic configuration, and scalability, It still brings many security risks and challenges to large-scale data storage services in the cloud computing environment. In order to improve storage efficiency and utilization of storage space, large data files are usually divided into several small data blocks by cloud computing service providers for storage. The geographical location and storage status of each data block are determined by the user. Unknown, users will inevitably doubt the integrity and consistency of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
Inventor 邢建川韩帅
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products