Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Public audit design method for multi-write model of cloud data security

A design method and multi-writing technology, applied in the field of cloud computing security, can solve problems such as high communication costs, weak credibility, and unsupported auditing, and achieve the effect of reducing computing costs and communication costs

Inactive Publication Date: 2016-03-23
SOUTHEAST UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, outsourcing data can lead to new security concerns
The first issue is data integrity
The second problem is the unfaithful cloud server provider CSP
But this scheme has the following serious problems: (1) If each data owner DO audits her own data on the cloud server CS, the communication burden on the cloud server CS will be very heavy
(2) Some data owners may not support auditing due to monetary reasons
(3) The credibility of data owner DO audit is weak
However, this scheme is not suitable for the multi-writer model due to the following security and efficiency issues: (1) The communication cost of batch audit is high
(2) The calculation cost on the third auditor TPA and multiple data owners DOs is high
(3) Authorization issues
When many data owners write data blocks at the same time, it may cause a denial of service attack DDOS attack on the authorization server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public audit design method for multi-write model of cloud data security
  • Public audit design method for multi-write model of cloud data security
  • Public audit design method for multi-write model of cloud data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] This embodiment is designed to complete key distribution. The purpose of the key distribution is to distribute respective key materials to the cloud server CS, the third auditor TPA and the data owner DO. Including but not limited to the following steps (expressed in a table):

[0048] step content 100 The key server constructs an elliptic curve and Lagrangian interpolation function, and generates authentication and audit keys from the parameters of the elliptic curve. 102 The key server calculates the key material corresponding to the data owner DO according to the Lagrangian interpolation function, and distributes it to the data owner DO. 104 The key server calculates the key material corresponding to the cloud server CS according to the Lagrangian interpolation function, and distributes it to the data owner cloud server CS. 106 The key server distributes the key material corresponding to the third auditor TPA to the TPA.

...

Embodiment 2

[0056] The design of this embodiment completes the data writing stage. The purpose of this stage is: the data owner DO signs the data block and verifies the integrity of the signature. Including but not limited to the following steps (expressed in a table):

[0057] step content 108 The data owner DO signs the data block and sends the signature result and related data to the cloud server CS. 110 The cloud server CS checks the validity of the signature through an integrity check algorithm, thereby deciding whether the cloud server CS stores the data.

[0058] The protocol flow of this embodiment is as follows Figure 4 shown.

[0059] The steps and the protocol flowchart in Embodiment 2 are described as follows:

[0060] (1) Step 108: When a certain data owner ( is a collection of all data owners, represents an element in the collection) to give the block ( Represents the set of all data blocks) when signing (if the signature is ),...

Embodiment 3

[0063] This embodiment is designed to complete the multi-write model audit stage. The purpose of this stage is: to realize the audit of the shared data block set on the cloud server CS by the third auditor TPA. Including but not limited to the following steps (expressed in a table):

[0064] step content 112 The third auditor TPA selects a set of flag data and sends it to the cloud server CS. 114 After receiving the flag data, the cloud server CS uses the proof algorithm to generate Sent to the third auditor TPA. 116 The third auditing party TPA audits the data written by multiple data owners DOs using the verification algorithm.

[0065] The protocol flow of this embodiment is as follows Figure 5 shown.

[0066] The steps in Embodiment 3 and the protocol flow chart are described as follows:

[0067] (1) Step 112: When the third auditor TPA wants to audit the data written by multiple data owners DOs, he selects a set of appropriate f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a public audit design method of a cloud data security multi-writing model, which belongs to the technical field of cloud computing security. The method includes the following steps: (1) Key distribution stage, realizing the distribution of key material from the key server to the cloud server CS, the third auditor TPA and multiple data owners DOs. (2) Data writing stage, in this stage, multiple data owners DOs need to communicate with cloud server CS about stored data and signatures. (3) In the multi-write model audit stage, the third auditor TPA audits the shared data block set on the cloud server CS. The invention is a public audit method which can not only reduce the communication cost of the audit protocol, but also reduce the operation cost of the auditor. At the same time, it supports authorization and authentication of multi-writer data sources that cannot be supported by existing schemes, and satisfies the new security and high-efficiency features of multi-writer public audit.

Description

technical field [0001] The invention relates to a public audit design method of a multi-writing model for cloud data security, belonging to the technical field of cloud computing security. Background technique [0002] Nowadays, cloud computing is becoming more and more popular, and data in cloud computing is outsourced to the cloud. Its advantages are obvious: reducing the storage management burden of data owners, universal data access with independent geographic locations, and avoiding capital expenditures such as hardware, software, and personnel maintenance. However, outsourcing data can lead to new security concerns. The first problem is data integrity. The second problem is the unfaithful cloud server provider CSP. [0003] In order to solve these two problems, it is necessary to prove to the data owner and users that the cloud server provider CSP stores the data, and the data will not be modified by entities other than the data owner. Since the data is stored in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 万长胜周琳仇瑞腾
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products