Cloud storage data security auditing method allowing group-user identity revocation

A data security and user identity technology, applied in the field of data security, can solve problems such as indistinguishability and loss of cloud users

Inactive Publication Date: 2014-01-08
BEIHANG UNIV
View PDF3 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when a user discovers through audit that the cloud server has deleted certain data that the user rarely accesses, he or she can file a lawsuit against a fair third party; at this time, the cloud server randomly selects data and uses the private key of the current group of users to calculate the signature, and then submits it to the The fair third party claims that the data stored by the user is intact; at this time, the fair third party cannot distinguish whether the data and signature submitted by the cloud server are generated by the cloud user or the cloud server, thus causing losses to the cloud user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data security auditing method allowing group-user identity revocation
  • Cloud storage data security auditing method allowing group-user identity revocation
  • Cloud storage data security auditing method allowing group-user identity revocation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in combination with specific embodiments.

[0043] A cloud storage data security audit method that allows group user identity revocation, specifically as follows:

[0044] 1.1 Meaning of the symbols used in the method

[0045] M represents the shared data stored in the cloud server, which consists of n data blocks m 1 ,…,m n Composition; n represents the total number of blocks of shared data; d represents the total number of users in the group;

[0046] Order G 1 and G 2 Respectively represent the cyclic group of order p, g is G 1 A generator of , w is G 1 A random element in . p is a prime number with a length of 160 bits; q is a prime number much smaller than p with a length of 64 bits;

[0047] H represents a one-way hash function, and the definition mapping is H:{0,1} * →G 1 , where G 1 is a cyclic group whose order is a prime number p; H' is a collision-resistant hash function, and the definition mapp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud storage data security auditing method allowing group-user identity revocation. The cloud storage data security auditing method comprises the following six steps: (1) generating keys (KeyGen); (2) calculating resign keys (ReKey); (3) generating signs (Sigh); (4) generating resigns (ReSign); (5) generating proofs (GenProof); (6) checking the proofs (CheckProof). Not only can shared data be effectively audited by a third party auditor after group-user identities are revoked, but also the security of the method is further enhanced compared with the existing method for solving a public auditing protocol allowing group-user identity revocation. As a result, the method disclosed by the invention can enhance the confidence of people in cloud storage security and further promote the health development of cloud storage environments.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a cloud storage data security audit method that allows group user identities to be revoked. Background technique [0002] With the development of Internet and computing technology, people's life has quietly entered the "cloud era". Being in the "cloud", all kinds of information people want are at their fingertips, and they can use almost unlimited software and hardware resources on demand like tap water. Cloud computing has truly brought human beings into the information age. However, while cloud computing brings us a lot of convenience, it also faces many security challenges. If it cannot be solved well, it will seriously affect the development of cloud computing. [0003] Cloud storage is an important form of "Infrastructure as a Service" (Infrastructure as a Service, IaaS) in cloud computing, which provides storage resources as services to users through the Internet. W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32
Inventor 郭华李舟军
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products