Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for document ownership certification

A technology of ownership and documentation, applied in the direction of electrical components, transmission systems, etc., can solve problems such as failure to reach the safety level, prominent efficiency problems, forged certification data, etc., and achieve high detection rate, guaranteed detection rate, and high efficiency.

Active Publication Date: 2018-05-01
ZTE CORP +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the impact of this role reversal is very large, because in the scenario of client-side data deduplication, the verifier (cloud storage server) cannot embed confidential data in the prover (client) in advance to meet the proof needs, which will As a result, both the POR and PDP solutions are unavailable in the new scenario
[0006] On the other hand, due to the use of the digest value, a new type of attack to obtain the ownership of the original file without authorization has just appeared, so there are only a few preliminary solutions to solve this type of attack, but these solutions are relatively preliminary and temporary. The security level of the proof; some schemes need to build the entire Merkle (hash tree) in the original data, and its efficiency problem is very prominent, and this scheme also fails to meet the following security requirements: the data content required to be sampled in each proof process are selected randomly, and it is required that in any case, the generated proof data must be different from any previous generated proof data
This will make it possible for an attacker to forge proof data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for document ownership certification
  • Method and device for document ownership certification
  • Method and device for document ownership certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0154] Phase 1: Initialization: The cloud storage server has the original file F, and divides the file into many blocks of the same size for storage.

[0155] Step 101: After the cloud storage server receives the request for storing the specified file sent by the client user, if it detects that the file has been stored locally, it selects a random number R c , and run the algorithm KeyDeriving(sk, R c )→{Key session , R seed1 , R seed2}, generate a session key (Key session ) and seed random number (R seed1 and R seed2 );

[0156] KeyDeriving(sk,R c ) is used to select two seed random numbers R seed1 ←(random){0, 1} k and R seed2 ←(random){0, 1}k , and generate the session key Key session = Hash sk (R c ), where sk is the symmetric key shared between the cloud storage server and the client, and R c ←(random){0, 1} k ; Output session key and seed random number: output(Key session , R seed1 , R seed2 );

[0157] (random) {0, 1} k Indicates that a string of 0 a...

Embodiment 2

[0187] Phase 1:

[0188] The cloud storage server divides the file F into f blocks b 1 ,... b f , and may distribute and store the f block files in f logically independent storage locations.

[0189] Step 201: When the cloud storage server that owns the original file F receives the request from the client to store the file, if it detects that the file has already been stored locally, then determine the symmetric key sk shared with the corresponding client, and generate a random number R c ←(random){0, 1} k , and then run the algorithm KeyDeriving(sk, R c ) to generate the new session key Key required for this challenge response session and two seed random numbers R seed1 and R seed2 ;

[0190] Step 202, the cloud storage server then sends the random number R c sent to the client, the client will run the same algorithm KeyDeriving(sk, R c ) to get the same session key Key session , and jointly calculate a hash value through the new session key and the current timestam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for proving file ownership. The method includes: after the cloud storage server receives a processing request from a client for a specified file, if it detects that the specified file has been stored locally, the cloud storage server sends the specified file to the client. Send a verification request, the verification request instructs the client to block the specified file, and perform file ownership verification with randomly designated one or more file block data; the cloud storage server receives the client After the verification proof is returned, the validity of the verification proof is checked. According to the invention, the security of the document ownership certificate can be improved.

Description

technical field [0001] The present invention relates to a method for proving ownership of data, and in particular to a method and device for proving ownership of original data by a client under the scenario of deduplicating data at the client in a cloud storage service. Background technique [0002] With the widespread application of cloud storage services, more and more business and personal data are stored on remote cloud storage servers. The ever-increasing amount of data requires related technologies to save disk space and network bandwidth. In this case, a new technology emerges at the historic moment: "data deduplication technology". In this technology, the cloud storage server only stores a copy of a file, no matter how many clients want to store or own the file; at the same time, all clients who own the file do not store the data, but only A link to the only copy of the file on the cloud storage server. Moreover, if the cloud storage server already has a copy of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 杨超陈小华马建峰李金库
Owner ZTE CORP