Remote data completeness verification method facing cloud storage

A technology of integrity verification and remote data, applied in the field of remote data integrity verification, can solve the problems of data owner data leakage, not suitable for practical engineering applications, information leakage, etc.

Active Publication Date: 2014-04-02
HANGZHOU YUANTIAO TECH CO LTD
View PDF4 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in these schemes, it is still possible for an attacker to use the public verification protocol to collect enough information to crack the data a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote data completeness verification method facing cloud storage
  • Remote data completeness verification method facing cloud storage
  • Remote data completeness verification method facing cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solution of the present invention will be further described in detail below with reference to the drawings and embodiments. The following examples are implemented on the premise of the technical solution of the present invention, and detailed implementation manners and processes are given, but the protection scope of the present invention is not limited to the following examples.

[0039] In order to better understand the method proposed in this embodiment, a data integrity verification event of the file stored on the cloud storage server CSS by the user U in a cloud storage environment is selected.

[0040] Such as the structure diagram of the method of the present invention ( figure 1 ), the specific implementation steps of this embodiment are as follows:

[0041] 1 System initialization

[0042] The system runs the bilinear Diffie-Hellman (Bilinear Diffie-Hellman, BDH) parameter generator to generate two bilinear groups G, G with the order of prime q t , g is t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a remote data completeness verification method facing cloud storage. According to the method, the aggregate signature and specified certifier signature technology is utilized, the verification function on the user data completeness by users and the third party auditors is realized, and meanwhile, the information of users for data completeness is enabled not to be leaked; the verification information transparency control is realized through the zero knowledge proving technology, and when the dispute exists between the users and a server, the third party auditors can generate the undeniable high-confidence-degree proving through the non-interactive zero knowledge proving technology. According to the method, under the condition that a cloud storage service provider is incredible, the accuracy of the cloud data completeness verification can also be ensured, and the method provided by the invention has the advantages that the realization is easy, the cost is low, the data protection performance is high, the third party audit is supported, the privacy protection mechanism is flexible, and the like.

Description

Technical field [0001] The present invention relates to a remote data integrity verification method for cloud storage, and specifically relates to providing safe and efficient data in cloud storage, supporting public authentication, and third-party verification based on data integrity verification, designated prover signature and zero-knowledge proof theory. Verification and integrity verification methods with privacy protection belong to the field of information security technology. Background technique [0002] Cloud computing data service outsourcing can reduce the local storage and maintenance pressure of data owners. However, while cloud computing brings convenience to users, it also brings new security challenges to user data. Since users have lost physical control over data reliability and security, data integrity in cloud storage has become one of the security issues that users worry about. Due to the huge communication cost caused by large-scale data, it is impossible f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64H04L29/06
CPCG06F21/645G06F2221/2115H04L63/123
Inventor 夏莹杰夏伏彪刘雪娇王贵林
Owner HANGZHOU YUANTIAO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products