Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key changing and signature updating method for cloud data audit

A cloud data and key technology, which is applied in key distribution, can solve the problems of high computing expenditure, wide application, and untrusted cloud service providers in DO, and achieve the effect of reducing communication overhead and ensuring security

Active Publication Date: 2014-06-25
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, outsourcing data creates new security concerns
The first problem is data integrity
The second problem is untrusted cloud service provider (CSP)
[0004] Existing verifiable storage schemes can provide good integrity protection for cloud data, but there is a resistance that prevents them from being widely used in cloud computing environments. When the data owner DO changes the expired key, DO must download Data block and signature, use the old key to confirm data integrity, generate a new signature with the new key, and upload the data block and new signature again
This will result in high communication expenditure for DO and cloud server CS and high computational expenditure for DO

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key changing and signature updating method for cloud data audit
  • Secret key changing and signature updating method for cloud data audit
  • Secret key changing and signature updating method for cloud data audit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0030] When the present invention performs key change and signature update on cloud data audit, it is mainly divided into three stages: (1) pre-update stage; (2) update stage; (3) post-update stage.

[0031] Among them, in the pre-update phase (BUP), the data owner (DO) calculates and generates the initial key and calculates the initial signature, and the cloud server (CS) calculates the initial integrity by the signature of the DO and the parameters accepted from the third-party audit (TPA) Prove the parameter P, and finally TPA will audit it.

[0032] In the update phase (UDP), DO selects a random number to generate a new key, calculates the key required to update the signature and sends it to CS, and CS calculates a new signature from the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key changing and signature updating method for cloud data audit. The method comprises the following steps of a before-updating stage, an updating stage and an after-updating stage. In the before-updating stage, a data owner generates an initial secret key and a signature through calculation, a cloud server obtains initial data integrity authentication parameters through calculation according to the signature of the data owner and parameters received from the third audit party, and the third audit party is used for auditing the initial data integrity authentication parameters. In the updating stage, a data owner selects a random number generation secret key, calculates a secret key needed by a shared updated signature and sends the secret key to the cloud server, and the cloud server calculates a new signature according to data and the received parameters. In the after-updating stage, the data owner generates a signature through calculation according to the new secret key generated in the updating stage, the cloud server calculates new date integrity authentication parameters, and the third audit party is used for audit. The scheme guarantees safety and reduces cost of communication between the data owner and the server end and calculation cost of the data owner.

Description

technical field [0001] The invention relates to a safe and verifiable technology for data storage in cloud computing, specifically a new key change and signature update scheme. Background technique [0002] Today cloud computing is becoming more and more popular, where data is stored externally to the cloud. Its advantages are obvious: it eases the user's storage burden, enables universal data access independent of geographic location, and avoids hardware, software, and personal maintenance resource expenditures. However, outsourcing data creates new security concerns. The first problem is data integrity. The second problem is untrusted cloud service providers (CSP). [0003] In order to solve these two problems, we need evidence to show data owners and users that the CSP can save the data and will not be changed by any individual other than the user, which is called storage correctness requirement in the field, and will be designed to meet The scheme for storing correct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/08
Inventor 金波陈长松裴蓓
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More