Cloud-storage data lightweight-level public auditing method with privacy protection

A privacy-protecting, lightweight technology that is applied in the field of communications and can solve problems such as poor confidentiality and the inability to guarantee the integrity and correctness of user data

Inactive Publication Date: 2014-09-03
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiments of the present invention is to provide a method for lightweight public auditing of cloud storage data with privacy protection...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-storage data lightweight-level public auditing method with privacy protection
  • Cloud-storage data lightweight-level public auditing method with privacy protection
  • Cloud-storage data lightweight-level public auditing method with privacy protection

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0073] The symbols used in the implementation are described in the table below:

[0074]

[0075]

[0076] The specific steps are:

[0077] (1) System initialization: define a P The elliptic curve E on , where p is a large prime number, set P to be a point where the upper order of E is a prime number q, and P is a cyclic group generator of , and The discrete logarithm problem on is intractable;

[0078] 1) From Z q Randomly select a value x, and calculate Q=xP, generate an elliptic curve-based signature algorithm public key K={(p,q,E,P,x,Q):Q=xP}, private key x;

[0079] 2) The system generates a lightweight symmetric encryption algorithm f, the symmetric key is τ, and τ is shared by the user and TPA;

[0080] 3) The system then randomly generates a public-private key pair (spk, ssk) of a lightweight signature algorithm, and sets a secure hash function h: → Z q ;

[0081] (2) Signature steps:

[0082] The user first sets the data file F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud-storage data lightweight-level public auditing method with privacy protection. The method comprises the steps of system initialization, signature, auditing certification, and auditing certification verification. The method uses a modified digital signature algorithm based on an elliptical curve, the security of the method depends on the discrete logarithm problem of a finite group of the elliptical curve, and the method is characterized by low signature length, small storage space and high computation speed, and is especially suitable for occasions with lightweight-level computation amount, limited storage space and high-efficiency realization. The method of the invention is simple and convenient to operate, solves the problems that cloud-storage data public auditing and present cloud-storage data are low in privacy and the completeness and accuracy of user data cannot be ensured, and ensures that original user data is not leaked out to a cloud server or a public auditor.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method for lightweight public auditing of cloud storage data with privacy protection. Background technique [0002] Cloud computing is an emerging service model, which has attracted extensive attention from academia and business circles in recent years. Cloud computing brings together various computing resources, storage resources, and software resources to form a large-scale shared virtual resource pool to provide software, hardware, and data storage services for remote computer users. Users can store their massive data on the cloud server, and the cloud server provides effective services according to the needs of users. This service mode greatly reduces the pressure on storage management and enables remote data access regardless of region. With the rapid development of cloud computing, more and more users will store data on the cloud. [0003] After the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/00H04L9/32G06F21/64
Inventor 许春香张晓均刘小培赵继宁张秀洁张源
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products