Bilinear pairing-free cloud storage data security audit method

A data security, bilinear pairing technology, applied in electrical components, transmission systems, etc., can solve the problems of inability to obtain the original secret information of users and high computational cost

Inactive Publication Date: 2014-09-10
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wang et al. used random masking code technology to effectively solve the privacy problem of user data, so that even if TPA obtains the audit proof information from the cloud server, it cannot obtain the original secret information of the user.
However, these schemes all require the expensive bilinear pairing operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bilinear pairing-free cloud storage data security audit method
  • Bilinear pairing-free cloud storage data security audit method
  • Bilinear pairing-free cloud storage data security audit method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Step of the present invention is divided into 4 parts:

[0032] System initialization: the system divides the data file into blocks to generate a pseudo-random number generator and a pseudo-random function. The system then selects a lightweight symmetric cryptographic algorithm and a secure hash function.

[0033]Signature steps: the user first calls the pseudo-random number generator and the pseudo-random function to generate the matching coefficient used to generate the homomorphic message authentication code of the data block, uses the Schnorr variant signature algorithm to sign it, and then calls a lightweight symmetric cryptographic algorithm to Each data block is cryptographically blinded. Finally, the signature set of the homomorphic message authentication code and the blinded data file are sent to the cloud server, and the signature set and the original data file are deleted on the client side.

[0034] Audit proof generation steps: When the user sends audit r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a bilinear pairing-free cloud storage data security audit method. A user uploads own data blocks to a cloud server after encrypting in order to prevent data information from being leaked. Meanwhile, the user allows a trustable auditor to audit data, and makes sure that the data information is not leaked to the trustable auditor. According to the data audit scheme, the cloud storage data can be audited safely without great bilinearity.

Description

technical field [0001] The invention relates to data security audit technology, in particular to the security audit of cloud storage data. Background technique [0002] Cloud storage, as an important part of cloud computing, can free individual or business users from the shackles of their own resources and enjoy many conveniences: (1) reduces the pressure of storage management; (2) can realize data independent of the location (3) Reduce the cost of hardware and software purchase and resource maintenance. It is believed that with the rapid development of cloud computing, more users will store their data in the cloud. However, it is this centralized and outsourced data storage model that makes cloud storage technology bring benefits to people, but also raises concerns about data security. [0003] In order to solve the security problem of cloud storage data, we need to conduct security audit on the data stored on the cloud. In practical applications, users have limited comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 许春香陈文杰张晓均金春花张源
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products