Cloud Data Integrity Verification Method for Multi-Geographical Location Storage
A technology of data integrity and geographic location, applied in the field of information security, can solve the problems of low efficiency and high computational overhead, and achieve the effect of reducing the amount of computation, the amount of computation, and the amount of data transmitted.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] Symbols and Abbreviations
[0052] F is the original file;
[0053] F' is the file obtained after symmetric encryption and adding redundant codes;
[0054] n is the block number of the ciphertext file;
[0055] s is the number of sections of each file;
[0056] k enc is the key value used for symmetric encryption;
[0057] k tag for k prf and sk r collective name;
[0058] k prf is the key value used to generate tags;
[0059] sk r The key value used by the data center to re-encrypt the label;
[0060] User is the file owner;
[0061] Provider is a cloud storage service provider;
[0062] Storage is a file storage server;
[0063] L is a landmark server that challenges the file storage server;
[0064] C is a set of file storage servers selected by the file owner to meet its requirements;
[0065] σ i The data label generated for the i-th block of data;
[0066] σ ρ,i is the new label obtained by re-encoding the data center ρ for the i-th block of dat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


