Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for verifying storage integrity of target data

A technology for target data and integrity, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve problems such as consuming large computing resources, and achieve the effect of ensuring privacy, confidentiality, and avoiding hidden dangers of information leakage.

Active Publication Date: 2017-07-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for users with a large amount of cloud data, it takes a lot of computing resources to perform cloud data integrity confirmation, which is unbearable for users with limited computing power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for verifying storage integrity of target data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] see figure 1 , the method for verifying the storage integrity of the target data provided by the embodiment of the present invention includes the following steps:

[0023] S1. Process the target data to generate a message authentication code list, the message authentication code list includes a mark that can uniquely identify the target data, a key, and a key to calculate the target data The obtained first message authentication code;

[0024] Usually, different users will store a large amount of data in the cloud server. If you want to verify the integrity of specific data according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for verifying storage integrity of target data includes the following steps: processing the target data to generate a message authentication code list, in which a tab for identifying the target data, a secret key, and a first message authentication code calculated using the serect key are included; generating a verification evidence based on the message authentication code list, which is used as an authorization basis for authorizing a third party to check the target data; calculating a second message authentication code for the target data in a storage state using the secret key based on the verfication evidence, wherein the calculating method for the second message authentication code is the same as that of the first message authentication code; and comparing the first message authentication code with the second message authentication code, to verify the storage integrity of the target data. The abovementioned method can ensure the privacy of the target data when the third party verifies the data. The present invention further relates to a system for verifying the storage integrity of the target data.

Description

technical field [0001] The invention relates to a method and system for verifying the storage integrity of target data. Background technique [0002] With the continuous development and popularization of cloud storage technology, more and more users will store their important data in cloud servers. However, users are faced with many risks when storing a large amount of data on cloud servers. One of the most important risks is data integrity, that is, users cannot be sure whether their data stored in the cloud has been deleted or tampered with. [0003] In order to ensure the integrity of cloud data, cloud servers often need to provide an integrity confirmation function. However, for users with a large amount of cloud data, it takes a lot of computing resources to perform cloud data integrity confirmation, which is unbearable for users with limited computing power. Contents of the invention [0004] In view of this, it is necessary to provide a method and system for verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 钟焰涛
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD