Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tamper detection method for text documents in cloud storage environment

A text document and document technology, applied in the fields of digital data protection, electronic digital data processing, program/content distribution protection, etc., can solve the problems of large visual impact, small capacity of watermark information carried by carrier files, and poor robustness, etc. Achieve the effect of covering a large amount of information, being easily tampered with, and ensuring security

Inactive Publication Date: 2014-12-24
DONGHUA UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have a greater visual impact on the user, and the capacity of the carrier file to carry the watermark information is small, which is not suitable for the user's needs for secondary editing of the document.
Moreover, the above method faces many problems such as difficulty in running the embedding algorithm of text digital watermark, poor robustness, and difficulty in detecting watermark information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper detection method for text documents in cloud storage environment
  • Tamper detection method for text documents in cloud storage environment
  • Tamper detection method for text documents in cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0053] Embodiment 1: Fig. 1 is the architectural diagram of the tampering detection method used on the server side, which includes two sub-graphs, Figure 1a and Figure 1b . in, Figure 1a is an architectural diagram of the tamper detection method used when a user stores a document on the server side, Figure 1b is an architectural diagram of a tamper detection method used when a user reads a document from the server side.

[0054] Referring to Fig. 1, this solution includes three entities: user 1-1, client 1-2, and server 1-3. User 1-1 can implement the following operations on client 1-2: create new document 1-4, edit document 1-5, temporarily save the document and fingerprint in temporary file system 1-6, and access the server through browser 1-7 1-3. Specifically, the browser 1-7 is the medium through which the user 1-1 accesses the server 1-3 at the client 1-2. In addition to providing the user with an auxiliary storage space, that is, a cloud disk 1-8, the server 1-3...

Embodiment approach 2

[0058] Embodiment 2: Fig. 2 is the architectural diagram of the tamper detection method used by the client, which includes 2 sub-graphs, Figure 2a and Figure 2b . in, Figure 2a is an architectural diagram of the tamper detection method used when a user stores a document, Figure 2b is an architectural diagram of a tamper detection method used when a document is read by a user.

[0059] Referring to Fig. 2, this solution also includes three entities: user 2-1, client 2-2, and server 2-3. The user 2-1 can implement the following operations on the client 2-2: create a new document 2-4, edit a document 2-5, store documents and fingerprint files in the temporary file system 2-6, and access the server 2 through the browser 2-7 -3, using the tamper detection method 2-9 to calculate the fingerprint module 2-10 and compare the fingerprint module 2-11. The server 2-3 provides the user with an auxiliary storage space, that is, a cloud disk 2-8.

[0060] The specific implementati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tamper detection method for text documents in a cloud storage environment and two embodiments of the tamper detection method, namely an application of the method on a cloud server side and an application of the method on a client side. Executing processes of the tamper detection method include firstly, calculating documents uploaded to the cloud server side and documents downloaded to the client side to acquire a plurality of digital sequences called as fingerprints; secondly, comparing the fingerprints of the documents according to results of two calculations, if the comparison result is 'equal', then determining that the documents are not tampered, otherwise, continuing to compare section fingerprints with sentence fingerprints and positioning specific sentences which are tampered. Implementing processes of the method on the cloud service side include calculating the fingerprints respectively and comparing the fingerprints acquired by the two calculations after the documents are uploaded to the server side and before the documents are downloaded to the client side. By the tamper detection method, document tamper detection is achieved accurately and rapidly, tampered location can be positioned precisely, and low load is brought to the server side, the client side and the network bandwidth.

Description

technical field [0001] The invention relates to a method for detecting tampering of a text document, in particular to a method for detecting whether a text document stored in a cloud server has been tampered with by others. Background technique [0002] With the rapid development of the Internet and the popularization of portable Internet devices (such as mobile phones, notebooks, tablet computers, etc.), people's demand and dependence on Internet online services are becoming stronger and stronger, and cloud storage is an Internet-based solution to users Services that provide online storage are widely used by people. Users don't need to understand the tedious technical details behind cloud storage, and they can use it and get it on demand. At present, there are more and more cloud storage products on the market, such as Microsoft SkyDrive, Huawei DBank, Qihoo 360 cloud disk, CoolCloud, etc. In order to eliminate users’ security concerns about whether the data stored in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10
CPCG06F21/16G06F21/64G06F2221/2107
Inventor 刘国华王柠卢婷
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products