Shared data cloud audit method with identity tracking function

A technology for sharing data and identities, applied in the field of cloud computing security, can solve the problem of not being able to determine which member uploads

Active Publication Date: 2014-12-24
QINGDAO UNIV
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud only knows that the medical record data is uploaded by group members, but it cannot be sure which member uploaded it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared data cloud audit method with identity tracking function
  • Shared data cloud audit method with identity tracking function
  • Shared data cloud audit method with identity tracking function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention provides a shared data cloud audit system capable of tracking identities, which includes: a cloud module, a system management center module (SM for short), a group manager module (GM for short), a group member module, and an audit center module (TPA for short). ).

[0052] The cloud module provides storage resources for group member data, and the data is divided into n data blocks and stored in the cloud;

[0053] The system management center module generates various system parameters, the public and private keys of the user group, the private key of each group member and the key of the group administrator module;

[0054] The group administrator module maintains two lists, namely the identity-key list IKL and the identity-data block list IBL, which are used to track the identity of the data block owner when necessary, and the identity-key list saves the member identity and related keys, and the identity-data block list records the member's operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a shared data cloud audit method which adopts a shared data cloud audit system with an identity tracking function for identity tracking. The method includes: step one, system initialization; step two, data file uploading and auditing; step three, identity tracking; step four, member addition and removal. The shared data cloud audit system with the identity tracking function comprises a cloud module, a system management center module, a group administrator module, a group member module and an audit center module. According to the method, group members can upload data to the cloud in the name of a group, and accordingly identity privacy of data owners is protected; when cloud data are disputed, a group administrator can open identities of the data owners, so that the problem that the group members viciously upload wrong data is avoided; in addition, addition and removal of the group members are convenient.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a shared data cloud audit method capable of tracking identities. Background technique [0002] In recent years, with the continuous development of cloud computing technology and the increasing number of cloud service providers, cloud computing services have entered people's lives more and more deeply, and data storage in the cloud has also become a hot spot that people care about. Cloud computing has fundamentally changed the way resources are deployed and services are provided. This new computing model reduces the burden of personal storage management and avoids users' large investment in local software, hardware and maintenance. Users can store data remotely. Cloud, and enjoy high-quality applications and services in the cloud on demand. [0003] However, there are also many security threats to cloud storage, such as platform system vulnerabilities, sabotage b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 郝蓉于佳
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products