Shared data cloud audit method that can track identities

A technology for sharing data and identities, applied in the field of cloud computing security, can solve the problem of not being able to determine which member uploads

Active Publication Date: 2017-11-21
QINGDAO UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud only knows that the medical record data is uploaded by group members, but it cannot be sure which member uploaded it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared data cloud audit method that can track identities
  • Shared data cloud audit method that can track identities
  • Shared data cloud audit method that can track identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention provides a shared data cloud audit system capable of tracking identity, which includes: a cloud module, a system management center module (SM for short), a group administrator module (GM for short), a group member module, and an audit center module (TPA for short) ).

[0052] The cloud module provides storage resources for group member data, and the data is divided into n data blocks and stored in the cloud;

[0053] The system management center module generates various system parameters, the public and private keys of the user group, the private key of each group member and the group administrator module key;

[0054] The group administrator module maintains two lists, namely the identity-key list IKL and the identity-data block list IBL, which are used to track the identity of the data block owner when necessary. The identity-key list stores members Identity and related keys, and the identity-data block list records that members have operated on the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a shared data cloud audit method with traceable identity by using the shared data cloud audit system with traceable identity, which includes: the first step, system initialization; the second step, data file upload and audit; the third step , identity tracking; the fourth step, adding and deleting members, the shared data cloud audit system capable of tracking identities, which includes: a cloud module, a system management center module, a group administrator module, a group member module and an audit center module. In this method, group members can upload data to the cloud in the name of the group, thereby protecting the identity privacy of the data owner. When cloud data is in dispute, the group administrator can open the identity of the data owner, avoiding the problem of malicious group members uploading wrong data. At the same time, you can easily add and delete group members.

Description

Technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a cloud audit method for shared data that can track identity. Background technique [0002] In recent years, with the continuous development of technology in the cloud computing field and the increasing number of cloud service providers, cloud computing services have entered people's lives more and more deeply, and the storage of data in the cloud has also become a hot spot of people's concern. Cloud computing has fundamentally changed the way of resource deployment and service provision. This new computing mode reduces the burden of personal storage management and avoids users’ heavy investment in local software, hardware and maintenance. Users can store data remotely. Cloud, and enjoy high-quality applications and services in the cloud on demand. [0003] But cloud storage also has many security threats, such as platform system vulnerabilities, deliberate sabotage by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 郝蓉于佳
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products