Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing

A technology for integrity verification and data storage, applied in user identity/authority verification, electrical components, transmission systems, etc., to achieve the effects of eliminating certificate management, low bandwidth consumption, and fewer rounds of interaction

Inactive Publication Date: 2015-07-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented inventor describes an improved way for storing digital certificatures on servers without requiring them be physically signed or encrypted beforehand. It also improves efficiency because it can generate signatures that protect against attacks from hackers who may compromise sensitive systems such as government agency databases. Overall, this innovation helps improve securely transmitting important documents over networks like email (text).

Problems solved by technology

Technological Problem addressed in this patents relates to improving the reliability and performance of digital assets like clouds while reducing resource usage and cost concerns associated with storing and managing these resources. Current solutions involve either expensive hardware systems or complicated algorithms requiring extensive technical expertise from the community involved. Additionally, none provide complete immune isolations guaranteeing full knowledge about the client device itself during execution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing
  • Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing
  • Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0043] Based on the identity-based public key cryptography theory, the present invention proposes an identity-based data storage and integrity verification method in cloud computing, which is applied to a cloud storage environment with high security requirements. The cloud user uses the private key generated by the KGC server to calculate the data block label of the file to be uploaded to ensure the integrity of the data. When the cloud user wants to verify the integrity of the cloud data, the verification server uses the challenge response method to verify the data in the cloud server. data, in order to realize an efficient remote data verification mechanism and zero-knowledge privacy protection, the present invention uses aggregatable ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data storage method based on an identity in cloud computing and an integrity verification method based on the identity in cloud computing, and belongs to the technical field of network security. The data storage method comprises the steps that a cloud user generates a secret key application request carrying a public key generated based on the ID of the cloud user, and sends the secret key application request to a KGC server, and a corresponding private key is generated by the KGC server and sent back to the cloud user through a secure channel; the cloud user conducts block division on files to be uploaded, and generates data block labels of data blocks on the basis of the private key, corresponding file labels are generated by the data block labels, and the file labels and the files are uploaded to a cloud server. When the integrity of the files on the cloud server needs to be verified, integrity verification based on the identity is achieved based on zero-knowledge proof between a verification server and the cloud server. The data storage method based on the identity in cloud computing and the integrity verification method based on the identity in cloud computing are used for cloud storage and integrity verification of storage. When the data storage method and the integrity verification method are applied, management of certificates can be remarkably simplified, and the system complexity is reduced; meanwhile, when integrity verification is conducted, the effectiveness of the public key of the cloud user does not need to be verified, and the system complexity is simplified.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products