An Identity-Based Data Storage Method and Integrity Verification Method in Cloud Computing

A technology for integrity verification and data storage, applied in user identity/authority verification, electrical components, transmission systems, etc., to achieve efficient data integrity protection and security assurance, low communication overhead, and fewer rounds of interaction

Inactive Publication Date: 2017-10-17
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to propose a cloud data integrity verification system based on public key infrastructure (PKI) for the complexity of certificate management and the data privacy issues in the integrity verification system of public verification. Identity-based data storage and integrity verification methods in computing to ensure that cloud users do not need to verify the legitimacy of public key certificates before using the public key. The public key of cloud users is determined by their identity information (such as ID number, telephone number, E-mail address, etc.), the private key is generated by a trusted third-party server called the Key Generation Center (KGC)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Data Storage Method and Integrity Verification Method in Cloud Computing
  • An Identity-Based Data Storage Method and Integrity Verification Method in Cloud Computing
  • An Identity-Based Data Storage Method and Integrity Verification Method in Cloud Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0043] Based on the identity-based public key cryptography theory, the present invention proposes an identity-based data storage and integrity verification method in cloud computing, which is applied to a cloud storage environment with high security requirements. The cloud user uses the private key generated by the KGC server to calculate the data block label of the file to be uploaded to ensure the integrity of the data. When the cloud user wants to verify the integrity of the cloud data, the verification server uses the challenge response method to verify the data in the cloud server. data, in order to realize an efficient remote data verification mechanism and zero-knowledge privacy protection, the present invention uses aggregatable ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based data storage method and an integrity verification method in cloud computing, belonging to the technical field of network security. The storage method of the present invention is as follows: the cloud user sends a key application request carrying a public key generated based on its identity ID to the KGC server, and the KGC server generates the corresponding private key and sends it to the cloud user through a secure channel; The file is divided into blocks, and the data block label of each block is generated based on the private key, and the corresponding file label is generated from the data block label, and it and the file are uploaded to the cloud server. When it is necessary to verify the integrity of files on the cloud server, the identity-based integrity verification is realized based on the zero-knowledge proof between the verification server and the cloud server. The present invention is used for cloud storage and integrity verification of storage. The application of the present invention can significantly simplify certificate management and reduce system complexity; at the same time, it is not necessary to first verify the validity of the cloud user's public key during integrity verification. Simplifies the complexity of the system.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an identity-based data storage and integrity verification method in cloud computing. Background technique [0002] As an important innovation in information technology, cloud computing provides users with almost "unlimited capabilities" and "ubiquitous" information services. Cloud computing has the advantages of security, convenience, data sharing, and unlimited possibilities. Important means, cloud computing contains huge strategic value and industrial opportunities. [0003] Cloud storage is one of the most important services provided by cloud computing. Through virtualization technology, a large number of different types of storage devices in the network are combined to work together through application software, providing users with unlimited data storage and anytime, anywhere business visits. Users only need to pay a small fee to store their own data in the cloud,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/123H04L67/06H04L67/10
Inventor 禹勇薛靓臧力张亚芳倪剑兵李艳楠邱佳惠
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products