Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method

A technology for integrity detection and cloud storage, applied in the field of cloud storage security, which can solve problems such as computational and communication costs, inability to apply to cloud storage environments, and security issues

Active Publication Date: 2015-09-30
建投数据科技(山东)有限公司
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the shared data group, the key of the group member may be lost and cannot be recovered due to hardware failure, loss of mobile device, etc. If the traditional method is used, a new key needs to be redistributed to the member whose key is lost, and then It is necessary to download all the data of this user from the cloud and re-sign the data with a new key, otherwise there will be security issues
However, this will cost intolerable computational and communication overheads and cannot be applied to cloud storage environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method
  • Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method
  • Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following examples are used to describe the implementation of the present invention in detail, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[0056] One, the relevant theory applied in the present invention

[0057] (1) Bilinear pairing

[0058] Let G 1 ,G 2 is the multiplicative group of two order prime numbers q, if the mapping satisfy the following properties:

[0059] 1) Bilinear: For ∀ P , Q ∈ G 1 , a , b ∈ Z q * ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud storage integrity detection method for recovering lost secret keys, and a system applying the cloud storage integrity detection method. The system comprises a parameter generation center module, a cloud module, a secret key distribution center module, a group member module and an audit center module. Through the adoption of the system, when the secrete keys of members in a group are lost, the conditions that new secrete keys are regenerated and signatures are regenerated for part of data can be avoided; the secrete keys can be verified, namely, each member in the group can verify whether the secrete key sent by a secrete key distribution center is correct or not, and the user of which the secrete key is lost can also verify whether the share, sent by other t+1 members in the group, is correct or not, so as to avoid the condition that the secret key distribution center or the user distributing the share to the user of which the secrete key is lost is dishonest; when the secrete keys are recovered, the secrete keys of the members are blinded, so that all the members do not know the secrete keys of the others. Therefore, the secrete key recovering safety is improved, and a cloud is prevented from being framed by malicious users.

Description

technical field [0001] The invention relates to the technical field of cloud storage security, in particular to a cloud storage integrity detection method and system capable of recovering lost keys. Background technique [0002] In recent years, with the rapid development of Internet technology and the increasing number of cloud service providers, cloud computing services have entered people's lives more and more deeply, and data storage in the cloud has also become a hot spot of concern. Today, with the development of the network and the advancement of technology, a large number of interactive applications and massive data will be generated in life, and these data require a large amount of software and hardware for storage and calculation, and the maintenance cost of the data is very high. As an important application form of cloud computing, cloud storage can provide low-cost and convenient large-scale storage services to store and manage data for users. Users can use serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/123H04L67/1097
Inventor 于佳沈文婷郝蓉
Owner 建投数据科技(山东)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products