Method for testing integrity of cloud storage data

A technology of data integrity and verification methods, applied in the field of cloud storage data integrity verification, can solve problems such as lack of computing capability for periodic verification of cloud data integrity, program security threats, and inability to guarantee fairness.

Inactive Publication Date: 2015-10-21
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the cloud server utilizes more secure storage technology and provides more reliable storage devices, in the actual cloud environment, there are many malicious adversaries who try to tamper with or destroy the data stored on the cloud server for their own interests. user data on
[0005] 2. Internal Security Threats
First, users may not have the computing power to periodically check the integrity of cloud data
Second, users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for testing integrity of cloud storage data
  • Method for testing integrity of cloud storage data
  • Method for testing integrity of cloud storage data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Describe technical scheme of the present invention in detail below:

[0067] The present invention mainly comprises the following steps:

[0068] System initialization phase: the system generates the necessary public parameters, and generates the user's signature key and corresponding authentication key.

[0069] User data processing stage: the user names the file to be outsourced for storage, calculates a file label, divides the file into n data blocks, and then signs each data block using a certificate-free aggregate signature algorithm. Finally, upload the file, file label, and all corresponding signatures to the cloud server. After receiving the data, the cloud server verifies whether the data is uploaded correctly.

[0070] TPA audit cloud server stage: In order to verify the integrity of outsourced data stored on the cloud server, TPA first generates a challenge message and sends the challenge message to the cloud server. After receiving the challenge informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of communication technology, and specifically relates to a method for testing integrity of cloud storage data. The method provided by the invention mainly comprises: a system initializes and allocates a signature key and a corresponding authentication key to a user; the user uploads storage data to a cloud server; an independent third party auditor tests the integrity of the storage data stored on the cloud server; and the user judges the test correctness of the third party auditor. The process provided by the invention has the following advantages: the third party auditor needs no user management certificate, namely TPA faces no certificate management problem; moreover, the method in the scheme can be used for effectively resisting malicious third party auditors, and when the third party auditor deviates correct protocol contents, the security of the scheme will not be threatened, and the third party auditor cannot successfully cheat the cloud user and (or) the cloud server.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a non-certificate checking method for cloud storage data integrity capable of resisting malicious auditors. Background technique [0002] Cloud computing is the next-generation information technology (IT) architecture that is most concerned by academia and industry. It has many characteristics that many IT technologies that have been maturely applied in the industry so far do not have many features, such as: on-demand access to self-service services, ubiquitous network access, location-independent resource pools, rapid scaling of resources, pay-per-use, and risk transfer. Cloud computing brings together huge computing resources, storage resources and other service resources, provides users with a variety of novel, convenient and reliable services, and brings huge business opportunities and benefits to cloud service providers. Among many services, cloud storage ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 许春香张源张晓均金春花温俊伟
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products