Method for assigning verifier for auditing cloud storage data

A verifier, cloud storage technology, applied in the field of communication, can solve problems such as difficulties

Inactive Publication Date: 2015-10-21
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] What the present invention aims to solve is to propose a method for specifying verifiers to audit clou...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Describe technical scheme of the present invention in detail below:

[0052] The present invention mainly comprises the following steps:

[0053] a. System initialization, including:

[0054] a1. The data file is divided into blocks, and the security parameters of the lattice cipher algorithm and the safe hash function are set;

[0055] a2. The public-private key pair of the cloud user and the cloud server are respectively generated through the grid-based threshold generation algorithm, and the cloud user secretly selects the signature key;

[0056] a3. The cloud user generates the signature set of the data block through the linear homomorphic signature algorithm on the lattice, and obtains the data file label through the signature algorithm, and sends the signature set of the data block, the data file and the data file label to the cloud server;

[0057] b. Audit authorized agent, including:

[0058] b1. The cloud user designates a verifier, and calls the grid-based...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication, and specifically relates to a method for assigning an verifier for auditing cloud storage data. The method provided by the invention mainly comprises the steps that: firstly, a system performs block processing on a data file to generate a public and private key pair for each of a cloud user and a cloud server, the cloud user generates a signature of each data block and a data file tag, and a signature set of the data blocks, the data file and the tag of the data file are sent to the cloud server; the cloud user calls a lattice-based agent algorithm to calculate a public and private key pair for an assigned verifier according to the identity of the assigned verifier, and sends the public and private key pair to the assigned verifier safely; and finally, the assigned verifier generates an audit challenge information for the cloud server, the cloud server acquires an audit response prove according to the audit challenge information and sends the audit response prove to the assigned verifier, and the assigned verifier verifies the audit response prove according to a lattice signature verification method.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a method for designating a verifier to audit cloud storage data. Background technique [0002] With the development of network technology and the continuous increase of storage demand, cloud storage, as a new generation of storage mode, is gradually emerging and emerging. Although cloud storage has brought many conveniences to users, it also poses some security and privacy challenges. Although cloud service providers can provide storage devices with higher security, the storage of massive data on cloud servers makes the data more vulnerable to active attacks by attackers. For cloud service providers, due to some profit reasons, they may not truly reflect the storage of user data. For example: the cloud service provider may delete some data rarely accessed by users for profit reasons, or the cloud service provider conceals the loss of user data caused by him t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0825H04L63/083H04L63/0884H04L67/1097
Inventor 许春香张晓均张源金春花徐辰福
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products