Public auditing method with privacy protection for shared data of multi-manager group

A technology for data sharing and privacy protection, applied in the field of cloud storage and information security, it can solve problems such as framing of innocent users and cover-up of malicious users, and achieves the effect of eliminating hidden security risks, reducing audit costs, and achieving traceability.

Active Publication Date: 2015-10-28
NANJING UNIV OF SCI & TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, in the existing public audit schemes with privacy protection, the identity tracking process of users is implemented by a single entity (for example, a s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public auditing method with privacy protection for shared data of multi-manager group
  • Public auditing method with privacy protection for shared data of multi-manager group
  • Public auditing method with privacy protection for shared data of multi-manager group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The system model of the inventive method is as figure 1 As shown, there are three types of entities: cloud server, third party auditor TPA (the Third Party Auditor) and group users, and group users include multiple group managers GMs (Group Managers) and some ordinary users U. When the user needs to check the integrity of the shared data, the user sends an audit request to the TPA, and then the TPA sends an audit challenge message to the cloud server. After the cloud server receives the challenge, it will generate audit evidence and return it to TPA. TPA then verifies the correctness of the audit evidence and returns the audit results to the user.

[0037] The public audit method with privacy protection in the multi-manager group shared data of the present invention can support the multi-manager group user model, while ensuring the integrity of outsourced data, it can realize the identity privacy protection of group users, when it is necessary to track When the identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public auditing method with privacy protection for shared data of a multi-manager group, which comprises the steps of (1) system establishment; (2) user registration; (3) user cancellation; (4) data signature generation; (5) audit challenge; (6) audit certification; (7) audit verification; and (8) user tracking. According to the invention, a homomorphous verifiable group signature scheme supporting multiple managers is constructed based on a forward-security cancelable group signature and (t, s) secret sharing, thereby having high efficiency; the integrity of outsourced data is confirmed in allusion to a cloud server; and the identity privacy of group users is protected in allusion to an auditor, the identity of the users is traceable, and the whole tracing process is fair, so that the users are not maliciously framed.

Description

technical field [0001] The invention relates to the fields of cloud storage and information security, in particular to a public audit method with privacy protection in multi-manager group shared data. Background technique [0002] With more and more data sharing applications, such as iCloud, Google Doc, etc., users can store data on the cloud and share it with other users. However, because the cloud server is "semi-trusted", and the user loses control of the data locally, it is impossible to determine whether the data stored in the cloud server is intact. Therefore, how to efficiently verify the integrity of user-stored data without a local copy of the data is an urgent problem to be solved. [0003] To this end, researchers have proposed the concept of cloud storage data integrity audit and proposed many audit schemes for verifying data integrity. In particular, in the process of auditing, in order to reduce the burden on users, third-party auditors can be introduced to h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/123H04L67/1097
Inventor 付安民秦宁元宋建业苏铓张功萱
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products