Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree

An integrity verification, cloud data technology, applied in the field of cloud storage, can solve the problem of tree structure degradation, failure to consider MerkleHashTree balance, data confidentiality defects, etc., to avoid degradation and improve time efficiency.

Inactive Publication Date: 2015-11-25
WUHAN UNIV OF SCI & TECH
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) TPA cannot bring flaws to data confidentiality
However, the existing insertion method does not take into account the balance of MerkleHashTree, so it will cause the tree structure to degenerate into a linear structure, reducing the time efficiency of dynamic modification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree
  • Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree
  • Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] specific implementation plan

[0047] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0048] please see figure 1 A method for verifying the integrity of dynamic cloud data based on a balanced Macon hash tree provided by the invention, comprising the following steps:

[0049] Step 1: Define the bilinear map e: G×G=G T , where G is a Diffie-Hellman group, G T is another prime factor multiplicative cyclic group, and g is defined as the generator of G;

[0050] Step 2: The client selects a random value α←Z p ,Z p is a prime number, calculate v←g a , and define key sk=α, public key pk=v;

[0051] Step 3: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method for dynamic cloud data integrity based on a balanced Merkle Hash tree. The verification method comprises following steps: achieving dynamic correction of files by partitioning uploaded files; signing each partitioned file as a leaf node in order to establish the balanced Merkle Hash tree in order to achieve dynamic audit of files; and introducing the idea of a balanced binary tree in order to increase time efficiency of dynamic audit and avoiding degeneration of the Merkle Hash Tree by different rotation modes.

Description

technical field [0001] The invention belongs to the technical field of cloud storage, and relates to dynamic data and a data integrity verification method, in particular to a dynamic cloud data integrity verification method based on a balanced Macon hash tree. Background technique [0002] Storage-as-a-service offered by Cloud Server Providers (CSPs) is a service that allows organizations to store important data on remote servers. [0003] Thanks to cloud computing, users can store data remotely on the cloud and enjoy high-quality services and applications from a configurable shared computing resource. But in fact, users do lose the real possession of outsourced data, which makes data integrity verification in cloud computing a challenge, especially in an environment where users have limited computing power. Therefore, it is even more important to allow data to be publicly audited. So users can let the third party audit TPA to audit the integrity of the data. TPA needs to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 金瑜陈泉涂兆峰
Owner WUHAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products