Data possession proof scheme

A technology of possession and data owner, applied in the field of information security, it can solve the problems of high computing overhead and extra storage space, and achieve the effect of avoiding exponential operations, improving execution speed and security, and reducing computing overhead.

Active Publication Date: 2016-01-06
SHANGHAI GUAN AN INFORMATION TECH
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Looking at the existing data possession proof PDP schemes, one of the existing problems is that the calculation overhead is large and requires a lot of additional storage space
Especially in the case of large amount of data, this problem will be more serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data possession proof scheme
  • Data possession proof scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] A data possession certification scheme of the invention will be described in detail below in conjunction with the accompanying drawings.

[0062] A data possession proof scheme, the main symbols used in the present invention are described as follows.

[0063] Owner: data owner.

[0064] CSP: Cloud Service Provider.

[0065] KeyGen: key generation module KeyGen.

[0066] TagGen: Tag generation module.

[0067] Challenge: challenge module.

[0068] ProofGen: Proof generation module.

[0069] Verification: Verification module.

[0070] M: Owner's outsourced data.

[0071] n: The number of data blocks, that is, M is divided into n fixed-size blocks.

[0072] m i : block of data in M, m i ∈M, 1≤i≤n.

[0073] : hash function with key.

[0074] : Data block label.

[0075] : Pseudorandom function under the action of key k.

[0076] : Pseudorandom permutation function under the action of key k.

[0077] : NRTU encryption algorithm.

[0078] Include the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data possessionproof scheme, belonging to the field of information security and being suitable for a cloud storage security management technology. In the scheme, a key generation module, a label generation module, a challenge module, a proof generation module and a verification module are included. The scheme only needs addition, subtraction, multiplication and modular arithmetic and supports modification and additional operations of data blocks, data possession proof of multiple duplicates and third-party verifiable data possessionproof. The scheme disclosed by the invention has the advantages of high security, low computational expense and low requirements for storage space and traffic, and provides a new research orientation for developing the data possession proof scheme.

Description

technical field [0001] The invention relates to a security management technology of cloud storage, in particular to a data possession certification scheme in a cloud environment, and belongs to the technical field of information security. Background technique [0002] In the era of big data, more and more owners are willing to entrust data management to cloud service provider CSP (Cloud Service Provider) to reduce the cost of owner data management. On the other hand, putting data on cloud servers will cause various data security issues. Since the CSP is not necessarily completely trustworthy, the CSP may conceal the data destruction and loss caused by improper management and other reasons from the Owner to evade responsibility. Proof of Data Possession PDP (Provable Data Possession) allows the Owner to verify whether the untrusted CSP has correctly saved the Owner's data, preventing the CSP from modifying or deleting data. [0003] Looking at the existing data possession p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/123H04L67/1097
Inventor 步山岳黄梦蝶于坤
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products