Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User-oriented cloud storage data integrity protection method

A data integrity, user-oriented technology, applied in the field of cloud storage systems and dynamic data integrity protection, can solve the problems of storage overhead, limited recovery capability, and the recovery capability and recovery range need to be improved, so as to save storage. Space, ensure security, good error correction and recovery effect

Inactive Publication Date: 2016-02-10
PEKING UNIV
View PDF2 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with the solution is that it is necessary to calculate the hash value of all data block data and store the verification tag during verification, which leads to the calculation of the hash value of all data for a part of a data block challenge and the storage of the verification tag takes up a lot of time. The problem of necessary storage overhead; in terms of data recovery, the scheme applies error correction code (ECC) to the granularity of the data block. Although it has certain recovery ability, the recovery ability and recovery range need to be improved
Erasure codes are used in the above EDS2 and HAIL schemes, and ECC (error-correcting code) is used in the FDPOR scheme. Compared with erasure codes, ECC is simpler to implement, but has limited recovery capabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User-oriented cloud storage data integrity protection method
  • User-oriented cloud storage data integrity protection method
  • User-oriented cloud storage data integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0134] There are two roles in the scheme, user and cloud storage platform. The user is responsible for preprocessing and other operations on the file, uploading the file to the cloud storage server, interacting with the cloud platform to update data, verify data, etc. The cloud storage platform consists of a cloud storage management node and multiple storage nodes. The cloud storage management node is responsible for managing the user's files, and all metadata of the files are stored on the management node. Cloud storage nodes are responsible for storing user data and computing algebraic signatures for specified data. The physical structure of the system is as Figure 4 shown.

[0135] ·user

[0136] The user is the owner of the file. In the file upload stage, he is responsible for dividing the file into blocks, performing erasure code encoding within and between blocks, encrypting the verification data, and calculating digital signatures for the data blocks; in the file up...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user-oriented cloud storage data integrity protection method. The method includes the steps of 1, uploading, wherein a user side segments and numbers a file to generate intra-block redundancy check codes, the hash value of each file block is calculated and saved as a range-based 2-3 tree, the hash values are linked into one value and signed with private keys, and inter-block redundancy check codes are generated and encrypted with stream substitution secret keys; 2, verification, wherein a cloud management node sends a verification request to a corresponding cloud storage server, corresponding original data and algebraic signatures of the inter-block redundancy check codes corresponding to the original data are calculated and returned to the user side for data integrity verification, and the step 3 is executed if data destruction is found; 3, recovery, wherein the user side acquires all the file blocks on corresponding branch trees from a cloud side according to tree information and performs error recovery on the file blocks through erasure codes of the file blocks. According to the method, integrity verification and recovery are performed on the dynamic data stored in the cloud side from the user perspective.

Description

technical field [0001] The present invention proposes a dynamic data integrity protection method in a cloud storage environment—ECAS-FDPOR (Erasure Code and Algebraic Signatures-FDPOR), which verifies the integrity of dynamic data stored in the cloud from the user's perspective, and can protect the damaged data when the data is damaged. Data recovery to a certain extent. The technical field of the present invention relates to cloud storage systems, data integrity, erasure codes, and algebraic signatures. Background technique [0002] The continuous development of Internet technology and the use of computer technology have opened a new era of cloud storage services. When users use cloud storage services, the cloud provider is responsible for data storage, organization, management, reliability, and availability guarantees, so that users do not have to build their own data centers and reduce user costs. However, while cloud storage technology brings great storage convenience ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
Inventor 杨雅辉李晓晨沈晴霓吴中海方跃坚
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products