A user-oriented cloud storage data integrity protection method

A data integrity, user-oriented technology, applied in the field of dynamic data integrity protection and cloud storage systems, can solve the problems of saving verification labels occupying storage overhead, limited recovery capability, and the recovery capability and recovery range need to be improved, so as to save storage. Space, ensure security, good error correction and recovery effect

Inactive Publication Date: 2018-01-09
PEKING UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with the solution is that it is necessary to calculate the hash value of all data block data and store the verification tag during verification, which leads to the calculation of the hash value of all data for a part of a data block challenge and the storage of the verification tag takes up a lot of time. The problem of necessary storage overhead; in terms of data recovery, the scheme applies error correction code (ECC) to the granularity of the data block. Although it has certain recovery ability, the recovery ability and recovery range need to be improved
Erasure codes are used in the above EDS2 and HAIL schemes, and ECC (error-correcting code) is used in the FDPOR scheme. Compared with erasure codes, ECC is simpler to implement, but has limited recovery capabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user-oriented cloud storage data integrity protection method
  • A user-oriented cloud storage data integrity protection method
  • A user-oriented cloud storage data integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0134] There are two roles in the scheme, user and cloud storage platform. The user is responsible for preprocessing and other operations on the file, uploading the file to the cloud storage server, interacting with the cloud platform to update data, verify data, etc. The cloud storage platform consists of a cloud storage management node and multiple storage nodes. The cloud storage management node is responsible for managing the user's files, and all metadata of the files are stored on the management node. Cloud storage nodes are responsible for storing user data and computing algebraic signatures for specified data. The physical structure of the system is as Figure 4 shown.

[0135] ·user

[0136] The user is the owner of the file. In the file upload stage, he is responsible for dividing the file into blocks, performing erasure code encoding within and between blocks, encrypting the verification data, and calculating digital signatures for the data blocks; in the file up...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user-oriented cloud storage data integrity protection method. The method is as follows: 1) upload: the user end numbers the file in blocks, generates a redundant check code in the block; calculates the hash value of each file block, saves the hash value as a range-based 2‑3 tree, and These hash values ​​are concatenated into a value and signed with a private key; the inter-block redundancy check code is generated, and the inter-block redundancy check code is encrypted with the stream replacement key; 2) verification: the cloud management node sends the verification request to Corresponding to the cloud storage server, calculate the corresponding original data and the algebraic signature of the corresponding inter-block redundancy check code, and return it to the client for data integrity verification. If the data is found to be damaged, proceed to 3); 3) Recovery: the client According to the tree information, all the file blocks on the corresponding branch tree are obtained from the cloud, and the erasure code of the file block is used for error correction and recovery. The invention verifies and restores the integrity of the dynamic data stored in the cloud from the user's point of view.

Description

technical field [0001] The present invention proposes a dynamic data integrity protection method in a cloud storage environment——ECAS-FDPOR (Erasure Code and Algebraic Signatures-FDPOR), which verifies the integrity of dynamic data stored in the cloud from the user's perspective. When the data is damaged Ability to recover damaged data to a certain extent. The technical field of the present invention relates to cloud storage systems, data integrity, erasure codes, and algebraic signatures. Background technique [0002] The continuous development of Internet technology and the use of computer technology have opened a new era of cloud storage services. When users use cloud storage services, the cloud provider is responsible for data storage, organization, management, reliability, and availability guarantees, so that users do not have to build their own data centers and reduce user costs. However, while cloud storage technology brings great storage convenience to people, it a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64
Inventor 杨雅辉李晓晨沈晴霓吴中海方跃坚
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products