Integrity verification method based on active attack resistance in cloud storage

An active attack and cloud storage technology, applied in the field of communication security, can solve problems such as being unable to resist active attacks, and achieve the effect of reducing communication traffic

Active Publication Date: 2016-04-13
XIDIAN UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a data integrity verification method that resists active attacks in view of the security problems existing in the above-mentioned prior art that cannot resist active attacks, so as to avoid data integrity verification in the process of completing data integrity verification and dynamically updating data. Malicious tampering of data, improving the ability to resist active attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity verification method based on active attack resistance in cloud storage
  • Integrity verification method based on active attack resistance in cloud storage
  • Integrity verification method based on active attack resistance in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings.

[0034] refer to figure 1 , the implementation steps of the present invention are as follows:

[0035] Step 1, user initialization.

[0036] (1a) Chunk the file:

[0037] When the user needs to send the local file F to the cloud service provider CSP, the user first needs to perform the block operation of the file. The file block technology includes uniform block technology, overlapping block technology, and variable length block technology. The example selects the uniform block technology, that is, the user needs to divide the file F to be stored into n blocks evenly, and set the length of the file F to be L to generate a block file The length of each block is When the last block cannot reach the block length When , add 0 behind it to make its length reach

[0038] (1b) The user divides the block file by the following formula Main tag for generating chunked...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an integrity verification method with an active attack resistance, wherein the integrity verification method mainly settles a problem of incapability of resisting active attacks in prior art. The integrity verification method comprises the steps of 1, uniformly blocking a file by a user, generating a main label and an auxiliary label, selecting a cryptographic Hash function, a pseudo random function and a pseudo random substitution function; 2, transmitting file sub-blocks to a cloud service provider by the user, deleting a local file, generating inquiry information by the user and transmitting the inquiry information to the cloud service provider; 3, generating proving information by the cloud service provider, and resisting the active attack by the user through the proving information and unidirectionality of the Hash function; and 4, verifying the proving information by the user through locally generating verification information, wherein the proving information is transmitted by the cloud service provider, if verification passes, determining a fact that the user data are complete, and otherwise, determining a fact that the data are damaged. The integrity verification method has advantages of reducing communication traffic and improving active attack resistance. The integrity verification method can be used for data integrity verification under a precondition that a client which is supported in cloud storage loses a data ownership.

Description

technical field [0001] The invention belongs to the field of communication security, and in particular relates to a data integrity verification method, which can be used in cloud storage to support a client to complete data integrity verification under the premise of losing data ownership. Background technique [0002] As a new type of storage model, cloud storage has the ability to store data remotely and has been widely used. More and more companies are outsourcing their data to the cloud to reduce the pressure on local data storage. With the emergence of these advantages, the security of cloud storage has also become a focus of attention, especially in cloud storage, when users lose ownership of data, attackers and unsafe cloud service providers will not be able to control user data. The resulting data corruption becomes a major security concern. Therefore, data integrity verification has become a hot topic. [0003] In the paper "Enabling public verifiability and avai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/1466H04L67/10
Inventor 王保仓张云鹏庞婷胡予濮杨丹
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products