Cloud storage data integrity service signature method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data integrity, cloud storage server technology, applied in the direction of digital transmission system, user identity/authority verification, electrical components, etc., can solve unsuitable cloud platform architecture, complex signature calculation and data structure, increased calculation and communication overhead And other issues
Inactive Publication Date: 2016-04-20
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF4 Cites 10 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] Judging from the current research situation, cloud storage data integrity detection has the following deficiencies: the calculation of verification information requires more complex signature operations and data structures, performance needs to be improved, and the client needs to participate in the integrity detection process. Too many calculations increase the customer's calculation and communication overhead, which is not suitable for the architecture of the cloud platform
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0026] like figure 1 As shown, the cloud storage data integrity service signature method, in this architecture, includes three participants, user 1, cloud storage server 2 and trusted third-party detector 3, user 1 uploads the uploaded file F to the cloud storage server 2. There are two ways for user 1 to implement data integrity services: first, user 1 sends a request to cloud storage server 2 for data integrity services, and cloud storage server 2 returns the result to user 1 after calculating the signature method; In the second type, user 1 sends a request for data integrity service to trusted third-party detector 3, and trusted third-party detector 3 then sends a request for data integrity service to cloud storage server 2, and cloud storage server 2 calculates Afterwards, the result is returned to the trusted third-party detector 3, and the truste...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention relates to a cloud storage data integrity service signature method. The method includes the steps of cloud storage server key parameter initialization, file block signature preprocessing and data integrity service. According to the method, a cloud storage server generates a randomly-selected key x which belongs to Z<*>q and calculates Y=xP; the cloud storage server generates center open system parameters {G1, G2, P, Y, q, e, H1, H2}; the cloud storage server divides a user file into n blocks, and a file block mi (i belongs to [1, n]) is formed, and then generates signature information si (i belongs to [1, n]) for the file block mi (i belongs to [1, n]) through the signature key x; a file mark F<*> of which the integrity is to be detected is inputted, and a file block mj (j belongs to [1, n]) contained by a file F is randomly selected so as to be detected, and if a detection result satisfies a verification check formula described in the descriptions of the invention, verification is successful, and data integrity service passage is enabled, otherwise, verification fails. With the method of the invention adopted, service efficiency can be improved; and integrity services are completed in the cloud storage server, so that the computation quantity and communication overhead of a client can be reduced.
Description
Technical field: [0001] The invention relates to the technical field of cloud storage information security, in particular to a cloud storage data integrity service signature method. Background technique: [0002] The data integrity service is mainly to verify whether the cloud storage server can correctly save the data stored by the user, and prevent cloud data from being lost, deleted or tampered with. For the problem of cloud storage data integrity detection, that is, provable storage, the usual practice is that cloud users retrieve a small amount of data stored in the cloud, and use knowledge proof protocols or probabilistic analysis methods to judge whether the data stored in the cloud is correct or not with a high confidence probability. whole. Typical technologies include: Juel of RSA Labs and Kaliski of EMC, etc. proposed a proof of recovery in 2007. The main idea of this scheme is to randomly insert some values (tag blocks) into the stored data, then store them...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3247H04L63/123H04L67/1097
Inventor 耿永军孟庆见陈红军
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER