Unlock instant, AI-driven research and patent intelligence for your innovation.

Data integrity verification method and system

A data integrity and verification method technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as low efficiency and low security, and achieve the effect of improving efficiency and high security

Active Publication Date: 2016-07-20
SHENZHEN UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present invention is to provide a method and system for verifying data integrity, aiming to solve the problem of low efficiency and low security of data integrity verification in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity verification method and system
  • Data integrity verification method and system
  • Data integrity verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The specific embodiment of the present invention provides a method for verifying data integrity, which is applied to a cloud storage system. The cloud storage system includes a user terminal, a cloud storage server, a cloud storage management platform, and a third-party audit, wherein the data integrity The authenticity verification method mainly includes the following steps:

[0036] S11. Use the cloud storage management platform to run the Setup(λ) algorithm, generate a public key pk and send it to the third party for audit, and generate each server private key sk and send it to the cloud ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data integrity verification method. The method includes the steps that a Setup(lambda) algorithm runs by means of a cloud storage management platform, a public key pk is generated and sent to a third-party audit, and server private keys sk are generated and sent to a cloud storage server; the cloud storage server executes a Sign(sk, id, m) algorithm to generate signs sigma of fragmented data m saved by users; the cloud storage server sends the verified signs sigma of fragmented data m to the third-party audit; the third-party audit receives data which is from the cloud storage server and is marked as id, and a Verify (pk, id, m, sigma) algorithm is executed to verify usability and integrity of data; the third-party audit sends a verification result to user terminals to inform the users. The invention further provides a data integrity verification system. By means of the data integrity verification method and system, efficiency is greatly improved, and CPA is safe in a standard attack mode.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data integrity verification method and system thereof. Background technique [0002] User data in cloud storage is no longer owned by local users, but distributed and stored in an uncontrollable cloud. For infrequently accessed data or archived data, users will inevitably worry about whether the data exists and whether it has been tampered with. In order to avoid service interruption when a disaster occurs, user data is usually backed up in multiple copies on the cloud server. Usually, the user needs to pay for the number of backups, and at the same time worry about whether to enjoy the corresponding backup service. Therefore, the user has the right to the data owned However, most of the current verification methods for data integrity are cumbersome, and the verification efficiency is not high and the security is low. [0003] Therefore, it is urgent to propose a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/645
Inventor 王廷张鹏喻建平谢维信陈泽虹
Owner SHENZHEN UNIV