Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage data common auditing method possessing secret key leakage resistance characteristic

A cloud storage and key technology, applied in the field of communication, can solve problems such as slow computing efficiency and communication efficiency, complicated management of user public key certificates, and inability to resist quantum computer attacks.

Inactive Publication Date: 2016-07-20
SOUTHWEST PETROLEUM UNIV
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the current cloud storage data audit schemes do not consider the problem of signature forgery and forged audit certificate response information caused by the leakage of user signature private key
So far there is only one solution to this problem, but the solution requires a third-party auditor to calculate the expensive modular exponent and bilinear pairing operation
At the same time, in the key update process, the scheme uses binary tree technology to update the user's signature private key, the calculation efficiency and communication efficiency are relatively slow, and the scheme cannot resist the attack of quantum computers
In addition, most of the current cloud storage data audit schemes are based on certificates, which makes the management of user public key certificates a lot of complex problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data common auditing method possessing secret key leakage resistance characteristic
  • Cloud storage data common auditing method possessing secret key leakage resistance characteristic
  • Cloud storage data common auditing method possessing secret key leakage resistance characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Describe technical scheme of the present invention in detail below:

[0052] The steps of the present invention are divided into four parts:

[0053] The initial stage of the system: the system first divides the data file into blocks, and sets the security parameters of the lattice encryption algorithm and the secure hash function required in this stage. The key generation center PKG invokes the grid-based proxy algorithm to generate public and private keys of cloud users and cloud servers.

[0054] Key update phase: given the user identity, the key update period preset by the system, and the cloud user's signature private key at the current moment, the cloud user invokes the grid-based proxy algorithm to generate the cloud user's signature private key at the next moment.

[0055] Audit proof generation stage: the cloud user calls the identity-based forward secure homomorphic digital signature algorithm on the lattice to generate the signature of the data block, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the communication technology field and especially relates to a cloud storage data common auditing method possessing a secret key leakage resistance characteristic. The method mainly comprises the following steps of system initialization: blocking processing is performed on a data file so as to generate public and private key pairs of a cloud user and a cloud server; auditing identification generation: the cloud user sends the data file and a label, and a signature set of a data block to the cloud server; auditing challenge response: a third party auditor generates auditing challenge information and sends to the cloud server; the cloud server calculates combination information according to the auditing challenge information, gets signatures together and sends an auditing identification response information to the third party auditor; and the third party auditor verifies validity of the auditing identification response information. The method has advantages that a condition that digital signature forgery and auditing identification response information forgery caused by leakage of a user signature private key can be prevented; and a malicious cloud server is ensured not to generate the forged auditing identification response information to cheat a TPA and to pass through an auditing verification process.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a public audit method for cloud storage data with the characteristic of anti-key leakage. Background technique [0002] With the rapid development of cloud computing, more and more users will store data on the cloud. As a new generation of storage service model, cloud storage has become increasingly popular. This storage service brings many new conveniences to users, but at the same time, it also makes users worry about the security and privacy of data stored in cloud servers. Although cloud service providers can provide users with more secure data storage devices, once the massive data generated in cyberspace is stored in cloud servers, active attacks from various external opponents cannot be avoided. In fact, due to some economic interests, cloud service providers often delete some data that is rarely accessed by users to save storage space, and they will n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/06H04L63/0435H04L63/06H04L63/0807
Inventor 张晓均唐亮张新鹏何小曼
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products