Batch self-auditing method for cloud storage data

A cloud storage and data technology, applied in the field of information security, can solve problems such as data leakage of cloud users, and achieve the effect of ensuring confidentiality

Inactive Publication Date: 2016-09-28
SOUTHWEST PETROLEUM UNIV
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is because some public data stored on cloud servers will be mastered by third-party auditors, which will lead to the threat of leakage of sensitive and important data of cloud users.
In addition, most of the current cloud storage data integrity audit methods that support third-party audits are designed using the aggregate digital signature algorithm based on bilinear pairings. However, this requires computationally expensive modular exponents and bilinear pairings operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch self-auditing method for cloud storage data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Describe technical scheme of the present invention in detail below:

[0030] The steps of the present invention are divided into four parts:

[0031] System initialization: The system generates a public-private key pair based on an elliptic curve digital signature algorithm, a public-private key pair for lightweight signatures on file names, and a secure lightweight symmetric encryption algorithm.

[0032] Signature generation steps: the user uses the improved Elliptic Curve Signature Algorithm (ECDSA) to calculate their digital signatures for multiple data files, and at the same time digitally signs different data file names to generate data file labels, and stores these multiple sensitive data files Perform symmetric encryption. Finally, these signatures and the ciphertext of the data file are sent to the cloud server, and these data are deleted on the local client.

[0033] Audit proof generation steps: In order to batch audit the integrity of the outsour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and in particular relates to a batch self-auditing method for cloud storage data. The method of the present invention mainly includes: generating a public-private key pair based on an elliptic curve digital signature algorithm, a public-private key pair of a lightweight signature algorithm, and a lightweight symmetric encryption algorithm: calculating digital signatures of multiple data files, data files Tags and ciphertexts of data files are sent to the cloud server; cloud users generate audit challenge information and send it to the cloud server; the cloud server returns the aggregated audit proof response information to the cloud user; cloud users For the response information, use the digital signature algorithm based on the elliptic curve and the symmetric encryption algorithm to verify the legitimacy of the aggregated audit proof response. The beneficial effect of the present invention is that it solves the problem of batch integrity verification of cloud storage data, enabling users to effectively verify the integrity of multiple data files at the same time.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a batch self-auditing method for cloud storage data. Background technique [0002] As an important service model of cloud computing, cloud storage has become increasingly popular. Outsourcing data storage on cloud servers has great advantages over traditional storage models, but at the same time, it also makes users worry about the security and privacy of data stored on cloud servers. worry. First of all, cloud users worry that their data stored on cloud servers may be accessed and abused by unauthorized users, because once the data is stored on cloud servers, cloud users give up the physical control of the data. Second, cloud users worry that their data stored on cloud servers may be lost. Because no matter how reliable the cloud service provider is, it may cause data loss or damage on the cloud storage device. Thirdly, due to some economic interests,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L63/045H04L9/3252H04L63/08
Inventor 张晓均张新鹏唐亮何小曼
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products