Cloud data public auditing method with duplication eliminating function

A cloud data and function technology, applied in the field of network security, can solve problems such as cloud storage security risks, achieve low communication overhead, protect user privacy, and save user bandwidth.

Active Publication Date: 2016-12-21
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid increase of data on cloud storage, in order to provide virtual unlimited storage capacity and save bandwidth, deduplication of files is extremely important. However, deduplication of data has its inherent security vulnerabilities. Adversaries can provide file hash value to finally download files that do not belong to you, which brings great security risks to cloud storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data public auditing method with duplication eliminating function
  • Cloud data public auditing method with duplication eliminating function
  • Cloud data public auditing method with duplication eliminating function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0037] Based on the theory of public key cryptography, the present invention proposes a cloud data public audit method with a deduplication function, which is applied to a cloud storage environment with high security requirements. When a cloud user stores a file, first upload the hash value of the file, and the cloud server judges whether the file already exists in the server. If it exists, the user does not need to upload the entire file, which saves the user's bandwidth. The cloud server will verify the file ownership of the user Verify that the cloud user actually owns the file. When the cloud user wants to verify the integrity of the cloud data, it sends an audit request to the audit server, and the audit server uses the challenge r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data public auditing method with a duplication eliminating function, and the cloud data public auditing method belongs to the technical field of network security. The cloud data public auditing method comprises the steps that: a CA server sets system parameters, and a user applies for a public-private key pair to the CA server after renting a storage space of a cloud server; a cloud user sends a hash value of a file to be stored to the cloud server at first when storing the file, the cloud server detects the hash value and sends challenge information to the cloud user for verifying ownership if the file is stored in the server, and the cloud server verifies whether the user really owns the data file according to responses; otherwise, the cloud user uploads the file and a label to the cloud server; in addition, an auditing server can verify integrity of data in the cloud server according to a user request. The cloud data public auditing method realizes data integrity verification by adopting a round of asymmetric key agreement algorithm, and realizes the zero knowledge privacy protection; moreover, the practical data duplication eliminating technology is introduced, thereby greatly improving the utilization rate of the cloud server.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a cloud data public audit method with a deduplication function. Background technique [0002] Cloud computing is another new type of computing model following grid computing, peer-to-peer computing, utility computing, and distributed computing. It can provide low-cost, on-demand large amounts of storage and computing resources, and is an important innovation in information technology. [0003] Cloud storage is a new concept extended and expanded from the concept of cloud computing, and it is the most basic service provided by cloud computing. Through the cluster application, grid technology and distributed file system functions, various types of storage devices in the network can be combined to work together through application software, and can provide external data storage and business access functions. Powerful computing and storage capabilities also make...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32H04L29/08G06F17/30
CPCG06F16/122G06F16/1748H04L9/0869H04L9/3221H04L9/3236H04L63/0442H04L67/06H04L67/1097
Inventor 禹勇薛靓臧力李艳楠邱佳惠陈垚彤吴淮
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products