Integrity verification method for data in cloud storage

An integrity verification and cloud storage technology, applied in the field of cloud storage security, can solve the problems of heavy TPA storage burden, user data information leakage, data encryption and other problems, and achieve the effect of reducing storage burden, ensuring security, and improving utilization.

Active Publication Date: 2017-01-25
XIDIAN UNIV
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of this solution are: 1. The data in the cloud is not encrypted, which will lead to the leakage of user data information during the data verification interaction process; 2. Since the data tags are stored in the trusted third-party TPA , causing the storage burden of TPA to be too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity verification method for data in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] refer to figure 1 , the implementation steps of the present invention are as follows:

[0025] Step 1: The user generates the key dk for encrypting the data block, the key sk required for the data label, and the key pk required for the verification process.

[0026] (1.1) The user is in the prime number field F q Randomly select a number as the key dk for data block encryption;

[0027] (1.2) The user selects one defined in the prime number field F q The elliptic curve E(F q ), take point G as the base point on the curve, and then randomly select a number x on [1,q-1] as the key sk required for the data label, where q represents a large prime number;

[0028] (1.3) Calculate the public point G A =xG, will (G A , G) as the key pk required in the verification process.

[0029] Step 2: Perform block processing on the data m to be uploaded to the cloud server.

[0030] Set the length of each data block to l, and divide the data m to be uploaded to the cloud server a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an integrity verification method for data in cloud storage. The method is mainly used for solving problems in the prior art that data privacy is leaked and the storage load of trusty third parties is too high. The technical scheme of the invention is as follows: the method comprises the steps: (1) a user generates secret keys for data encryption, secret keys for data labeling and secret keys for a verification process; (2) data to be uploaded to a cloud server are subjected to blocking processing and encryption, a data label corresponding to each encrypted data block is calculated, and the encrypted data blocks and the data labels are uploaded to the cloud server; (3) a trusty third-party cloud server requests a data integrity verification request; (4) the cloud server generates a corresponding response certification by using user uploaded encrypted data and data labels according to the verification request; (5) a trusty third party verifies the received response certification. According to the method, the privacy safety of the data uploaded to the cloud server by users is ensured, the storage load of the trusty third parties is reduced, the utilization ratio of the cloud server is increased, and thus the method can be applied to the safe outsourcing storage of the data.

Description

technical field [0001] The invention relates to the technical field of cloud storage security, in particular to a method for verifying the integrity of data stored in the cloud, which can be used for secure outsourcing storage of data. Background technique [0002] As cloud computing becomes more and more widely used, many users choose to store their data in the cloud in order to save local memory consumption. However, because the cloud server is not completely trustworthy, it may bring security problems to the data, so the user needs to perform irregular integrity verification on the data in the cloud. There are currently two protocols for verifying data integrity: the PDP protocol that can prove data ownership and the POR protocol that can prove data recovery. The PDP protocol is used to detect whether the cloud server stores and saves user data, which includes data preprocessing and storage and data ownership proof. The POR protocol introduces erasure code technology, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/321H04L9/3236H04L63/0428H04L63/0807H04L63/123H04L63/1441H04L67/1097
Inventor 卢珂王保仓
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products