Secondary encryption-based data validation and data recovery algorithm in cloud storage

A secondary encryption and data verification technology, applied in digital data protection, electronic digital data processing, computing, etc., can solve the problems of inability to completely avoid data tampering loss, increase space occupation, and large system overhead, and achieve simple and accurate recovery , reduce overhead, and take up less storage space

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, not only the calculation is complicated, but also the system overhead is high, and the loss caused by data tampering cannot be completely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary encryption-based data validation and data recovery algorithm in cloud storage
  • Secondary encryption-based data validation and data recovery algorithm in cloud storage
  • Secondary encryption-based data validation and data recovery algorithm in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Step 1: Data is encrypted for the first time

[0018] Before the data is uploaded to the cloud space, for the safety of the data, the data will be encrypted before uploading. There are many confidential algorithms. In the present invention, asymmetric encryption is adopted:

[0019] Data F, divide it into blocks, expressed as: F=(F 1 , F 2 ,...,F n ), use the RSA algorithm to encrypt the data block once, and the encrypted public key is key pk , the private key is key sk , the encrypted ciphertext data:

[0020]

[0021] Step 2: Ciphertext data is encrypted again

[0022] The secondary encryption of data is to integrate the data verification process into the encryption process. The process is as follows:

[0023] (1) Hash the original data F to get the hash value h of the file F (or called digital signature), in order to facilitate calculation in this method, the length of the hash value is set to 8 bits.

[0024] (2) For ciphertext data block Also perform a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secondary encryption-based data validation and data recovery algorithm in cloud storage. The algorithm comprises the steps of firstly carrying out first encryption after data segmentation, generating a hash value of a file by adopting an asymmetric encryption technology, utilizing the hash value of an original file as a secret key for secondary encryption of a random ciphertext data block and then utilizing the hash value as the secret key of a next ciphertext data block; and integrating data integrity and possession validation into a decryption operation of data access and then defining a data recovery label algorithm to generate a recovery label of the data for recovering original data. By adopting a secondary encryption technology, the overhead of computation and the complexity of validation are reduced by integrating data validation into a decryption process, and the data integrity and possession are validated in each access, so that the loss due to the fact that a user is misguided by wrong data is avoided. The memory space occupied by the recovery label is small and the recovery is simple and accurate.

Description

technical field [0001] The invention relates to the fields of cloud computing, cloud storage, data security, data integrity and possession verification, and recovery of tampered data. Background technique [0002] Users store data in the cloud space, which saves local storage space, facilitates access, and realizes data sharing anytime and anywhere. However, after the data is uploaded, it is out of the control of the data owner. If the data changes, it may bring catastrophic impact. Therefore, how to ensure the security of data in the cloud space, how to determine whether the data in the cloud space is still real and valid, and if the data is not real, how to restore the data has become a research hotspot. [0003] The existing data verification technology is mainly to verify the possession and authenticity of the data. After the data is calculated through a series of calculations, the verification label of the data is obtained, and then stored, and the verification is perf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products