Storage data integrity verification and recovery method

A technology of integrity verification and recovery method, which is applied in the field of data integrity verification, can solve problems such as reducing user data reading performance, and achieve the effect of low storage and communication overhead and strong attack resistance

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current cloud storage system uses two methods of copy and erasure code to store user data redundantly to ensure the reliability of the system. When repairing, the entire file needs to be transmitted, which takes up a lot of network resources and adds a huge burden to the distributed system data center. The network congestion caused by the pressure also seriously reduces the user's data reading performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage data integrity verification and recovery method
  • Storage data integrity verification and recovery method
  • Storage data integrity verification and recovery method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention more clear, the following will describe in detail in conjunction with the algorithm flow chart.

[0020] 1. Basic idea of ​​algorithm

[0021] First, the information is divided into data blocks according to the minimum storage scheme of the regeneration code, and then the data blocks are hashed (MD5 algorithm, the hash described later is not specified, and the MD5 rule is used for all) to generate data evidence; then the data The evidence is mapped to the storage server node using a pseudo-random storage algorithm, and the data evidence is pseudo-randomly placed twice and saved in two ciphertext data blocks; the user saves the private key and the evidence key, and when receiving the user authentication request, first Verify the user's authority, and then return the stored data block and the corresponding evidence tag to the user, and calculate the consistency of the comparison inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a storage data integrity verification and recovery method. The storage data integrity verification and recovery method comprises the following steps of: firstly, partitioning information data, and generating data evidence; then, mapping the data evidence onto a server node, performing secondary pseudo-random placement of the data evidence, after verification applied by a user is passed, returning a stored data block and a corresponding evidence label to the user, and calculating and comparing the consistency of information through a private key and an evidence key, so that verification is realized; and, if data is attacked or tampered, when node failure in a system is detected, returning the position of an error node by the system, performing linear processing of a data block, which is smaller than a source file, according to secondary pseudo-random placement storage and a regeneration code, performing iterative operation of an effective node, and precisely recovering data. By means of the storage data integrity verification and recovery method provided by the invention, whether data is integrated, attacked and tampered or not can be checked by using a small amount of resources; due to secondary pseudo-random placement storage of the data, data can be recovered through undamaged data blocks; and furthermore, by means of the method, the storage overhead and the communication overhead are relatively low and high in anti-attacking property.

Description

technical field [0001] The invention relates to the verification of data integrity in computer storage and cloud storage; and the recovery fields of tampered and damaged data. Background technique [0002] With the development of cloud technology, enterprises and individuals are more and more inclined to store data in the cloud in order to save mobile storage space and facilitate access anytime and anywhere; at the same time, data can also be shared in the cloud for easy download by others. However, this has also caused data security issues. Data is stored in the cloud and is out of the control of the data owner, or the cloud service provider system is unstable and the cloud space is maliciously attacked, resulting in data loss and damage. Users may cause various losses due to incomplete data without knowing it; so how to determine the integrity of cloud data? After the data is destroyed in the storage space, the data is no longer complete. How to accurately restore the mod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F11/14
CPCG06F21/64G06F11/1464
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products