Data change recovery algorithm capable of restoring data authenticity in cloud storage
A data tampering and cloud storage technology, applied in the field of cloud computing, can solve problems such as damage, wasted storage space, and system instability, and achieve the effect of ensuring confidentiality, utilizing storage space, and reducing system overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In order to solve the above problems, the present invention will carry out detailed analysis in conjunction with the following implementation steps:
[0020] In order to ensure data security, the data will be uploaded to the cloud in the form of ciphertext, and the data will be encrypted before uploading.
[0021] Step 1: Data Encryption
[0022] (1) Assuming that the data to be uploaded is F, divide the file F into n blocks according to the length, namely:
[0023] F={F 1 , F 2 ,...,F n}
[0024] At the same time, hash the file F to generate a hash value of length l, which is recorded as h l , put h l As the root key, encrypt the data.
[0025] (2) Key tree initialization
[0026] Since the file is divided into n data blocks, the benefit is to define a tree height as p, and p satisfies the following conditions:
[0027] 2 p-1 ≤n≤2 p
[0028] The key tree contains n leaf nodes, and the leaf node key is transformed into a transformed leaf node key, which is u...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com