Data change recovery algorithm capable of restoring data authenticity in cloud storage

A data tampering and cloud storage technology, applied in the field of cloud computing, can solve problems such as damage, wasted storage space, and system instability, and achieve the effect of ensuring confidentiality, utilizing storage space, and reducing system overhead.

Active Publication Date: 2017-05-03
中智贵阳人力资本科技有限公司
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The network has become an important part of the public's life. At this time, the emergence of cloud storage has provided great convenience for people to store and access data, but data security issues have also followed. Data is stored in the cloud and separated from the data. Owner's control, or due to cloud service provider system instability, cloud space is maliciously attacked, resulting in data loss and damage
Without the user's knowledge, various losses may be caused due to incomplete data. However, after the user uploads the data to the cloud, in order to save local storage space, the local data is often deleted, and some data is very large. Even if the user has a complete data package in his hand, it is difficult to verify whether the data is complete. Therefore, the data integrity verification algorithm is proposed to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data change recovery algorithm capable of restoring data authenticity in cloud storage
  • Data change recovery algorithm capable of restoring data authenticity in cloud storage
  • Data change recovery algorithm capable of restoring data authenticity in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to solve the above problems, the present invention will carry out detailed analysis in conjunction with the following implementation steps:

[0020] In order to ensure data security, the data will be uploaded to the cloud in the form of ciphertext, and the data will be encrypted before uploading.

[0021] Step 1: Data Encryption

[0022] (1) Assuming that the data to be uploaded is F, divide the file F into n blocks according to the length, namely:

[0023] F={F 1 , F 2 ,...,F n}

[0024] At the same time, hash the file F to generate a hash value of length l, which is recorded as h l , put h l As the root key, encrypt the data.

[0025] (2) Key tree initialization

[0026] Since the file is divided into n data blocks, the benefit is to define a tree height as p, and p satisfies the following conditions:

[0027] 2 p-1 ≤n≤2 p

[0028] The key tree contains n leaf nodes, and the leaf node key is transformed into a transformed leaf node key, which is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a data change recovery algorithm capable of restoring data authenticity in cloud storage. A Hash value of a file serves as a root key of an encryption system, a file block is encrypted, a verification label of the file block is stored, a data block of F is converted into a matrix, an integrity indication code generation function is designed to implement calculation on the matrix, an obtained value is coded, a final integrity indication code is generated, the final integrated indication code is stored in a cloud space together with ciphertext data and ciphertext Hash data, when data is damaged, content of the original data block can be recovered according to order of the integrity indication code, and due to that the root key of encryption equals the Hash value of the file content, the two Hash values can be compared to obtained the authenticity of a restored file. Under the condition that the data is recovered to the largest degree, the data confidentiality is ensured; a storage space is utilized effectively; and the system cost is reduced.

Description

technical field [0001] The invention relates to cloud computing and the fields of data possession, integrity verification and tampering recovery in cloud storage. Background technique [0002] The network has become an important part of the public's life. At this time, the emergence of cloud storage has provided great convenience for people to store and access data, but data security issues have also followed. Data is stored in the cloud, separated from the data The owner's control, or the cloud service provider's system is unstable, and the cloud space is maliciously attacked, resulting in data loss and damage. Without the user's knowledge, various losses may be caused due to incomplete data. However, after the user uploads the data to the cloud, in order to save local storage space, the local data is often deleted, and some data is very large. Even if the user has a complete data package in his hand, it is difficult to verify whether the data is complete. Therefore, the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06H04L29/08
Inventor 范勇胡成华
Owner 中智贵阳人力资本科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products