Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing

An update method and data verification technology, applied in the field of mobile cloud computing, can solve problems such as inappropriateness, and achieve the effect of reducing the burden of computing and storage

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Considering the limitations of mobile computing and storage capabilities in the mobile cloud computing en

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing
  • Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing
  • Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Mobile cloud computing supports third-party data security verification and update methods. In this method, mobile cloud computing verification is divided into data holders, trusted third parties, cloud service providers, and storage service providers. We will cloud The service provider and the storage service provider are regarded as a whole, which is called the service provider. The trusted third party is an organization that provides data outsourcing verification services. Users can outsource data integrity verification to a trusted third party to reduce their own computing and storage burden. The scheme in this paper relies on the file integrity inspection method based on the Merkle hash tree, and the hash values ​​​​of the file block tags correspond to the leaf nodes of the hash tree in order from left to right, and then cascade the hashes in pairs, Finally, the hash value of the root node is calculated. For a file with n blocks (n is an integer power of 2), 2n-1 ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data security verification and updating method supporting a third-party administrator (TPA) in mobile cloud computing. The method adopts the technical scheme that based on the BLS short signature algorithm and the hash tree algorithm, a key is generated through the key generation algorithm in mobile cloud, and a signature is generated through the signature generation algorithm in mobile cloud, so that challenge information is created, verification information is generated, and data verification is finally carried out. The method provided by the invention has the advantages that a verification process can be outsourced, so that computing and storage burdens on a mobile terminal are reduced; no status information is saved during the verification process, and a cloud service provider only needs to construct corresponding verification data according to a challenge request sent by a verifier and returns the verification data; and the verification does not involve source file blocks, and a verification terminal operates file blocks which have been processed through mapping functions during the whole verification process, so that file information can be prevented from being disclosed to the TPA.

Description

technical field [0001] The invention relates to the fields of mobile cloud computing, information security, data integrity verification and update. Background technique [0002] Nowadays, cloud computing has become the main trend of information development. With the rapid development of mobile communication and the intelligence and diversification of mobile terminals, more and more users choose to use intelligent mobile terminals to obtain and use information. The terminals of the cloud service platform have also expanded from personal computers, servers, and portable computers to various mobile devices. Users can share, manage and obtain cloud data anytime and anywhere through mobile terminals. With the organic combination of mobile communication and cloud computing, new mobile Internet service models and businesses such as public safety, intelligent transportation, smart home, environmental monitoring, location services, and mobile payment continue to emerge. [0003] Da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0891H04L63/06H04L63/083H04L63/123H04L67/53
Inventor 范勇
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products