Method and system for auditing Merkle Hash tree cloud data integrity

A data integrity and data technology, applied in transmission systems, digital data protection, electrical digital data processing, etc., can solve the problem of low node utilization, certification path integrity audit system calculation, communication burden and network bandwidth consumption increase , affecting the efficiency of integrity auditing and other issues, to achieve the effect of ensuring real-time and security, improving the efficiency of integrity auditing, and improving node utilization

Inactive Publication Date: 2017-06-13
GUANGDONG UNIV OF TECH
View PDF2 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The authentication data structure used in the existing cloud data integrity audit scheme has low node utilization, and the long authentication path will greatly increase the calculation load, communication burden and network bandwidth consumption of the integrity audit system, which will affect third-party auditors. TPA and data owner DO integrity audit efficiency issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for auditing Merkle Hash tree cloud data integrity
  • Method and system for auditing Merkle Hash tree cloud data integrity
  • Method and system for auditing Merkle Hash tree cloud data integrity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The embodiment of the present invention provides a Merkle hash tree cloud data integrity audit method and system, which realizes the integrity audit function, effectively improves node utilization, shortens the length of the authentication path, reduces the calculation and communication overhead of the system and has High audit efficiency.

[0043] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a method and a system for auditing Merkle Hash tree cloud data integrity. According to the method and the system, the utilization rate of a node is increased by storing data block information on the node; length of an authentication path is reduced by adopting a local authoritative root node, and computation cost of a third-party auditing side and a user side is reduced; all that is needed for the third-party auditing side is to calculate a Hash value of the local authoritative root node according to a Hash value of a node in a possession certificate returned by a cloud storage server and sign the Hash value of the local authoritative root node with a secrete key to obtain local authoritative root node signature, the third-party auditing side can compare and verify the obtained local authoritative root node signature with local authoritative root node signature returned by the cloud storage server, calculation for obtaining unique root node signature for integrity verification is not required, so that integrity auditing efficiency of the third-party auditing side and the user side is greatly improved, and freshness of node information is maintained by adding vision ID to the node.

Description

technical field [0001] The invention relates to the field of data integrity verification, in particular to a Merkle hash tree cloud data integrity audit method and system. Background technique [0002] The cloud has efficient computing power and huge storage capacity, which saves a lot of local storage space and data management burden for data owners, but the cloud is not completely trustworthy, especially in the public cloud and hybrid cloud, the cloud may delete some accesses data to save cloud storage space. Therefore, the data owner DO needs to require the cloud to provide integrity proof to itself through the cloud data integrity audit technology to prove that the cloud data is complete. There are three entities in the cloud data integrity audit system, namely data owner DO, cloud storage service provider CSP and third-party auditor TPA. In the process of integrity audit, first of all, because the data owner DO has limited computing power and cannot keep online all th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/62H04L29/08
CPCG06F21/64G06F21/6209G06F21/645H04L67/10
Inventor 刘竹松苏迪李进余松森
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products