Intrusion tolerant cloud storage data auditing method

A technology of data auditing and intrusion tolerance, applied in the field of cloud computing security

Active Publication Date: 2017-08-15
ANHUI UNIVERSITY
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (2) The key of TPA and user has been leaked multiple times, but there is a key refresh operation between TPA and user's key leak in the same period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion tolerant cloud storage data auditing method
  • Intrusion tolerant cloud storage data auditing method
  • Intrusion tolerant cloud storage data auditing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0055] Such as figure 1 and Figure 8 As shown, the system members used in the intrusion-tolerant cloud storage data audit method provided by the present invention include a system parameter generation center, a cloud server, a user, and a third-party audit (TPA). The parameter generation center generates various parameters required for system operation, including user private key, user public key, etc.; cloud server provides storage services for users; users upload a large number of data files to cloud server for storage; third-party audit provides users with Auditing service, which detects the integrity of the data stored on the cloud server by the user.

[0056] The implementation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion tolerant cloud storage data auditing method and data auditing system. The method comprises a system parameter generation step of generating various system parameters by a system parameter generation center; a key updating step of assisting a user in updating an auditing key periodically through a TPA (Third-party Auditor); a key refreshing step of assisting the user in refreshing an auditing key in each period through the TPA; and a data uploading and auditing step of generating a verification tag for a file by the user, uploading the file and the verification tag to a cloud server and auditing the file by the TPA to verify whether the file is completely stored in the cloud server or not. According to the method, the third-party auditor TPA is introduced for carrying out auditing operation, and moreover, the user is assisted in carrying out periodic key updating and key refreshing operation in each time period. Even if the keys of the user and the TPA are leaked for many times, the data auditing of any other period except the periods in which a user side key is leaked is still secure.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to an intrusion-tolerant cloud storage data audit method. Background technique [0002] With the rapid development of cloud computing, more and more users store data on cloud servers. This storage service brings a lot of convenience to users, but users will worry about the security of data stored on cloud servers. Cloud services may hide data loss concerns for reputation, or delete infrequently accessed data to save storage space. Therefore, users need to check the integrity of the data stored on the cloud server. [0003] Among the currently feasible cloud storage data audit solutions, public audit is a widely used data integrity verification technology. This technique entrusts the audit work to a competent third-party auditor (Third-party Auditor, TPA). The user uploads the data file and the generated file label to the cloud server, and only needs to send an a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/0891H04L9/32H04L9/3247
Inventor 许艳丁冉仲红崔杰石润华
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products