Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Lattice-based cloud storage data safety auditing method supporting data proxy uploading

A data agent and data storage technology, applied in the field of information security, can solve problems such as the ability to resist quantum computer attacks, security cryptography difficulties, etc.

Inactive Publication Date: 2017-09-01
SOUTHWEST PETROLEUM UNIV
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many cloud storage data security audit schemes with data integrity verification function have appeared, but there are very few cloud storage data security audit schemes that support data proxy uploading. There is only one construction scheme with this function, but this scheme Unable to resist the attack ability of quantum computer
This is because this cloud storage data security audit scheme is designed based on bilinear pairing operations that require higher computational overhead, and its security is based on the difficult problem of discrete logarithm cryptography, which is very easy in the environment of quantum computing breached

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lattice-based cloud storage data safety auditing method supporting data proxy uploading

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solution of the present invention has been described in detail in the part of the summary of the invention, and will not be repeated here.

[0059] What needs to be added is:

[0060] The last trusted auditor TPA verifies the equation Q pro e = μmodq and the inequality Whether it is established or not, the derivation process of verifying the correctness of the equation is as follows:

[0061]

[0062] Thus, verifying the equation Q pro e=μ mod q is established. Furthermore, since the vector (an m-dimensional vector modulo q) is the data block F i signature, such that for any therefore, established.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information safety, and in particular relates to a lattice-based cloud storage data safety auditing method supporting data proxy uploading. The auditing method provided by the invention helps a data owner authorize a proxy signature generating data to a proxy signer and upload the proxy signature to a cloud server, and also helps a credible auditor to audit completeness of the cloud storage data. The auditing method provided by the invention achieves construction of a random mask code based on an original image sampling algorithm on the lattice, so that the credible auditor can be effectively prevented from recovering original data block information of an original signer from a data file. The credible auditor only needs to compute a linear combination with limited a computation amount instead of computing bilinear pairings with higher cost and modular exponentiation during a cloud storage data completeness verification process, so that the auditing method is very beneficial to the credible auditor in the aspect of computing efficiency. Meanwhile the method provided by the invention can effectively resist attacks of a quantum computer, and thus have very important application value in cloud computing environment of post-quantum communication security.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a grid-based cloud storage data security audit method that supports uploading by a data agent. Background technique [0002] With the rapid development of cloud computing technology, especially in the era of big data, more and more users will store massive data on cloud servers. This will inevitably cause users to worry about the privacy and security of the data stored in the remote cloud server. Since the user loses actual control over the data, whether the data stored on the cloud server has been tampered with, that is, data integrity is the user's most concerned concern. [0003] The cloud storage data audit solution can effectively solve the problem of remote data integrity verification, which not only relieves the pressure on end users to manage data, but also avoids end users' worries about tampering with remote data stored on cloud servers. In som...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
Inventor 张晓均龚捷郑俊松赵芥牟黎明
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products