Traceable effective open auditing method and system in cloud storage data sharing

A data sharing and cloud storage technology, applied in the field of cloud computing security, can solve the problems of destroying the usability of shared data, high communication overhead, dishonesty of users in the group, etc.

Active Publication Date: 2017-09-08
ANHUI UNIVERSITY
View PDF1 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, in the case of multi-user data sharing, it is necessary to protect the user's identity privacy and achieve user anonymity, but unlimited anonymity will bring a new problem. Users in the group may be dishonest, and users may Benefits maliciously modify data, so a user may maliciously modify shared data. Due to the realization of user anonymity, malicious users will not worry about being discovered. This uncontrolled malicious modification may destroy the usability of shared data. , so we need to track this malicious user and reveal the identity of the malicious user
[0006]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable effective open auditing method and system in cloud storage data sharing
  • Traceable effective open auditing method and system in cloud storage data sharing
  • Traceable effective open auditing method and system in cloud storage data sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0067] Explanation and description of technical terms in the present invention:

[0068] Attribute authority: perform attribute authentication on users, and issue attribute private keys to users according to user attributes;

[0069] Data owner: The owner of the data formulates a signature policy for the data, calculates the data block label for each data block, and uploads the signature policy, data and data block label to the cloud server;

[0070] User: Users who meet the signature policy can access and modify the data uploaded by the data owner;

[0071] Cloud server: a distributed storage system with a large number of storage and computing resources, providing users with data storage, co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable effective open auditing method in cloud storage data sharing, and a cloud computing application system. The method comprises the following steps: initializing the system, generating a main private key and open parameters by using an attribute mechanism, allocating an attribute private key to each user, and embedding the user identity in the attribute private key; formulating a signature strategy by a data owner, generating a label for a data block, and uploading the label to a cloud server; modifying the data by a user satisfying the signature strategy; verifying the label of the modified data by the cloud server; sending challenge to the cloud server by a verifier; calculating auditing evidence by the cloud server, and returning the auditing evidence to the verifier; verifying the correctness of the evidence by the verifier; and tracing the malicious user. According to the traceable effective open auditing method disclosed by the invention, the privacy of the user identity is protected in a multi-user data sharing environment, the traceability of the malicious user is realized at the same time, and the storage overhead for tracing is a constant.

Description

technical field [0001] The invention relates to cloud computing security technology, in particular to an effective public audit method and a cloud computing application system that can be traced in a multi-user data sharing environment in cloud storage. Background technique [0002] Cloud storage is a very important and common service form in cloud computing (for example: Dropbox, Amazon S3, iCloud), and it is a service that puts storage resources on cloud service providers for people to access. Users can connect to the cloud through any network-connected device to access data conveniently at any time and anywhere. In order to reduce the maintenance and computing burden on data locally, users store their data on cloud servers. Since the cloud server is untrustworthy, it may lose some data that users rarely access or hardly access in order to save storage space, and may hide data loss in order to maintain its own reputation, so we need to check the data on the cloud before u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/08
CPCH04L9/0825H04L9/085H04L63/0807H04L63/123H04L63/20H04L67/1097
Inventor 田苗苗王玲燕仲红崔杰
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products