Cloud data auditing method and system based on attributes
A cloud data and attribute technology, applied in the field of network security, can solve problems such as cloud storage service security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] The present invention will be further described in detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.
[0063] The present invention provides an attribute-based cloud data auditing method based on cryptography theory. Compared with the traditional PKI-based or identity-based cloud data audit method, the method of the present invention can provide simplified key management, that is, neither the client nor the third-party verifier need to maintain the digital certificate, nor save the identity identifier. Verification greatly reduces the key management burden of the system. This program can specify the scope of the auditor by adjusting the audit accuracy. In the audit stage, it can also provide anti-collusion and protect user attribute privacy. Therefore, the present invention not only promotes the development of cloud computing, but also has many theoretical and practical meanings for safe cloud storag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


