An attribute-based cloud data audit method and system
A cloud data and attribute technology, applied in the field of network security, can solve problems such as cloud storage service security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.
[0063] Based on the theory of cryptography, the present invention provides a realization method of attribute-based cloud data auditing. Compared with the traditional PKI-based or identity-based cloud data audit method, the method of the present invention can provide simplified key management, that is, neither the client nor the third-party verifier needs to maintain digital certificates and save identity identifiers to complete Verification greatly reduces the key management burden of the system. This scheme can specify the range of auditors by adjusting the audit precision. In the audit stage, it can also provide properties of anti-collusion and protection of user attribute privacy. Therefore, the present invention not only promotes the development of cloud computing, but also has many theoretic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


