Key-updating-compatible bidirectional secure cloud storage data integrity detection method
A technology of data integrity and detection method, applied in the field of cloud computing security, can solve the problems of unsafe, unsafe and complex structure of security equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.
[0056] Here, the technical terms of the invention are explained and explained:
[0057] Data owner: the owner of the data, and calculate the data block label for each data block, and upload the data and data block label to the cloud server;
[0058] Cloud server: a distributed storage system with a large number of storage and computing resources, providing users with data storage, computing and other services;
[0059] Third-party audit: In order to reduce the computing cost of the data owner, a third party is used instead of the data owner to detect the integrity of the data stored on the cloud server.
[0060] The present invention is further described below in conjunction with embodiment a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com