Key-updating-compatible bidirectional secure cloud storage data integrity detection method

A technology of data integrity and detection method, applied in the field of cloud computing security, can solve the problems of unsafe, unsafe and complex structure of security equipment

Active Publication Date: 2017-12-01
ANHUI UNIVERSITY
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In fact, the key of the data owner in the cloud storage integrity detection scheme may be leaked
First, the key management of the data owner is a very complicated process
Data owners need to manage various keys to complete different security tasks, and some unintentional mistakes in management may lead to key disclosure
Second, for some ordinary customers, the security protection function is relatively weak, and the user may unintentionally download a ma...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key-updating-compatible bidirectional secure cloud storage data integrity detection method
  • Key-updating-compatible bidirectional secure cloud storage data integrity detection method
  • Key-updating-compatible bidirectional secure cloud storage data integrity detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0056] Here, the technical terms of the invention are explained and explained:

[0057] Data owner: the owner of the data, and calculate the data block label for each data block, and upload the data and data block label to the cloud server;

[0058] Cloud server: a distributed storage system with a large number of storage and computing resources, providing users with data storage, computing and other services;

[0059] Third-party audit: In order to reduce the computing cost of the data owner, a third party is used instead of the data owner to detect the integrity of the data stored on the cloud server.

[0060] The present invention is further described below in conjunction with embodiment a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a key-updating-compatible bidirectional secure cloud storage data integrity detection method. The method includes the following steps: initializing a system to generate parameters; obtaining by a data owner a key and a public parameter; updating the key of the data owner; checking by the data owner the validity of the updated key; using by the data owner the key of the current time period to calculate the authentication label for each data block and uploading the data blocks and the corresponding authentication labels to the cloud server; sending by a third-party audit (TPA ) a challenge to the cloud server; calculating by the cloud server the evidence to be returned to the third-party for auditing; and verifying the correctness of the evidence by the third-party audit. The invention reduces the security problem caused by the key leakage of the data owner through the key updating, divides the data owner key into two parts and saves them in different ways to realize the forward security and the backward security of the key leakage, and uses a random mask technology to protect the privacy of data.

Description

technical field [0001] The invention relates to cloud computing security technology, in particular to a two-way secure cloud storage data integrity detection method. Background technique [0002] In the cloud computing environment, cloud service providers integrate computing resources to provide cloud users with economical and fast infrastructure services, and users outsource data to cloud servers, so that they can be easily obtained at any time and place through any heterogeneous network facilities. Serve. [0003] Because the cloud service provider is untrustworthy, it may lose some data that users rarely access or hardly access in order to save storage space, and it may also hide data loss in order to maintain its reputation. Data integrity detection. So far, many current cloud storage integrity detection schemes have been proposed one after another. These schemes are based on an assumption-the data owner's key is always safe. [0004] In fact, the key of the data owner...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0863H04L9/0869H04L63/0846H04L67/1097
Inventor 田苗苗王玲燕仲红陈志立
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products