Identity-based privacy protection integrity detection method and system in cloud storage

A technology for integrity detection and privacy protection, applied in the field of cloud computing security, it can solve the problems of low reliability of results, limited computing resources, and exposure of user identity privacy, so as to reduce certificate overhead, protect data privacy, and protect user privacy. Effect

Active Publication Date: 2018-04-20
ANHUI UNIVERSITY
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the reliability of the results of this detection method is not high. Whether it comes from the user or the cloud server, there is a bias. bring a certain burden
[0007] In order to achieve fairness and reduce the burden on users, the third-party audit (TPA) is used to replace the user to complete the integrity detection task. Since the third-party audit (TPA) is semi-trusted, it may Obtain data as much as possible due to curiosity. At the same time, TPA must obtain the user's public key to complete the detection task during the integrity detection process, which will also expose the user's identity and privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based privacy protection integrity detection method and system in cloud storage
  • Identity-based privacy protection integrity detection method and system in cloud storage
  • Identity-based privacy protection integrity detection method and system in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0021] The invention reduces the public key certificate management and calculation cost of the system by using the identity-based signature, protects the user's identity privacy and data privacy in the process of verifying the integrity of the data, and improves the security of the system.

[0022] The technical terms involved in the present invention are explained and illustrated below:

[0023] PKG: a trusted third party, which authenticates the user and issues the user's private key to the user according to the user's identity;

[0024] User: individual or organization, calculate the data block label for each data block according to the user's private key, and upload the data and data block...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based privacy protection integrity detection method and system in a cloud storage. The method comprises the following steps of (1) a system initialization stage that a trusted third-party PKG generates a main private key and a public parameter; (2) a secret key extraction stage that the trusted third-party PKG generates a private key for a user according to useridentity; (3) a label generation stage that the user generates a data label for each data block by using the private key and uploads data and the corresponding data label to a cloud server; (4) a challenge inquiry stage that a verifier sends a challenge to the cloud server; (5) an evidence generation stage that the cloud server computes an integrity evidence according to challenge information andreturns the integrity evidence to the verifier; and (6) a verification stage that the verifier verifies the data integrity according to the evidence. According to the method and the system, the public key certificate management and calculation cost of the system is reduced based on an identity signature, and meanwhile, the identity privacy and the data privacy of the user are protected in a process of verifying the data integrity, and the safety of the system is improved.

Description

technical field [0001] The invention relates to cloud computing security technology, in particular to an identity-based privacy protection integrity detection method and system in cloud storage. Background technique [0002] Cloud storage is a very important service form in cloud computing. It is a service that puts storage resources on cloud servers for people to access. Users can easily access data anytime and anywhere by connecting to the cloud through any networked device. [0003] It is used to store their data on the cloud server in order to reduce the maintenance and computing burden on the data locally. [0004] Because the cloud server is untrustworthy, it may not save storage space, lose some data that users rarely or hardly access, and may hide the loss of data in order to maintain its own reputation, so it needs to verify the cloud before using the data. Check the data on a regular basis. [0005] At present, most of the cloud storage integrity detection metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/321H04L9/3247H04L63/0421H04L63/0807H04L63/123H04L67/1097
Inventor 田苗苗王玲燕仲红
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products