Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy data integrity detection method based on identities in cloud storage

A technology of integrity detection and proxy data, which is applied in the field of cloud computing security to achieve the effect of reducing certificate overhead

Inactive Publication Date: 2018-06-29
ANHUI UNIVERSITY
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide an identity-based proxy data integrity detection method in storage to solve the shortage of certificate overhead in the proxy cloud storage data integrity verification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy data integrity detection method based on identities in cloud storage
  • Proxy data integrity detection method based on identities in cloud storage
  • Proxy data integrity detection method based on identities in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0017] Such as figure 1 As shown, the identity-based proxy data integrity detection method of the present invention is applied to a cloud storage system, and the system includes four participating objects: PKG, client, cloud server and proxy.

[0018] Among them, PKG: the secret key generator is a trusted third party, which can authenticate all parties and issue private keys to them according to their respective identities.

[0019] Among them, the customer: can be an individual or an organization, and there is a large amount of data that needs to be transferred to the cloud server for storage. At the same time, the label will be calculated for each data block according to its private key, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy data integrity detection method based on identities in cloud storage.The proxy data integrity detection method based on the identities in cloud storage comprises stepsthat a trusted third party (secret key generator) is used to generate a main private key and public parameters; the trusted third party PKG is used to generate corresponding private keys according todifferent identities of different users; clients can generate appointment certificates, and can sign the appointment certificates with the own private keys, and then transmit the appointment certificates and signatures to proxies and cloud servers; the clients can use the private keys to generate a data label for every data block, and can upload the data and the corresponding data labels to the cloud servers; the proxies are used to transmit challenges to the cloud servers, and the cloud servers are used to calculate integrity proofs according to challenge information, and return the integrityproofs to the proxies; the proxies can be used to verify the integrities of the data according to the proofs. According to the invention, by adopting the signatures based on the identities, public key certificate management and calculation costs of a system are reduced, and when the clients are refused to access the Internet, the trusted proxies can be designated to detect the integrities of thedata regularly, and therefore the usability of the system is improved.

Description

technical field [0001] The invention relates to cloud computing security technology, in particular to an identity-based proxy data integrity detection method in cloud storage. Background technique [0002] Cloud storage is a very important service form in cloud computing. It is a service that puts storage resources on cloud servers for people to access. [0003] In order to reduce the burden of maintaining data locally, customers store their data on cloud servers. At the same time, they can easily access data at any time and anywhere by connecting to the cloud through any network-connected device. [0004] Since the cloud server is untrustworthy, it may lose some data that customers seldom access or hardly access in order to save storage space, and may hide data loss in order to maintain its own reputation, so we need to verify the data before using the data. The data in the data is checked regularly. However, in some cases, the customer cannot personally verify the integr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/32
CPCH04L9/0861H04L9/3247H04L9/3271H04L63/0884H04L63/123H04L67/1097
Inventor 田苗苗曹杰王明慧
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products