Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud data multi-copy integrity verification and correlation deletion method and cloud storage system

An integrity verification, multi-copy technology, applied in cloud storage systems, cloud data multi-copy integrity verification and associated deletion fields, can solve the problem of data deletion without data security storage cloud multi-copy data integrity verification

Active Publication Date: 2018-08-17
XIDIAN UNIV
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In summary, the problems in the prior art are: At present, the data deletion technology in the cloud environment is still under research. The problem with the existing technology is that in the complete life cycle of cloud data, there are almost no solutions to simultaneously solve the problem of secure storage of data and integrity verification of multi-copy data in the cloud. and the question of verifiable data deletion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data multi-copy integrity verification and correlation deletion method and cloud storage system
  • Cloud data multi-copy integrity verification and correlation deletion method and cloud storage system
  • Cloud data multi-copy integrity verification and correlation deletion method and cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] The invention eliminates the user's management overhead for a large number of file keys in the traditional encryption scheme, improves the user's convenience in using cloud ciphertext data, solves the security backup problem of the user's outsourced data, and satisfies the user's requirements for cloud multi-copy data Integrity verification and associated deletion requirements.

[0044] Such as figure 1 As shown, the method for cloud data multi-copy integrity verification and associated deletion provided by the embodiment of the present invention includes the following steps:

[0045] S101: Initialization phase: T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud data security with a protocol as a feature, and discloses a cloud data multi-copy integrity verification and correlation deletion method and a cloud storage system. The method comprises the following steps that a user randomly generates a data key to encrypt a file copy, and meanwhile, the user encrypts a data key by using a control key issuedby a trusted third party, the key and a file ciphertext are outsourced to the cloud on the premise of guaranteeing safety; and the user creates a cloud file multi-copy association table, and utilizesa Merkle hash verification tree and a cloud data integrity verification and correlation deletion strategy combined with a user pre-designated random deletion sequence. According to the method and thesystem, the management expenditure of the user on a large number of file keys in a traditional encryption scheme is eliminated, the use convenience degree of the user about cloud ciphertext data is improved, a problem of safe backup of user outsourcing data is solved, and the integrity verification and association deletion requirements of the cloud multi-copy data by the user are met.

Description

technical field [0001] The invention belongs to the technical field of cloud data security characterized by protocols, and in particular relates to a method for verifying the integrity of multiple copies of cloud data and associated deletion, and a cloud storage system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the rapid development of network information technology, technical services represented by big data and cloud computing are increasingly favored by individual and enterprise users, and more and more users store personal and enterprise data in the cloud. Driven by the dual drive of user needs and enterprise service provision, cloud storage technology has received extensive attention in both academia and industry. However, while cloud storage brings convenience to users, there are also the following problems and challenges: 1) Cloud plaintext storage security issues. Cloud storage separates d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L63/123H04L67/1097
Inventor 陈晓峰都林张志为陶晓玲王勇
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More