Supercharge Your Innovation With Domain-Expert AI Agents!

Data integrity verification method in cloud storage based on identity

A data integrity and verification method technology, applied in the field of data integrity verification in identity-based cloud storage, can solve the problems of low efficiency of data integrity verification and high cost of data integrity verification, so as to reduce computing burden, reduce cost, The effect of improving verification efficiency

Active Publication Date: 2018-09-14
XIDIAN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the deficiencies of the above-mentioned prior art, and propose an identity-based data integrity verification method in cloud storage, which is used to solve the problems of high cost of data integrity verification and low efficiency of data integrity verification in the prior art technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity verification method in cloud storage based on identity
  • Data integrity verification method in cloud storage based on identity
  • Data integrity verification method in cloud storage based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0041] refer to figure 1 , an identity-based data integrity verification method in cloud storage, comprising the steps of:

[0042] Step 1) The user sets the verification system parameters and obtains the master key msk of the verification system:

[0043] Step 1a) The user sets the verification system parameters:

[0044] User-defined authentication system finite field F p The elliptic curve on E p (a,b), elliptic curve E p The base point of (a,b) is G, where a and b represent the coefficients of the elliptic curve, and p represents the finite field F p The number of elements contained is an odd prime number, and q represents the odd prime number order of the base point G;

[0045] User-defined authentication system finite field F p for F 37 , set the finite field F 37 The elliptic curve on E 37 (1,1), the base point G is (0,1), wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data integrity verification method in cloud storage based on identity, which is used to solve the technical problem that the data integrity verification cost is too high and the data integrity verification efficiency is low in the prior art, comprising the implementation steps that: a user sets verify system parameters and obtains a system master key; the user acquires hisown private key and public key, data label key and verification key; the user divides the data to be uploaded into blocks; the user calculates the data labels corresponding to each data block, and sends the data blocks and corresponding data labels to cloud storage; a trusted third party initiates data integrity verification challenges; the cloud storage acquires challenge data block certificatesand label certificates; and the trusted third party verifies the data integrity and sends the verification results to the user. The invention reduces the cost of data integrity verification and improves the efficiency of data integrity verification.

Description

technical field [0001] The invention belongs to the technical field of cloud storage security, and relates to a data integrity verification method in cloud storage, in particular to an identity-based data integrity verification method in cloud storage, which can be used in the field of safe outsourcing storage of data. Background technique [0002] With the rapid development of Internet technology, users began to participate in the production and editing of information, which caused the exponential growth of the user's personal data, resulting in a gradual increase in the cost of data storage and management. When personal computers are not enough to save the user's massive data, cloud storage Technology ensues. Cloud storage is a new concept extended and developed from the concept of cloud computing. It is an emerging network storage technology. It is a system in which various storage devices work together through application software to jointly provide data storage and bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/06H04L9/30
CPCH04L9/0643H04L9/0866H04L9/0869H04L9/3066H04L9/32H04L9/321H04L9/3236H04L9/3271H04L9/3297
Inventor 卢珂王保仓詹宇刘鹤群高梓渊柴延廷
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More