Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud environment distributed hash chain architecture and cloud data integrity verification method

A distributed hash and integrity verification technology, applied in the field of cloud computing and information security, can solve problems such as increasing the threat of data leakage to third parties

Active Publication Date: 2020-12-15
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the integrity of cloud data, most of the current protection mechanisms rely on trusted third-party audit institutions, increasing the threat of data leakage to third parties, and the threat of collusion between cloud service providers and third-party organizations cannot be avoided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud environment distributed hash chain architecture and cloud data integrity verification method
  • A cloud environment distributed hash chain architecture and cloud data integrity verification method
  • A cloud environment distributed hash chain architecture and cloud data integrity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Embodiments of the invention are described in detail below, examples of which are illustrated in the accompanying drawings. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0051] The present invention designs a cloud environment distributed hash chain architecture. The nodes involved are functionally divided into two categories: virtual machine proxy nodes and storage nodes. When a user submits a storage task, the virtual machine proxy node is responsible for file Perform preprocessing, select the appropriate storage node to save the data, and after all the storage is completed, the virtual machine agent node will return the result to the user.

[0052] In order to apply to complex services in the cloud distributed environment and enhance the portability of the model, the present invention first runs a special container on the node to prep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud environment distributed hash chain framework and a cloud data integrity verification method. According to the invention, a virtual machine of a user is expanded and then a virtual machine agent model is obtained. In this way, a whole design system is enabled to be good in flexibility, cross-platform performance and expansibility. After that, a distributed hash chainis built in combination with the cloud multi-user characteristic environment. Through the information exchange among multiple users, an action protocol consensus is achieved so as to complete the trusted integrity verification. The invention further relates to a data integrity monitoring and verification method based on the cloud environment distributed hash chain framework. The virtual machine agent technology is adopted to maintain the distributed hash chain on the basis of the cloud environment. Therefore, data can be monitored in real time, and the integrity of the data can be effectivelyguaranteed. The actual working safety and the efficiency can be improved.

Description

technical field [0001] The invention relates to a cloud environment distributed hash chain architecture and a cloud data integrity verification method, belonging to the technical field of cloud computing and information security. Background technique [0002] Cloud computing is a computing model that uses the Internet to access shared resource pools (such as computing facilities, storage devices, applications, etc.) anytime, anywhere, on-demand, and quickly, and provides users with pay-as-you-go. Cloud storage is a cloud computing system centered on data storage and management. Users can access cloud data anytime, anywhere, through any network-connected device. However, the unique centralized storage method of cloud data has resulted in the separation of user ownership and management rights, bringing potential security risks of data theft and destruction. [0003] The problem of cloud data integrity has become a research focus. On the one hand, cloud service providers may ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06G06F21/64
CPCG06F21/64H04L9/0643H04L63/123
Inventor 徐小龙刘广沛
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products