Group data completeness verification method based on proxy

A technology of data integrity and verification method, which is applied in proxy-based group data integrity verification and cloud group security, and can solve the problems of no encryption primitive and unforgeability

Active Publication Date: 2018-10-16
SOUTHEAST UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Unforgeability
The current scheme can meet the requirements (1), (2). However, the requirements (3) (4) are still widely ignored, which leads to the fact that the current group data integrity verification scheme cannot be well applied in practice.
More importantly, in focusing on this research topic, we found no cryptographic primitives that can be directly applied to solve all the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group data completeness verification method based on proxy
  • Group data completeness verification method based on proxy
  • Group data completeness verification method based on proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0043] Data integrity verification protocol system model, such as figure 1 As shown, four entities are included: group users (data owner and data user), storage server, proxy Proxy, and third-party audit TPA.

[0044] The present invention includes four major parts: an initialization stage, a data outsourcing stage, an integrity verification stage, and a group user member update stage.

[0045] The process of the initialization phase is as follows figure 2 As shown, the system first initializes the public parameters, the data owner generates its own private key, public key, and other key parameters, and sends the key parameters to TPA and data users, and the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a group data completeness verification method based on a proxy. The method comprises an initializing stage, a data outsourcing stage, a completeness verification stage and a group user member updating stage. According to the method, users (owners and users of data) of each group are helped in data block signature computing by introducing a proxy Proxy in a system model, whendata completeness verification is conducted by TPA, any identification information of group users is not needed, completeness verification can be conducted by using the public key of the proxy Proxy,and therefore the identification privacy of group users is effectively guaranteed. The data block signatures of the group members are calculated through the proxy Proxy, the private key of the proxyProxy is unknown, so that even the originally uploaded data block signatures which are revoked of the group members are still illegal, the data block signatures do not need to be computed through other group legal members again, expenditure is reduced, and dynamic groups can be efficiently supported.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to cloud group security technology, and more specifically, relates to an agent-based group data integrity verification method. Background technique [0002] Nowadays, with the rapid development of cloud storage technology, it is gradually becoming common for multiple users to share data in the cloud. Group sharing data usually means that initially a data owner outsources the data file to the storage server, and then multiple data users join the group to share the outsourced data file, the data owner and the data user Both are members of the group users. Since multiple users share (access, modify, delete) data files at the same time, it is necessary to design a data integrity verification protocol suitable for group sharing data to ensure that the data stored on the remote server has not been tampered with or lost by attackers. [0003] At present, with regard to data integrity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/645
Inventor 万长胜袁梦
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products