A Proxy-Based Group Data Integrity Verification Method

A data integrity and verification method technology, which is applied in the field of cloud group security and proxy-based group data integrity verification, can solve the problems of no encryption primitive and unforgeability, so as to reduce overhead, ensure identity privacy, Efficient support for dynamic group effects

Active Publication Date: 2021-12-28
SOUTHEAST UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Unforgeability
The current scheme can meet the requirements (1), (2). However, the requirements (3) (4) are still widely ignored, which leads to the fact that the current group data integrity verification scheme cannot be well applied in practice.
More importantly, in focusing on this research topic, we found no cryptographic primitives that can be directly applied to solve all the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Proxy-Based Group Data Integrity Verification Method
  • A Proxy-Based Group Data Integrity Verification Method
  • A Proxy-Based Group Data Integrity Verification Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0043] Data integrity verification protocol system model, such as figure 1 As shown, four entities are included: group users (data owner and data user), storage server, proxy Proxy, and third-party audit TPA.

[0044] The present invention includes four major parts: an initialization stage, a data outsourcing stage, an integrity verification stage, and a group user member update stage.

[0045] The process of the initialization phase is as follows figure 2 As shown, the system first initializes the public parameters, the data owner generates its own private key, public key, and other key parameters, and sends the key parameters to TPA and data users, and the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes an agent-based group data integrity verification method, which includes: an initialization stage, a data outsourcing stage, an integrity verification stage, and a group user member update stage. The present invention helps to calculate the data block signature for each group user (data owner and data user) by introducing a proxy Proxy in the system model, and TPA does not need any identity of the group user when performing data integrity verification Only the public key of the proxy Proxy is needed to verify the integrity of the information, which effectively guarantees the identity privacy of the group users. Since group users calculate data block signatures through Proxy, and do not know the private key of Proxy, even the original uploaded data block signatures of revoked group members are still legal, and there is no need to re-apply through other groups to be legal. Membership computes block signatures, reducing overhead and efficiently supporting dynamic groups.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to cloud group security technology, and more specifically, relates to an agent-based group data integrity verification method. Background technique [0002] Nowadays, with the rapid development of cloud storage technology, it is gradually becoming common for multiple users to share data in the cloud. Group sharing data usually means that initially a data owner outsources the data file to the storage server, and then multiple data users join the group to share the outsourced data file, the data owner and the data user Both are members of the group users. Since multiple users share (access, modify, delete) data files at the same time, it is necessary to design a data integrity verification protocol suitable for group sharing data to ensure that the data stored on the remote server has not been tampered with or lost by attackers. [0003] At present, with regard to data integrity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64
CPCG06F21/645
Inventor 万长胜袁梦
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products