Identity-based cloud storage efficient auditing method capable of acting and uploading data

A cloud storage and identity technology, applied in the field of cyberspace security, can solve problems such as inability to ensure data confidentiality and high computational overhead

Active Publication Date: 2018-10-26
SOUTHWEST PETROLEUM UNIV
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many cloud storage data security audit schemes with data integrity verification function have appeared, but there are very few cloud storage data security audit schemes that support data proxy uploading. Currently, there is only one construction scheme with this function, but this The scheme directly stores the original data of the data owner in the cloud server, which cannot ensure the confidentiality of the data, and the scheme is based on the bilinear pairing structure, and the calculation overhead is very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based cloud storage efficient auditing method capable of acting and uploading data
  • Identity-based cloud storage efficient auditing method capable of acting and uploading data
  • Identity-based cloud storage efficient auditing method capable of acting and uploading data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0052] see Figure 1-3 , the present invention provides a technical solution based on an identity-based cloud storage efficient audit method that can upload data by proxy:

[0053] like figure 1 As shown, an efficient audit method for cloud storage based on identity that can proxy upload data, including:

[0054] S1. Initialization step: set the parameters of the elliptic curve-based digital signature algorithm, hash function, symmetric encryption algorithm, pseudo-random function and pseudo-random numb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based cloud storage efficient auditing method capable of acting and uploading data, comprising: an initialization step, a proxy signer private key generating step,a data proxy signature generating and uploading step, and an auditing certificate generating and verifying step. The auditing method provided by the invention helps the data owner to authorize the proxy signer to generate the proxy signature of the data and upload the same to the cloud server, and helps the trusted auditor to perform integrity auditing on the cloud storage data. By compressing thedata file into a homomorphic message authentication code, using the elliptic curve signature algorithm to digitally sign the message authentication code of the data block, encrypting the data file with a lightweight stream password, and finally storing the signature set and the ciphertext in the cloud server, thus not only ensuring the confidentiality of data files, but effectively solving the problem of integrity verification of the remote cloud storage data.

Description

technical field [0001] The invention relates to the technical field of cyberspace security, in particular to an identity-based cloud storage efficient audit method that can upload data by proxy. Background technique [0002] With the rapid development of cloud computing and Internet of Things technologies, massive amounts of big data will be stored in remote cloud servers. In this developed network environment, how to ensure that the information sent by the information source is complete and has not been tampered with, and how to ensure the storage The integrity of the data on the cloud server is the focus of information security that people have paid attention to in recent years. Relevant cryptographic technology, digital signature technology, digital signature and security audit can effectively solve these information security problems. They play a vital role in establishing a complete security mechanism in the entire information domain, which is very important in today's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3236H04L9/3242H04L9/3252H04L63/0435H04L63/123
Inventor 张晓均赵芥牟黎明黄治杰何小曼李怀谷张经伟唐尧
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products