Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient Auditing Method for Cloud Storage Based on Identity-Based Proxy Upload Data

A cloud storage and identity technology, applied in the field of cyberspace security, can solve problems such as inability to ensure data confidentiality and high computational overhead

Active Publication Date: 2020-12-22
SOUTHWEST PETROLEUM UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many cloud storage data security audit schemes with data integrity verification function have appeared, but there are very few cloud storage data security audit schemes that support data proxy uploading. Currently, there is only one construction scheme with this function, but this The scheme directly stores the original data of the data owner in the cloud server, which cannot ensure the confidentiality of the data, and the scheme is based on the bilinear pairing structure, and the calculation overhead is very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient Auditing Method for Cloud Storage Based on Identity-Based Proxy Upload Data
  • Efficient Auditing Method for Cloud Storage Based on Identity-Based Proxy Upload Data
  • Efficient Auditing Method for Cloud Storage Based on Identity-Based Proxy Upload Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0050] refer to Figure 1-3 , the present invention provides a technical solution based on an identity-based proxy upload data cloud storage efficient audit method:

[0051] Such as figure 1 As shown, an efficient identity-based cloud storage audit method that can proxy uploaded data includes:

[0052] S1. Initialization step: setting the parameters of the elliptic curve-based digital signature algorithm, hash function, symmetric encryption algorithm, pseudo-random function and pseudo-random number generator.

[0053...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based cloud storage efficient auditing method capable of acting and uploading data, comprising: an initialization step, a proxy signer private key generating step,a data proxy signature generating and uploading step, and an auditing certificate generating and verifying step. The auditing method provided by the invention helps the data owner to authorize the proxy signer to generate the proxy signature of the data and upload the same to the cloud server, and helps the trusted auditor to perform integrity auditing on the cloud storage data. By compressing thedata file into a homomorphic message authentication code, using the elliptic curve signature algorithm to digitally sign the message authentication code of the data block, encrypting the data file with a lightweight stream password, and finally storing the signature set and the ciphertext in the cloud server, thus not only ensuring the confidentiality of data files, but effectively solving the problem of integrity verification of the remote cloud storage data.

Description

technical field [0001] The invention relates to the technical field of network space security, in particular to an efficient identity-based cloud storage audit method that can upload data on behalf of an agent. Background technique [0002] With the rapid development of cloud computing and Internet of Things technology, massive big data will be stored in remote cloud servers. In this developed network environment, how to ensure that the information sent by the information source is complete and has not been tampered with? The integrity of the data on the cloud server, these are the focal issues of information security that people have paid attention to in recent years. Relevant cryptography technology, digital signature technology, digital signature and security audit can effectively solve these information security problems, and they play a vital role in establishing a complete security mechanism in the entire information field. Particularly important. [0003] In some sp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3236H04L9/3242H04L9/3252H04L63/0435H04L63/123
Inventor 张晓均赵芥牟黎明黄治杰何小曼李怀谷张经伟唐尧
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products