Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data integrity verification method supporting key updating and third-party privacy protection

A data integrity and key update technology, applied in the field of cloud storage security, can solve the problems of lack of encryption primitives, unforgeability, and inability to update keys, and achieve the effect of reducing computational overhead and communication overhead

Inactive Publication Date: 2018-11-06
SOUTHEAST UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Unforgeability
[0005] Obviously, it is an important task to design a data integrity verification protocol that can support key update and third-party privacy protection. First, the data privacy and security issues of data sources are very important. Second, if resource-constrained data sources are outsourced A large amount of data is stored, and key renewal cannot be performed through traditional methods
The current scheme can meet the requirements (1), (2). However, the requirements (3) (4) are still widely ignored, which leads to the fact that the current data integrity verification scheme cannot be well applied in practice.
More importantly, in focusing on this research topic, we found no cryptographic primitives that can be directly applied to solve all the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity verification method supporting key updating and third-party privacy protection
  • Data integrity verification method supporting key updating and third-party privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions provided by the present invention will be described in detail below in conjunction with specific embodiments. It should be understood that the following specific embodiments are only used to illustrate the present invention and not to limit the scope of the present invention.

[0035] The data integrity verification method that supports key update and third-party privacy protection provided by the present invention is implemented based on the data integrity verification protocol system model, such as figure 1 As shown, the model includes three entities: data source, storage server and third-party audit TPA.

[0036] The method of the present invention includes three major contents: initialization and data outsourcing stage, data audit stage, and key update stage.

[0037] Such as figure 2 As shown, in the initialization and data outsourcing stage, the public parameters are first initialized, the key parameters are generated by the data source, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data integrity verification method supporting key updating and third-party privacy protection. The data integrity verification method comprises an initialization and data outsourcing stage, a data auditing stage and a key updating stage. On the basis that a proxy re-signature technology substitutes a traditional key updating method in an existing scheme, a storage serverutilizes a re-signature key to achieve updating of data block signature, the computation cost and the communication cost of data sources are effectively lowered, and it can be ensured that TPA cannotobtain privacy data contents of the data sources in the process of integrity verification; and thus the data integrity verification method achieves the safety purpose required by data integrity verification.

Description

Technical field [0001] The invention belongs to the technical field of cloud storage security, and relates to a data integrity verification method, and more specifically, is a method for supporting key update and data integrity verification related to cloud storage security. Background technique [0002] Nowadays, cloud storage has been widely used. In order to ensure the security of outsourcing data files from various data sources (such as laptops, smart phones, websites, etc.) to storage servers, it is necessary to design data integrity verification methods to ensure storage on remote servers. The data above has not been tampered with or lost by the attacker. [0003] At present, the amount of data generated by data sources and outsourced storage has grown exponentially. However, due to the limited computing power of data sources, the introduction of a third-party audit TPA as a verifier for integrity verification has become a common strategy for serious integrity agreements. . ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/083H04L9/0869H04L9/0891H04L9/3247H04L63/123
Inventor 万长胜袁梦
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products