Integrity auditing method for deduplication storage data with different popularity
A technology for storing data and popularity, applied in the field of cloud computing security, can solve the problem that the authenticator can no longer complete the integrity check
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The integrity audit method for deduplication and storage data proposed by the present invention includes five types of different entities: user, identity provider (IdP), cloud, index service (IS), third-party auditor (TPA) ). Users have a large amount of data that needs to be stored on the cloud and rely on the cloud to manage their data. Users can be individuals or organizations. An Identity Provider (IdP) issues an identity certificate to a user who has just joined the system. The primary role of an identity provider is to defend against sybil attacks by ensuring that each user can only register once. Cloud servers have abundant storage and computing resources. In order to improve storage efficiency, the cloud server stores only one copy of the same file from different users. The Indexing Service (IS) keeps records of how many different users have uploaded the same file. The indexing service also issues a unique file identifier for each file. Third-party auditor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


