Unlock instant, AI-driven research and patent intelligence for your innovation.

Integrity auditing method for deduplication storage data with different popularity

A technology for storing data and popularity, applied in the field of cloud computing security, can solve the problem that the authenticator can no longer complete the integrity check

Active Publication Date: 2021-02-12
QINGDAO UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authenticator originally stored on the cloud can no longer complete the integrity detection function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity auditing method for deduplication storage data with different popularity
  • Integrity auditing method for deduplication storage data with different popularity
  • Integrity auditing method for deduplication storage data with different popularity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The integrity audit method for deduplication and storage data proposed by the present invention includes five types of different entities: user, identity provider (IdP), cloud, index service (IS), third-party auditor (TPA) ). Users have a large amount of data that needs to be stored on the cloud and rely on the cloud to manage their data. Users can be individuals or organizations. An Identity Provider (IdP) issues an identity certificate to a user who has just joined the system. The primary role of an identity provider is to defend against sybil attacks by ensuring that each user can only register once. Cloud servers have abundant storage and computing resources. In order to improve storage efficiency, the cloud server stores only one copy of the same file from different users. The Indexing Service (IS) keeps records of how many different users have uploaded the same file. The indexing service also issues a unique file identifier for each file. Third-party auditor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an integrity audit method for deleted and restored data of different popularities, which, when the popularity changes, makes the cloud server replace a user newly generated authenticator in the case that the cloud server dose not know any privacy information of the user by researching the relationship of values between the initial authenticator and corresponding new authenticator, with no need of being always online by the user and no need of wasting computing resources to compute a new authenticator by the user.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and in particular relates to an integrity audit method for deduplicated stored data with different popularity. Background technique [0002] In recent years, with the development of network technology, massive amounts of data have appeared in real life, and the user's local storage space can no longer meet this storage demand. The emergence of cloud storage technology has solved this problem. With the advantages of on-demand services, ubiquitous network access, rapid resource deployment, and pay-per-use, cloud storage has become an ideal storage service model for people. Through cloud storage services, users can store a large amount of data in the cloud, and the cloud performs unified storage management on them, thereby saving local hardware expenditures and maintenance costs. In addition, no matter where the user is, they can access data at any time through Internet devices. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/08H04L63/123
Inventor 于佳侯慧莹郝蓉
Owner QINGDAO UNIV