A cloud environment data integrity verification method based on fully homomorphic encryption

A data integrity, fully homomorphic encryption technology, applied in the field of information security, can solve the problems of inappropriate cloud storage massive data service mode, does not support public verification, high computational overhead, etc., to reduce communication overhead, achieve significant effects, logically tight effect

Active Publication Date: 2021-07-16
HENAN UNIV OF SCI & TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Only a limited number of data integrity verifications can be performed;
[0006] 2. Most data integrity verification schemes are based on public key encryption technology, which has too much computational overhead;
[0007] 3. Some schemes do not support public verification;
[0008] 4. Some solutions are not suitable for cloud storage massive data service model issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud environment data integrity verification method based on fully homomorphic encryption
  • A cloud environment data integrity verification method based on fully homomorphic encryption
  • A cloud environment data integrity verification method based on fully homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Specific examples are given below to further describe the technical solution of the present invention in a clear, complete and detailed manner. This embodiment is the best embodiment on the premise of the technical solution of the present invention, but the protection scope of the present invention is not limited to the following embodiments.

[0040] During the actual implementation of the present invention, the cloud storage server sends the calculated integrity proof to the user without including files or subsets of the files. Carry out verification calculations, and judge whether the target data block of this verification maintains integrity in the cloud according to the results of local calculations. Diffie-Hellman scheme, RSA scheme and bilinear pairing are common algorithms with homomorphic properties in this type of protocol.

[0041] Such as figure 1 As shown, a method for verifying data integrity in a cloud environment based on fully homomorphic encryption i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for verifying data integrity in a cloud environment based on fully homomorphic encryption, including the steps of initializing parameters, initializing secret keys, generating homomorphic tags, storing files and tags, users initiating verification challenges, generating integrity evidence, and verifying integrity evidence ; Adopt fully homomorphic encryption algorithm and mixed data dynamic data operation algorithm to perform data encryption, security verification and performance optimization respectively, so as to achieve the purpose of verifying the security of data stored on the cloud platform. The verification method first uses the method of fully homomorphic encryption to generate homomorphic tags; secondly, uses the homomorphic tags to verify the integrity of data remotely; thirdly, uses the analysis method of dynamic operation of mixed data to perform dynamic operations on encrypted data; Finally, safety analysis is carried out. Not only can it efficiently support users' multi-granularity dynamic operations, but it can also reduce the communication overhead of users performing dynamic operations and auditors performing remote data integrity verification processes.

Description

technical field [0001] The invention relates to the technical field of information security, and more specifically, relates to a method for verifying data integrity in a cloud environment based on fully homomorphic encryption. Background technique [0002] Essentially, data in big data applications is dynamic, such as surveillance data, Internet data, etc. In fact, except for some large static data, such as libraries and electronic archives, the data in large data applications has been continuously updated. In many applications, data updates are very frequent, such as social networking and business transactions. Therefore, it is very important for cloud security mechanisms, such as a public audit scheme, to effectively support data in motion. Security issues mainly involve three aspects: integrity, confidentiality and availability. For integrity, public auditing or auditing of cloud data, i.e. verifying data integrity from external organizations, has been a widely investi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
CPCH04L9/008H04L63/123
Inventor 吴庆涛朱军龙宁召柯张明川郑瑞娟张静杰陈军亚孟维鸣王倩玉
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products