Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Cloud Data Sharing Method Based on Block Chain to Realize Data Tampering Resistance and User Collusion

A data tampering and blockchain technology, applied in the field of cloud data sharing, can solve the problems of shared data tampering and complex system processing steps, and achieve the effect of solving untrustworthy problems and ensuring security and reliability.

Active Publication Date: 2019-01-04
DONGHUA UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, if this method is adopted, the system processing steps will be complicated, and it is easy to cause problems such as tampering of shared data and collusion between malicious users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud Data Sharing Method Based on Block Chain to Realize Data Tampering Resistance and User Collusion
  • Cloud Data Sharing Method Based on Block Chain to Realize Data Tampering Resistance and User Collusion
  • Cloud Data Sharing Method Based on Block Chain to Realize Data Tampering Resistance and User Collusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the present invention more comprehensible, preferred embodiments are described in detail below with accompanying drawings.

[0030] Such as figure 1 As shown, the model of this method is composed of three roles: data owner (data owner), cloud service provider (CSP), and user (user). (1) The data owner first encrypts the data, and then uploads it to the cloud server for sharing. The data owner consists of two roles: dedicated sharing and part-time sharing (user). That is, users in this scenario can also share all their own data. Among the data owners, a Data Owner Leader (Data Owner Leader, hereinafter referred to as DOL) is recommended according to the data sharing contribution rate, and is responsible for some work of data operation. In the scheme of the present invention, DOL is honest The role of the data sharer and responsible person. (2) The cloud service provider is responsible for the data storage of the data owner. The cloud service provider is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In recent years, with the application of cloud more and more widely, the problem of privacy leakage of cloud sharing data is constantly occurring at home and abroad. Privacy leakage in cloud data sharing has become the focus of attention, and relevant solutions are constantly proposed. Most of the existing schemes are composed of a single shareholder or a specific user. However, in actual data sharing scenarios, the shared data is usually provided by multiple data owners, which brings a series of new problems to protect the privacy of the data, such as malicious tampering of the shared data, collusion between malicious users, and collusion between users and cloud service providers. The invention provides a cloud data sharing method based on block chain for realizing data tampering prevention and user conspiracy. The method realizes that the data is not tampered with by malicious users when sharing by adopting the method of public bookkeeping and intelligent contract in the block chain,and realizes the confidentiality of the shared data by adopting a (p, t) threshold Paillier cryptosystem, thereby avoiding the problem that malicious users collude to steal the shared data.

Description

technical field [0001] The invention relates to a cloud data sharing method based on a block chain to realize anti-tampering of data and anti-collusion of users, and belongs to the fields of cloud data sharing, data privacy, and block chains. Background technique [0002] With the rapid development of network technology and cloud computing, the amount of corporate or personal data is increasing rapidly. In order to store and share data conveniently, more and more enterprises or individuals transfer their own data storage and sharing to cloud space. Compared with traditional information sharing and communication technologies, cloud computing has low energy consumption and efficient resource sharing. specialty. However, this has brought great challenges to information security such as data loss and privacy leakage. Moreover, when data is stored in the cloud, users will have no control over their personal data at all, which becomes an important consideration to ensure the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L29/08
CPCG06F21/602G06F21/604H04L67/02
Inventor 徐光伟马永东王文涛
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products