Cloud data sharing method based on block chain to realize anti-data tampering and user collusion

A data tampering and blockchain technology, applied in the field of cloud data sharing, can solve problems such as complex system processing steps and shared data tampering, and achieve the effect of solving untrustworthy problems and ensuring security and reliability

Active Publication Date: 2021-11-16
DONGHUA UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, if this method is adopted, the system processing steps will be complicated, and it is easy to cause problems such as tampering of shared data and collusion between malicious users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data sharing method based on block chain to realize anti-data tampering and user collusion
  • Cloud data sharing method based on block chain to realize anti-data tampering and user collusion
  • Cloud data sharing method based on block chain to realize anti-data tampering and user collusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the present invention more comprehensible, preferred embodiments are described in detail below with accompanying drawings.

[0030] Such as figure 1As shown, the model of this method is composed of three roles: data owner (data owner), cloud service provider (CSP), and user (user). (1) The data owner first encrypts the data, and then uploads it to the cloud server for sharing. The data owner consists of two roles: dedicated sharing and part-time sharing (user). That is, users in this scenario can also share all their own data. Among the data owners, a Data Owner Leader (Data Owner Leader, hereinafter referred to as DOL) is recommended according to the data sharing contribution rate, and is responsible for some work of data operation. In the scheme of the present invention, DOL is honest The role of the data sharer and responsible person. (2) The cloud service provider is responsible for the data storage of the data owner. The cloud service provider i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In recent years, as the application of the cloud has become more and more extensive, the problems of privacy leakage of cloud shared data have continued to occur at home and abroad. Most of the existing solutions are composed of a single sharer or a specific user. However, in actual data sharing scenarios, the shared data is usually provided by multiple data owners, which brings a series of new problems to the protection of data privacy, such as malicious tampering of shared data, shared data between malicious users, etc. conspiracy, and collusion between users and cloud service providers. The present invention proposes a cloud data sharing method based on block chains to realize anti-tampering and user collusion. This method realizes that the data will not be tampered with by malicious users during sharing by adopting the method of public accounting and smart contracts in the blockchain, and at the same time adopts the (p, t) threshold Paillier cryptosystem to realize the confidentiality of the shared data, which avoids malicious users. The problem of collusion between shared data.

Description

technical field [0001] The invention relates to a cloud data sharing method based on a block chain to realize anti-tampering of data and anti-collusion of users, and belongs to the fields of cloud data sharing, data privacy, and block chains. Background technique [0002] With the rapid development of network technology and cloud computing, the amount of corporate or personal data is increasing rapidly. In order to store and share data conveniently, more and more enterprises or individuals transfer their own data storage and sharing to cloud space. Compared with traditional information sharing and communication technologies, cloud computing has low energy consumption and efficient resource sharing. specialty. However, this has brought great challenges to information security such as data loss and privacy leakage. Moreover, when data is stored in the cloud, users will have no control over their personal data at all, which becomes an important consideration to ensure the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L29/08
CPCG06F21/602G06F21/604H04L67/02
Inventor 徐光伟马永东王文涛
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products