Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Efficient and Secure Outsourcing Big Data Audit Method in Cloud Environment

A cloud environment and big data technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of proving that information is not completely random, high computing overhead, insecurity, etc., to save storage overhead, low cost, etc. Communication cost, effect of low computational overhead

Active Publication Date: 2019-01-04
JINAN UNIVERSITY
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme is insecure, there are replay attacks, and the challenge information does not contain random values, so the proof information generated by the cloud server is not completely random
[0005] So far, most of the data audit schemes either have high computational overhead or have security problems. How to design an efficient and safe outsourced big data security audit scheme has become a key issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient and Secure Outsourcing Big Data Audit Method in Cloud Environment
  • An Efficient and Secure Outsourcing Big Data Audit Method in Cloud Environment
  • An Efficient and Secure Outsourcing Big Data Audit Method in Cloud Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Formal definition of an outsourced big data audit solution:

[0032] An efficient and secure outsourced big data auditing solution in a cloud environment consists of the following five polynomial time algorithms:

[0033] (1) System establishment algorithm Setup(1 λ ): Input security parameter λ, output system public parameter params and private key sk;

[0034](2) Tag generation algorithm TagBlock(params, sk, F): input system public parameter params, private key sk and file F. Assuming that the file F is divided into n blocks, each file block is represented as F[i] (1≤i≤n), and the output file label T i ;

[0035] (3) Challenge algorithm Challenge: output challenge information chal;

[0036] (4) Proof algorithm Proof(params, F, T i ,chal): input system public parameters params, file F, file label T i and challenge information chal, output proof information prf;

[0037] (5) Verification algorithm Verification(params, sk, chal, prf): input system public parameter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient and safe outsourcing big data audit method under a cloud environment, which is based on algebraic signature and exclusive-or homomorphic function, and adopts algebraic signature technology. Compared with the prior art, the invention has low calculation cost and communication cost. In addition, the invention introduces a trusted third-party auditor TTPA, which realizes large data integrity verification and effectively reduces the computational overhead of the data owner. The security proof shows that the proposed scheme can be proved to be secure under the security model. Performance analysis shows that compared with the existing scheme, the invention has less computational overhead for the server, and effectively reduces the communication cost in the calculation, storage and verification process of the verifier.

Description

technical field [0001] The invention relates to the technical field of security auditing of outsourced storage data in a cloud environment, in particular to an outsourced big data auditing scheme based on algebraic signatures and XOR homomorphic functions. Background technique [0002] With the development of networking and the explosive growth of data, the era of big data has arrived. Big data appears in all aspects of people's lives, including information records, trend analysis, and digital online services. Usually, these data are stored on the cloud server side and are managed by the cloud service provider. Because in the cloud computing environment, the cloud server is not completely trustworthy, for example, the cloud server may delete files that are rarely accessed to save storage costs, and the enterprise or individual outsources data to the cloud, which means that the enterprise or individual loses If you have full control over the data, then there are issues of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64H04L29/06H04L29/08
CPCG06F21/645H04L63/123H04L67/10
Inventor 王晓明甘庆晴晏嘉俊李素玉
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products