Cloud data integrity detection method and system based on block chain
A technology of data integrity and blockchain, applied in the field of cloud storage, to achieve widely applicable effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The integrity detection method of the block chain-based cloud data provided by the present invention, such as figure 1 As shown, the main steps include:
[0033] [101] Step 1: The user uses an encryption algorithm and an erasure code to process the file to obtain multiple file blocks.
[0034] The processing includes encrypting the file. The purpose of encrypting the file is to prevent the data content from being accessed by untrusted users. In the cloud storage scenario, the user's files may contain private and confidential information, and the user does not trust the cloud service provider. Therefore, in order to prevent the cloud service provider from reading the content of the user's file and ensure data security, the file needs to be encrypted before uploading.
[0035] Specifically, the encryption process may choose to use a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the file according to different scenarios. When the files ...
Embodiment 2
[0084] Another embodiment of the present invention also provides a cloud data integrity detection system, such as image 3 As shown, the system includes: user upload module, cloud acceptance module, user detection module and cloud detection module. in,
[0085] The user upload module is used to process the file and upload it to the cloud acceptance module. For specific methods, please refer to steps 101, 102 and 103 in Example 1;
[0086] The cloud acceptance module is used for the cloud to verify the received data block and digital signature. If the verification is successful, the data block will be re-signed and uploaded to the blockchain network, and the address returned by the blockchain network will be returned Pass the user upload module, the specific method can refer to steps 104 and 105 in Example 1;
[0087] The user detection module is used for the user to verify the integrity of the cloud data, obtain the stored data from the cloud acceptance module, and the block...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com