Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud data integrity detection method and system based on block chain

A technology of data integrity and blockchain, applied in the field of cloud storage, to achieve widely applicable effects

Active Publication Date: 2019-01-11
NANKAI UNIV
View PDF7 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Every node in the blockchain network can share the entity, but no node can control the modification of the entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data integrity detection method and system based on block chain
  • Cloud data integrity detection method and system based on block chain
  • Cloud data integrity detection method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The integrity detection method of the block chain-based cloud data provided by the present invention, such as figure 1 As shown, the main steps include:

[0033] [101] Step 1: The user uses an encryption algorithm and an erasure code to process the file to obtain multiple file blocks.

[0034] The processing includes encrypting the file. The purpose of encrypting the file is to prevent the data content from being accessed by untrusted users. In the cloud storage scenario, the user's files may contain private and confidential information, and the user does not trust the cloud service provider. Therefore, in order to prevent the cloud service provider from reading the content of the user's file and ensure data security, the file needs to be encrypted before uploading.

[0035] Specifically, the encryption process may choose to use a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the file according to different scenarios. When the files ...

Embodiment 2

[0084] Another embodiment of the present invention also provides a cloud data integrity detection system, such as image 3 As shown, the system includes: user upload module, cloud acceptance module, user detection module and cloud detection module. in,

[0085] The user upload module is used to process the file and upload it to the cloud acceptance module. For specific methods, please refer to steps 101, 102 and 103 in Example 1;

[0086] The cloud acceptance module is used for the cloud to verify the received data block and digital signature. If the verification is successful, the data block will be re-signed and uploaded to the blockchain network, and the address returned by the blockchain network will be returned Pass the user upload module, the specific method can refer to steps 104 and 105 in Example 1;

[0087] The user detection module is used for the user to verify the integrity of the cloud data, obtain the stored data from the cloud acceptance module, and the block...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a cloud data integrity detection method and system based on a block chain. The method comprises the steps of: 1. allowing a user to employ the encryption algorithm and erasure codes to process files to obtain a plurality of file blocks; 2. performing signature of each obtained file block by the user through adoption of user private keys; 3. uploading the obtained data blocks and the signatures to a cloud by the user; 4. employing a signature verification algorithm to perform verification of the received data blocks and the digital signatures thereof by the cloud;5. if the verification is successful in the step 4, storing the received data blocks and the signatures thereof by the cloud, and employing the cloud private keys to perform secondary signatures forthe data block signatures and publish the data blocks into the block chain, and returning corresponding storage addresses to the user; 6. employing the Hash algorithm, the user private keys and the cloud public keys in the step 2 and the storage addresses in the step 5 to perform integrity checking of the cloud data by the user; and 7. employing the Hash algorithm, the user public keys, the cloudpublic keys and the storage addresses in the step 5 to perform integrity checking of the data by the user.

Description

【Technical field】 [0001] The invention belongs to the technical field of cloud storage, and in particular relates to a method and system for detecting the integrity of cloud data. 【Background technique】 [0002] Cloud storage is a data service model in which data is maintained and managed by a third-party cloud service provider. In order to guarantee the availability of cloud storage, users need to pay for the service regularly so that they can access data on any smart device. Due to the increasing amount of data and the limitation of personal storage devices, cloud storage is widely used by various customers, including individual users and business users. Cloud storage technology has brought a lot of convenience to people's life, however, cloud storage service failures occur from time to time. In the process of data storage and transmission, user data errors are caused by network transmission errors or hacker attacks and administrator misoperations, so that the integrity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/32H04L29/06H04L29/08
CPCH04L9/0631H04L9/0643H04L9/3247H04L63/123H04L67/1097
Inventor 刘晓光王国浩王刚阎萌凤佳琦
Owner NANKAI UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More