A blockchain-based cloud data integrity detection method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data integrity, data integrity technology, applied in the field of cloud storage
Active Publication Date: 2021-07-06
NANKAI UNIV
View PDF7 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Every node in the blockchain network can share the entity, but no node can control the modification of the entity
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0047] The integrity detection method of the block chain-based cloud data provided by the present invention, such as
[0048] figure 1 As shown, the main steps include:
[0049] Step 1: The user processes the file using an encryption algorithm and an erasure code to obtain multiple file blocks.
[0050] The processing includes encrypting the file. The purpose of encrypting the file is to prevent the data content from being accessed by untrusted users. In the cloud storage scenario, the user's files may contain private and confidential information, and the user does not trust the cloud service provider. Therefore, in order to prevent the cloud service provider from reading the content of the user's file and ensure data security, the file needs to be encrypted before uploading.
[0051] Specifically, the encryption process may choose to use a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the file according to different scenarios. When the fi...
Embodiment 2
[0100] Another embodiment of the present invention also provides a cloud data integrity detection system, such as Figure 4 As shown, the system includes: user upload module, cloud acceptance module, user detection module and cloud detection module. in,
[0101] The user upload module is used to process the file and upload it to the cloud acceptance module. For specific methods, please refer to steps 101, 102 and 103 in Example 1;
[0102] The cloud acceptance module is used for the cloud to verify the received data block and digital signature. If the verification is successful, the data block will be re-signed and uploaded to the blockchain network, and the address returned by the blockchain network will be returned Pass the user upload module, the specific method can refer to steps 104 and 105 in Example 1;
[0103] The user detection module is used for the user to verify the integrity of the cloud data, obtain the stored data from the cloud acceptance module, and the bloc...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
A blockchain-based data integrity detection method and system. Including: 1. The user uses an encryption algorithm and an erasure code to process the file to obtain multiple file blocks. 2. The user signs each obtained file block with the user's private key. 3. The user uploads the obtained data block and signature to the cloud. 4. The cloud uses a signature verification algorithm to verify the received data block and its digital signature. 5. If the verification in 4 is successful, the cloud will save the received data block and its signature, and use the cloud private key to perform a secondary signature on the data block signature, publish it to the blockchain, and return the corresponding storage address to the user. 6. The user uses the hash algorithm, the user's private key and cloud public key described in 2, and the storage address described in 5 to verify the integrity of the cloud data. 7. The cloud uses the hash algorithm, user public key and cloud public key, and the storage address described in 5 to verify the integrity of the data.
Description
【Technical field】 [0001] The invention belongs to the technical field of cloud storage, and in particular relates to a method and system for detecting the integrity of cloud data. 【Background technique】 [0002] Cloud storage is a data service model in which data is maintained and managed by a third-party cloud service provider. In order to guarantee the availability of cloud storage, users need to pay for the service regularly so that they can access data on any smart device. Due to the increasing amount of data and the limitation of personal storage devices, cloud storage is widely used by various customers, including individual users and business users. Cloud storage technology has brought a lot of convenience to people's life, however, cloud storage service failures occur from time to time. In the process of data storage and transmission, user data errors are caused by network transmission errors or hacker attacks and administrator misoperations, so that the integrity ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.