Unlock instant, AI-driven research and patent intelligence for your innovation.

Public cloud auditing method supporting full dynamic parallel operations of user and preventing leakage

An auditor and multiplication technology, which is applied in the direction of public key for secure communication, user identity/authority verification, secure communication device, etc., can solve the problem of not guaranteeing the confidentiality of data owner's data

Active Publication Date: 2019-03-26
广州市溢信科技股份有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme optimizes the data structure of the open cloud audit protocol based on the dynamic hash table, it does not guarantee the confidentiality of the data owner's data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public cloud auditing method supporting full dynamic parallel operations of user and preventing leakage
  • Public cloud auditing method supporting full dynamic parallel operations of user and preventing leakage
  • Public cloud auditing method supporting full dynamic parallel operations of user and preventing leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0201] Example 1: File Storage and Auditing

[0202] 1) build

[0203] 1.1) System parameter generation:

[0204] The cloud storage service provider CSP uses the parameter generation algorithm ParamGen(1 k )→(p,G,G T , g, e, H, N) generate system parameters cp and disclose the generated system parameters, specifically:

[0205] The cloud storage service provider CSP first selects an appropriate prime number generation algorithm, and generates a large prime number p according to the security parameter k, so that the binary bit length of the prime number p is greater than or equal to k;

[0206] Secondly, in the PBC cryptographic library environment, two p-order multiplicative cyclic groups G and G are randomly selected T , and select the generator g of the multiplicative cyclic group G, and specify a bilinear map e:G×G→G T ;

[0207] Then, use the Cryptopp cryptographic library to select a hash function H that is resistant to strong collisions, such as the MD5 algorithm o...

Embodiment 2

[0263] Embodiment 2: Dynamically update and verify based on the original storage file: insert data block

[0264] 2.1) Insertion preparation:

[0265] 2.1.1) The data owner DO determines to insert the data block d in the file F * =12, the new document is formalized as F'=F∪{d *}={2,3,6,13,12,5,4,8,11,15,7}, record D * ={d *}={12}; the data owner DO determines the set Y={1} consisting of the insert position index set X={5} in the file F and the number of data blocks to be inserted after each position, where X is A subset of the index set {1,2,...,10} of file F, Y={1} indicates the number of data blocks to be inserted after each position in X, this example is specifically described as: Insert 1 data block after 5 data blocks;

[0266] 2.1.2) Insert data block D * The version information initialization:

[0267] The data owner DO uses the data version information to initialize the algorithm VIGen(D * )→(VI * ) to create the version information VI corresponding to the ins...

Embodiment 3

[0305] Embodiment 3: Dynamically update and verify based on the original storage file: delete data block

[0306] 3.1) Preparation for deletion:

[0307] The data owner DO determines that the data block position index set X={6} to be deleted from the file F, where X is a subset of the position index set {1,2,...,n} of the file F, specifically described as: will delete The sixth data block of file F;

[0308] 3.2) Delete request:

[0309] The data owner DO sends a delete request message U to the cloud storage service provider CSP CSP =(delete,X), ie U CSP =(delete,6), and send another delete request message to the third-party auditor TPA which is Where delete means delete operation request;

[0310] 3.3) Return to delete data block:

[0311] Let the set of deleted data blocks be D # ={d 6}={4}, the cloud storage service provider CSP receives the delete request message U CSP After = (delete, 6), return the deleted data block set D to the data owner DO # ={d 6}={4},...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Publicly proving the integrity of outsourcing dynamic cloud storage data is always a focus and a difficulty of a public cloud auditing technology on the premise of protecting data confidentiality or privacy. The invention discloses a public cloud auditing method supporting full dynamic parallel operations of a user and preventing leakage. Firstly, the data authentication structure of a dynamic accumulator is introduced, so that a curious third party auditor is unable to obtain any data content about cloud outsourcing data regardless of how many audits are made by the third party auditor and regardless of whether each audit challenge block is repeated, the risk of leaking the privacy of the challenge data block is ingeniously circumvented, and the function of preventing the data leakage isachieved; secondly, a dynamic hash table with double chains and the dynamic accumulator are combined, so that the user can perform the full dynamic parallel operations of inserting, deleting, and modifying on the outsourcing storage data remotely, and the method has the function of verifying whether the dynamic update operation is performed correctly.

Description

technical field [0001] The invention belongs to the technical field of outsourced cloud storage data security in cloud computing, and specifically relates to an anti-leakage public cloud audit method that supports dynamic operations of users based on a dynamic accumulator. Background technique [0002] Cloud storage is an important branch of cloud computing, which allows data owners (Data Owner, DO) to store data remotely in the cloud, and provides users with powerful outsourced computing and storage services. In recent years, due to increasingly powerful processors, abundant bandwidth resources, and flexible network connections, more and more customers choose to outsource data to cloud service providers (Cloud Server Provider, CSP), in order to alleviate local purchase of hardware, Investment in human and material resources such as data maintenance. Although this new data storage model is considered to be a promising service platform on the Internet, the highly concentrate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/08
CPCH04L9/0869H04L9/3033H04L9/3073H04L9/3236H04L9/3247H04L9/3271H04L67/1097
Inventor 李艳平吴姣姣梁岩荣
Owner 广州市溢信科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More