Unlock instant, AI-driven research and patent intelligence for your innovation.

An Anti-Leakage Public Cloud Auditing Method Supporting Full Dynamic Parallel Operations of Users

An auditor and multiplication technology, applied in the direction of public keys for secure communication, user identity/authority verification, secure communication devices, etc., can solve the problems of not guaranteeing data confidentiality of data owners, and achieve reliable audit results and low storage Overhead, good performance effects

Active Publication Date: 2021-11-02
广州市溢信科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme optimizes the data structure of the open cloud audit protocol based on the dynamic hash table, it does not guarantee the confidentiality of the data owner's data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Anti-Leakage Public Cloud Auditing Method Supporting Full Dynamic Parallel Operations of Users
  • An Anti-Leakage Public Cloud Auditing Method Supporting Full Dynamic Parallel Operations of Users
  • An Anti-Leakage Public Cloud Auditing Method Supporting Full Dynamic Parallel Operations of Users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0201] Example 1: File Storage and Auditing

[0202] 1) build

[0203] 1.1) System parameter generation:

[0204] The cloud storage service provider CSP uses the parameter generation algorithm ParamGen(1 k )→(p,G,G T , g, e, H, N) generate system parameters cp and disclose the generated system parameters, specifically:

[0205] The cloud storage service provider CSP first selects an appropriate prime number generation algorithm, and generates a large prime number p according to the security parameter k, so that the binary bit length of the prime number p is greater than or equal to k;

[0206] Secondly, in the PBC cryptographic library environment, two p-order multiplicative cyclic groups G and G are randomly selected T , and select the generator g of the multiplicative cyclic group G, and specify a bilinear map e: G×G→G T ;

[0207] Then, use the Cryptopp cryptographic library to select a hash function H that is resistant to strong collisions, such as the MD5 algorithm ...

Embodiment 2

[0263] Embodiment 2: Dynamically update and verify based on the original storage file: insert data block

[0264] 2.1) Insertion preparation:

[0265] 2.1.1) The data owner DO determines to insert the data block d in the file F * =12, the new document is formalized as F'=F∪{d *}={2,3,6,13,12,5,4,8,11,15,7}, record D * ={d *}={12}; the data owner DO determines the set Y={1} consisting of the insert position index set X={5} in the file F and the number of data blocks to be inserted after each position, where X is A subset of the index set {1,2,...,10} of file F, Y={1} indicates the number of data blocks to be inserted after each position in X, this example is specifically described as: in file F Insert 1 data block after 5 data blocks;

[0266] 2.1.2) Insert data block D * The version information initialization:

[0267] The data owner DO uses the data version information to initialize the algorithm VIGen(D * )→(VI * ) to create the version information VI corresponding ...

Embodiment 3

[0305] Embodiment 3: Dynamically update and verify based on the original storage file: delete data block

[0306] 3.1) Preparation for deletion:

[0307] The data owner DO determines that the data block position index set X={6} to be deleted from the file F, where X is a subset of the position index set {1,2,...,n} of the file F, specifically described as: will delete The sixth data block of file F;

[0308] 3.2) Delete request:

[0309] The data owner DO sends a delete request message U to the cloud storage service provider CSP CSP =(delete,X), ie U CSP =(delete,6), and send another delete request message to the third-party auditor TPA which is Where delete means delete operation request;

[0310] 3.3) Return to delete data block:

[0311] Let the set of deleted data blocks be D # ={d 6}={4}, the cloud storage service provider CSP receives the delete request message U CSP After = (delete, 6), return the deleted data block set D to the data owner DO # ={d 6}={4},...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

On the premise of protecting data confidentiality or privacy, publicly proving the integrity of outsourced dynamic cloud storage data has always been a focus and difficulty of public cloud auditing technology. The invention discloses an anti-leak public cloud audit method that supports full dynamic parallel operation of users. First of all, the data authentication structure of dynamic accumulator is introduced, which realizes that no matter how many times the third-party auditor conducts audits and whether the challenge block is repeated in each audit, curious third-party auditors cannot obtain any data about cloud outsourcing data Content, cleverly avoids the risk of leaking and challenging the privacy of data blocks, and achieves the function of anti-data leakage; secondly, combined with the double-chain dynamic hash table and dynamic accumulator, users can remotely insert, delete and modify outsourced storage data Full dynamic parallel operation of , and has the function of verifying that the dynamic update operation is performed correctly.

Description

technical field [0001] The invention belongs to the technical field of outsourced cloud storage data security in cloud computing, and specifically relates to an anti-leakage public cloud audit method that supports dynamic operations of users based on a dynamic accumulator. Background technique [0002] Cloud storage is an important branch of cloud computing, which allows data owners (Data Owner, DO) to store data remotely in the cloud, and provides users with powerful outsourced computing and storage services. In recent years, due to increasingly powerful processors, abundant bandwidth resources, and flexible network connections, more and more customers choose to outsource data to cloud service providers (Cloud Server Provider, CSP), in order to alleviate local purchase of hardware, Investment in human and material resources such as data maintenance. Although this new data storage model is considered to be a promising service platform on the Internet, the highly concentrate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/08
CPCH04L9/0869H04L9/3033H04L9/3073H04L9/3236H04L9/3247H04L9/3271H04L67/1097
Inventor 李艳平吴姣姣梁岩荣
Owner 广州市溢信科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More