Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud data security positioning method based on integrity auditing and communication time delay

A secure positioning and cloud data technology, applied in secure communication devices, digital transmission systems, encryption devices with shift registers/memory, etc., can solve the problem that positioning algorithms cannot detect attackers, give data locations, and Communication overhead and other issues

Active Publication Date: 2019-04-26
XIDIAN UNIV
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The existing distributed positioning scheme only considers the improvement of accuracy. However, if a delay injection attack is performed on a malicious cloud server that outsources data based on economic motives, the existing positioning algorithm cannot detect such a Attackers; in academia, attacks against traditional targeting methods have achieved great success
[0005] (2) Although the existing location verification schemes can effectively detect potential malicious attackers, the premise is that users need to know the specific location of the data. However, the real problem is that based on security and privacy requirements, most cloud services provide The supplier does not give the precise data location in the service level agreement, so the data location verification scheme is often difficult to implement in actual situations
[0006] (3) The latest academic solution that combines integrity verification and data location technology, which downloads data blocks through distributed nodes, resulting in a large communication overhead
[0008] (1) The difficulty of the above problem is that the data owner cannot know the authenticity of the geographical location of the cloud server from the measured network parameters and the old technical solution has caused a lot of communication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security positioning method based on integrity auditing and communication time delay
  • Cloud data security positioning method based on integrity auditing and communication time delay
  • Cloud data security positioning method based on integrity auditing and communication time delay

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the objectives, technical solutions, and advantages of the present invention clearer and more comprehensible, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0063] For existing data owners who enjoy cloud services, it is difficult to check the data storage location, and malicious cloud servers can manipulate the parameters measured by geolocation and forge the data location. The existing solutions are not sufficient to find out the problem of such attackers. The present invention can check potential malicious servers that manipulate delays and forge locations; through theoretical analysis, it is considered effective and correct.

[0064] The application principle of the present invention will be described in detail below with reference to the accompanyi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of distributed data geographic positioning, and discloses a cloud data security positioning method based on integrity auditing and communication time delay. The method comprises the following steps: encoding and encrypting an original data file by a data owner by using a Reed-Solomon error correction code, and completing an encoding operation during theinitialization stage; when the data owner wants to position data in the cloud of the data owner, requiring each agent node to perform a distributed challenge operation; enabling each distributed agent that receives an instruction of the data owner to challenge cloud storage; receiving a set of challenge requests and providing a proof result by a cloud server; executing a challenge response protocol and broadcasting a recoverability certificate to each agent node by the cloud server; in the verification stage, mainly performing a recoverability verification function and extracting geographic measurement information by the distributed node; and running a position estimation algorithm to estimate the position of the cloud server by the data owner. According to the cloud data security positioning method based on the integrity auditing and communication time delay provided by the invention, a potential malicious server with manipulation delay and a counterfeiting position can be checked; and through theoretical analysis, the method is considered to be effective and correct.

Description

Technical field [0001] The invention belongs to the technical field of distributed data geographic positioning, and in particular relates to a cloud data safe positioning method based on integrity audit and communication delay. Background technique [0002] At present, the existing technology commonly used in the industry is as follows: cloud computing is an information technology that has been widely used, and it can access and manage system resources and higher-level services anytime and anywhere. Its most important advantage is that cloud computing technology allows the company to minimize the cost of establishing the infrastructure upfront. Cloud storage is a major branch of cloud computing and has been widely used in various fields. However, cloud service providers for data users are not completely trustworthy. After uploading local data to cloud servers, users lose physical control of the data. Therefore, data location auditing is becoming one of the growing needs of users...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/06
CPCH04L9/0631H04L9/3247H04L9/3271H04L63/045H04L63/12H04L63/1491H04L67/52
Inventor 姜涛赵尹源袁浩然王一凡
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More