Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cross-domain authentication and fair audit deduplication cloud storage system based on a block chain

A cloud storage system and blockchain technology, applied in the field of cloud computing, can solve problems such as unfair storage costs, damage to certificate certification centers, high payment, etc., to save storage costs and management costs, reduce storage costs and management costs , the effect of reducing network overhead

Active Publication Date: 2019-05-31
XIDIAN UNIV
View PDF9 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing cross-domain authentication schemes place excessive trust in a single certificate authentication center. However, a single certificate authentication center is easily damaged in a cloud environment, and it is difficult to provide correct authentication services when a single certificate authentication center is destroyed.
On the other hand, traditional cross-domain authentication schemes use hierarchical authentication, which is inefficient and difficult to quickly authenticate user certificates
[0008] (2) Due to various software and hardware failures and the existence of malicious opponents, the data stored by users on the cloud server is extremely vulnerable to damage. When the user's data is destroyed, the user still needs to pay high storage fees to the cloud server. is extremely unfair
However, the existing data integrity auditing scheme does not realize the punishment of malicious servers and the compensation of users whose interests are damaged. How to realize fair integrity auditing is an unresolved problem faced by data auditing.
[0009] (3) The existing cloud storage system still lacks cross-domain authentication and fair audit functions that support deduplication. How to implement a cross-domain authentication and fair audit system that supports deduplication is a problem to be solved in cloud storage systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cross-domain authentication and fair audit deduplication cloud storage system based on a block chain
  • A cross-domain authentication and fair audit deduplication cloud storage system based on a block chain
  • A cross-domain authentication and fair audit deduplication cloud storage system based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0080] With the rapid development of cloud computing technology and the explosive growth of user data, more and more enterprises and individuals tend to outsource and store data on cloud servers and exchange and share data by using the cloud. Since users need to authenticate their identities before exchanging data, the certificate authentication center that traditional cross-domain authentication schemes rely on in the cloud environment is easily damaged, which makes traditional cross-domain authentication schemes not only inefficient but also huge in the verification process. security risks. On the other hand, due to vari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud computing, and discloses a cross-domain authentication and fair audit duplicate removal cloud storage system based on a block chain. The system comprises a cross-domain authentication module, a data encryption module, a ciphertext duplicate removal module, an integrity audit module and a server punishment module. In the authentication module, acloud user generates a certificate at a client in a self-signed mode, the certificate is stored in a block chain network after being verified by an authentication server, the user is verified to compare information such as the certificate and a block, and whether the certificate is valid or not is verified. According to the method, the problem of hierarchical query verification of a traditional PKI structure is avoided, the authentication frequency is greatly reduced, and the verification cost is reduced; By using an intelligent contract, a malicious server is punished to receive certain penalties and compensate users with impaired benefits under the condition that user data is damaged; And in the duplicate removal module, a data duplicate removal function is realized by using a convergence encryption technology, so that the cloud server is prevented from storing too much duplicate data, and the user and the cloud server are prevented from consuming a large amount of calculation expenditure and storage expenditure.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a blockchain-based cross-domain authentication and fair audit deduplication cloud storage system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] As a pay-per-use model, cloud computing enables users to enjoy endless computing and storage services anytime and anywhere, realizing the people's long-standing dream of using computing as a resource. With the rapid development of cloud computing, more and more users and enterprises tend to outsource and store data on cloud servers and use the cloud to exchange and share data with other users. Since users often need to authenticate their identities before exchanging data, the certificate authentication center that traditional cross-domain authentication schemes rely on in the cloud environment is easily damaged, which makes traditional cross-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F21/33G06F16/174G06Q20/14
Inventor 姜涛袁浩然程珂孟文娟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products