Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Remote data integrity verification method based on short signature

An integrity verification, remote data technology, applied in the field of data integrity verification, can solve problems such as user data threats, achieve high signature efficiency, prevent leakage or forgery, and reduce computational overhead and communication overhead.

Inactive Publication Date: 2019-06-28
BEIJING UNIV OF POSTS & TELECOMM +2
View PDF13 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are loopholes in the design of this scheme. The information sent by the client to the third party includes the index position of each data block, which is a potential threat to user data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote data integrity verification method based on short signature
  • Remote data integrity verification method based on short signature
  • Remote data integrity verification method based on short signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and the experimental conditions of the examples.

[0037] Please refer to figure 1 , the method includes the following five algorithms:

[0038] 1. When the user needs to store a large amount of data on the cloud storage server, it is necessary to initialize the system parameters and generate a secret key pair, KeyGen(k)→(pk,sk): the client inputs the security parameter k and outputs the user's public key pk, private key sk. Public pk, private key sk is kept by the user. This step can be pre-processed before signature verification, saving verification time.

[0039] 2. Then, the user executes the signature generation algorithm SigGen(sk,m)→σ, uses the private key generated in the previous step to sign the input file m, and generates the signature set σ of the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a remote data integrity verification method based on a short signature. The method comprises the following steps: in a preprocessing stage, a client generates public and privatekey pairs and system parameters, and carries out blocking processing on a file to be uploaded to a cloud storage server; signing each file block by using a short signature algorithm; uploading the file and the signature set to a cloud storage server, and sending the signature set to a trusted third party; and in a challenge-response stage, the third party generates challenge information and sendsthe challenge information to the cloud server, and the server generates data holding evidences and returns the data holding evidences to the third party; and in a verification stage, the third partyverifies whether the data holding evidence is correct or not by using a verification algorithm, if so, the TRUE explains that the file is stored completely, or else, the FLSE explains that the storedfile is damaged. In order to solve the problems of low signature efficiency and low security in the prior art, a short signature and a trusted third party are used to reduce the calculation overhead of a client, an anti-collision hash function and a random masking technology are adopted to protect data privacy in a verification process, and analysis shows that the method can resist an adaptive selection message attack.

Description

technical field [0001] The invention belongs to the technical field of data integrity verification, and specifically relates to a data integrity verification method in a cloud storage environment in information security. Background technique [0002] With the development of cloud computing and mobile Internet technologies, the data generated by end users continues to grow, and more and more users store data in storage resources provided by cloud service providers (Cloud Service Provider, hereinafter referred to as CSP). However, due to the relative concentration of storage resources provided by CSP, events such as software and hardware failures in the storage system and malicious system damage seriously threaten the safe storage of user data. Users will not verify the availability of infrequently accessed data at any time. In this case, even if the data is lost due to the damage of the cloud storage system, it is difficult for the user to detect it in time. Therefore, the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06F21/64
Inventor 朱洪亮袁颖陈玉玲韩挺辛阳
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products