Cloud sharing data integrity auditing method capable of tracking user identities

A technology of data integrity and user identity, applied in the field of information security, can solve the problems of high communication and computing overhead, re-signature, etc.

Active Publication Date: 2019-07-23
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, we may need to track the source of the data block, and at the same time need to ensure that the user's identity privacy is not obtained by others. Li et al. proposed a shared data integrity audit s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud sharing data integrity auditing method capable of tracking user identities
  • Cloud sharing data integrity auditing method capable of tracking user identities
  • Cloud sharing data integrity auditing method capable of tracking user identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments. The embodiments described in the present invention are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, other embodiments obtained by persons of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0064] like figure 1 As shown, the system framework involved in the present invention consists of four entities: group users, group administrators, cloud servers, and trusted third-party auditors TPA. The group contains multiple users, group members can join or leave the user group, and group users share data through cloud storage; the group administrator is responsible for the joining and revocation of group users, and revoked users cannot upload or access Cloud data; cloud servers provide a large a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud sharing data integrity auditing method capable of tracking user identity, which belongs to the field of information security and comprises the following steps of: generating a secret key, adding a user, generating an authenticator, generating a proof, verifying the proof, tracking the identity, and revoking the user. According to the invention, the authenticator corresponding to the data block is generated based on the group signature algorithm, so that a group administrator can track the source of the data block when necessary, the identity privacy of the useris ensured not to be leaked to others, and the joining and canceling of the group user can be well supported. The method is suitable for the situation that cloud shared data is disputed or a malicioususer uploads wrong data, and a data source is needed to be tracked in a group environment.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a cloud shared data integrity audit method that can track user identity. Background technique [0002] Data sharing is a widely used form of cloud storage. Through the cloud data sharing service, users can share their own data within a group. Specifically, in a work group, after a user uploads his data to the cloud, other users in the group can Accessing and modifying this data not only enables information sharing but also reduces the burden of local data storage on users. Although cloud service providers promise to provide users with a safe and reliable environment, data may be lost or damaged due to software and hardware failures or human factors. At the same time, cloud service providers may pay to avoid damage to their reputation or economic losses. The user conceals the situation, and may even delete the data that the user does not use frequently in order to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06G06F21/46G06F21/64
CPCG06F21/46G06F21/64H04L9/0819H04L9/0861H04L9/0891H04L63/0876H04L63/123
Inventor 张茜王箭
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products