A cloud shared data integrity audit method that can track user identities

A technology for data integrity and user identity, applied in the field of information security, can solve the problems of high communication and computing overhead, re-signature, etc., and achieve the effect of reducing computing and communication overhead, preventing access, and reducing computing and communication overhead.

Active Publication Date: 2021-09-17
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, we may need to track the source of the data block, and at the same time need to ensure that the user's identity privacy is not obtained by others. Li et al. proposed a shared data integrity audit scheme that can track the data source, but in this In the scheme, when a user in the group revokes, the rest of the users need to re-sign all the data blocks, and the communication and calculation overhead is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud shared data integrity audit method that can track user identities
  • A cloud shared data integrity audit method that can track user identities
  • A cloud shared data integrity audit method that can track user identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments. The embodiments described in the present invention are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, other embodiments obtained by persons of ordinary skill in the art without making creative efforts all fall within the protection scope of the present invention.

[0064] Such as figure 1 As shown, the system framework involved in the present invention consists of four entities: group users, group administrators, cloud servers and trusted third-party auditors TPA. The group contains multiple users, group members can join or exit the user group, and group users share data through cloud storage; group administrators are responsible for joining and canceling group users, and revoked users cannot upload or access Cloud data; cloud servers provide group users with a large am...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for auditing the integrity of cloud shared data that can track user identities, belonging to the field of information security. The steps are: first generate a key, then join the user, generate an authenticator, generate a certificate, verify the certificate, and then track the identity. Last user revoked. The invention generates an authenticator corresponding to a data block based on a group signature algorithm, so that the group administrator can track the source of the data block when necessary, and ensure that the identity privacy of the user is not leaked to others, and at the same time, it can well support the group Add and withdraw users. The present invention is applicable to the situation where, in a group environment, there is a dispute over shared data on the cloud or wrong data is uploaded by a malicious user, and the source of the data needs to be tracked.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a cloud shared data integrity audit method capable of tracking user identities. Background technique [0002] Data sharing is a widely used form of cloud storage. Through the cloud data sharing service, users can share their data within a group. Specifically, in a working group, when a user uploads his data to the cloud, other users in the group can Accessing and modifying these data not only enables information sharing but also reduces the burden of users' local data storage. Although the cloud service provider promises to provide users with a safe and reliable environment, data loss or damage may occur due to software and hardware failures or human factors. The user conceals the situation, and may even delete the data that the user does not use frequently in order to save space and obtain higher benefits. [0003] In order to verify the integrity of cloud data, some audit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06F21/46G06F21/64
CPCG06F21/46G06F21/64H04L9/0819H04L9/0861H04L9/0891H04L63/0876H04L63/123
Inventor 张茜王箭
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products