Plaintext shared data auditing method and system supporting privacy information hiding

A technology of privacy information and shared data, applied in the field of cloud computing security, can solve problems such as the reliability and integrity of shared data cannot be fully trusted, blockage of data release audit process, large calculation and transmission pressure, etc., to reduce the cost of communication The probability of bottlenecks, the avoidance of unrecoverable files, and the effect of avoiding storage overhead

Active Publication Date: 2019-07-23
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing solutions, these managers are given too much power. Even if they modify the data, they will not be discovered during the data checking and auditing process, which makes the reliability and integrity of the shared data cannot be fully trusted
[0006] 2. The managers in the existing scheme bear excessive calculation and transmission pressure
This makes the manager node a bottleneck in the entire solution. In the face of massive data and high concurrency environments, the entire data release audit process will be blocked.
[0007] 3. The hidden privacy data mechanism of the existing scheme needs to generate a random number for each file, and the data generation needs to save these random numbers locally so that the processed private data can be recovered
This will bring a lot of storage overhead to the user, and once the random number is lost, the private data will no longer be recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plaintext shared data auditing method and system supporting privacy information hiding
  • Plaintext shared data auditing method and system supporting privacy information hiding
  • Plaintext shared data auditing method and system supporting privacy information hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The plaintext shared data audit system that supports the plaintext shared data audit method for privacy information hiding provided in this embodiment, such as figure 1 shown, including:

[0032] Private key generation center, used to initialize the system;

[0033] The client is used to extract the private key from the private key generation center, and generate the blind file, file label and corresponding signature of the file, and submit it to the management end;

[0034] The management terminal is used to review the files according to the received blind files, file tags and corresponding signatures, and upload the blind files, file tags and corresponding signatures to the cloud when the review is passed;

[0035] Cloud, used to store blind files, file labels and corresponding signatures submitted by the management terminal;

[0036] The third-party audit terminal is used to audit the integrity of files based on blind files, file labels and corresponding signatures...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a plaintext shared data auditing method and system supporting privacy information hiding. The method comprises the steps that (1) a private key generation center initializes the system; (2) the user side extracts a private key from a private key generation center; (3) the user side generates a blind file, a file label and a corresponding signature of the file, and submits the blind file, the file label and the corresponding signature to the management side; (4) the management end examines the file according to the received blind file, the file label and the corresponding signature, and uploads the blind file, the file label and the corresponding signature to the cloud when the examination is passed; and (5) integrity auditing is carried out on the file by the third-party auditing end according to the blind file, the file label and the corresponding signature on the cloud. The privacy information hiding mechanism provided by the invention can prevent a maliciousmanager from illegally operating the file, and any illegal operation can be detected when the file is checked by the cloud.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a plaintext shared data audit method and system supporting privacy information hiding. Background technique [0002] With the explosive growth of data volume this year, more and more individuals, commercial companies, and organizations do not store data in their own servers, but choose to store data on cloud platforms with powerful computing and storage capabilities. The cloud platform provides a more flexible and scalable storage service through which users can share data with others. For example, commercial companies such as Ali and Didi share some business data sets for data analysis by the academic community, so that the data can generate greater derivative value. [0003] However, cloud storage services are not completely reliable, and some unpredictable hardware or software errors and manual misoperations will still cause data damage. Moreover, cloud serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3247H04L63/123
Inventor 廖永健范煜周世杰陈虹洁乐代波张刚林黄文郑皓文
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products