Outsourcing data ownership checking and updating method based on alliance chain

A technology for outsourcing data and data owners, applied in the field of information security, to resist tampering attacks, avoid computing power consumption, and eliminate mutual distrust

Active Publication Date: 2019-09-10
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the related protocols are still in the early stage of research, and issues such as efficient auditi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing data ownership checking and updating method based on alliance chain
  • Outsourcing data ownership checking and updating method based on alliance chain
  • Outsourcing data ownership checking and updating method based on alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0041] The present invention will be further described below with reference to the drawings and embodiments.

[0042] This embodiment provides a scheme for checking and updating the ownership of outsourcing data based on the alliance chain. The scheme flow chart is as follows: figure 1 As shown, there are 4 types of stakeholders: data owners, service nodes, auditors, and block producers;

[0043] Implementation flowchart such as figure 2 As shown, including 7 algorithms:

[0044] initialization:

[0045] According to the security parameters, the data owner runs the initialization algorithm to select a secure hash function h:{0,1}*→G, a bilinear mapping e:G×G→G T , Two pseudo-random functions f 1 : And f 2 : A random number as the private key s random numbers α 1 ,α 2 ,...,α s ∈G, and calculate the public key pk=g corresponding to the private key sk sk ∈G, where G, G T Are all groups, q is the order of G, and g is a member of G, Is a cyclic group of order q.

[0046] Label generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an outsourcing data ownership checking and updating method based on an alliance chain. The method comprises the steps of initialization, label generation, challenge, proof generation, verification, request updating and updating. A homomorphic hash function is adopted to realize label generation and ownership check of outsourcing data. Transactions (Transaction, TX) are introduced to record modification operations to support dynamic updating of data, and operation records of stakeholders in a scheme are managed in a centralized manner by using an alliance chain technology and a delegated right attestation (DPoS mechanism). Compared with an existing ownership checking or updating scheme of outsourcing data, the execution process and data management of the method havehigh transparency, untrust among stakeholders can be eliminated, and tampering attack of the outsourcing data can be resisted; and meanwhile, a good balance can be made between efficient auditing of the data and expandability of data management.

Description

technical field [0001] The present invention relates to information security technology. Background technique [0002] Cloud computing is the next generation of information technology architecture, which is widely accepted and applied in various fields. By organizing and managing a large number of peer nodes, the cloud has huge computing power and distributed disk space. Even so, safely and efficiently balancing "increasing user storage requirements" with "not fully trusted disk space supply" remains a daunting challenge for cloud platforms. From a theoretical point of view, the existing peer-to-peer outsourcing trading (POT) scheme can meet the user's demand for storage space (in terms of capacity and security) to a certain extent, but there are still security issues and Lack of functions, such as unified management of multiple participants, update of distributed outsourced data, etc. [0003] For individual users, in order to reduce the burden of local data storage and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F16/27G06F16/23
CPCH04L63/123H04L9/3236G06F16/23G06F16/27H04L9/50
Inventor 许春香薛婧婷李闪闪
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products