Data integrity auditing method and system based on block chain

A data integrity and blockchain technology, applied in the field of computer security, can solve problems that affect the accuracy of user data verification results, unreliable audit results, etc., to achieve the effect of ensuring reliability and enhancing accuracy

Active Publication Date: 2019-09-20
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are some technical problems that cannot be ignored in the above-mentioned audit method based on a trusted third party: In a real network environment, the audit third party may be coerced by cyber attackers, or conspired with the CSP, resulting in the final audit report issued by the audit third party. The results are unreliable and further affect the accuracy of user data verification results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity auditing method and system based on block chain
  • Data integrity auditing method and system based on block chain
  • Data integrity auditing method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0037] Below at first explain and illustrate with regard to the technical terms of the present invention:

[0038] Bilinear operation: Let G and GT be multiplicative cyclic groups with order p, Zr is a real number group, suppose g is a random element in G, when e:G×G->GT satisfies the following conditions, it is called e is a bilinear map.

[0039] 1. Computability: For any two elements g in G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data integrity auditing method based on a block chain. The method comprises the steps of a client sending an auditing request to a block chain platform; the block chain platform generating p non-repeated random numbers after receiving the auditing request from the client; using all p random numbers {s1, s2}; s2,... Sp} as the index numbers; respectively obtaining the block numbers v stored at corresponding positions in a mapping array of the block chain platform, all the block numbers forming a challenge array; packaging the challenge array in an audit challenge request, sending the audit challenge request to the server; and the server analyzing the audit challenge request from the block chain platform to obtain a challenge array, traversing the challenge array to obtain a sub-block mj and a label j corresponding to each element j, and performing operation on the element j, the sub-block mi and the label i according to a bilinear operation algorithm. According to the invention, the block chain platform is used as a third auditing party, and the data integrity and the auditing security are improved.

Description

technical field [0001] The invention belongs to the field of computer security, and more specifically relates to a method and system for auditing data integrity based on blockchain. Background technique [0002] Cloud storage is an online storage developed on the basis of cloud computing. It has many advantages, such as reducing the burden of local storage, network backup, and low cost. Therefore, more and more users and enterprises choose to store data in cloud storage. However, while cloud storage provides users with convenient services, it also faces many new security challenges, mainly reflected in the fact that users cannot participate in the decision-making of data access, and whether the files are truthfully stored in the cloud storage provider (Cloud Storage provider, CSP for short) is doubtful, so it is necessary to audit the data stored in the cloud by the user (Audit), the main goal of which is to confirm that the user data is stored on the server without obtaini...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F16/27
CPCG06F16/27G06F21/64
Inventor 李春花周可胡家琦张洲
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products