Transparent data integrity auditing and transparent encrypted data deduplication protocol based on block chain

A data integrity and encrypted data technology, applied in the field of information security, can solve problems such as bias, users cannot stay online all the time, delay auditing, etc., and achieve the effect of ensuring security

Active Publication Date: 2019-09-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many schemes have been proposed for data integrity auditing. These schemes allow users to hire a third-party auditor to complete the audit. However, hiring a third party will incur a high cost and the third party may conspire with the cloud server to generate biased audit results. For exa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transparent data integrity auditing and transparent encrypted data deduplication protocol based on block chain
  • Transparent data integrity auditing and transparent encrypted data deduplication protocol based on block chain
  • Transparent data integrity auditing and transparent encrypted data deduplication protocol based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention is described in further detail below in conjunction with embodiment.

[0019] The present invention provides a blockchain-based transparent data integrity audit and transparent encrypted data deduplication protocol, in which the symbols involved are declared in the following table:

[0020]

[0021]

[0022] In this embodiment, the specific process is as follows:

[0023] 1. Initialization:

[0024] Initialization parameter set PP={p,P,G,G T ,e,h,h 1 ,H,l,q E}, where G is an additive group whose order is a prime number p and whose generator is P, e:G×G→G T is a bilinear map, h, h 1 , H are hash functions, l is the system security parameter, q E It is the number of times that the system stipulates that each user requests the key from the key server in each period;

[0025] The user randomly selects α∈Z p * As the user's private key sk, and calculate y=αP as the user's public key pk; n key servers KS i , i∈[1,n] shared secret value, Z...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security, and particularly relates to a transparent data integrity auditing and transparent encrypted data deduplication protocol based on a block chain. The scheme of the invention comprises four modules: parameter initialization, encryption key acquisition, bidirectional upheaval checking, transparent integrity auditing and transparent de-duplication. Compared with the prior art, the protocol can resist the bias audit and delay audit of the cloud server, and meanwhile, the situation that the cloud server claims an erroneous duplicate removal level to charge additional fees can be avoided. According to the protocol, single-point failure attacks and exhaustion attacks can be prevented, and bidirectional ownership proof of a user and a cloud server can be provided. The invention realizes a secure and effective protocol based on the block chain, and can simultaneously realize transparent data integrity auditing and transparent data de-duplication.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a blockchain-based transparent data integrity audit and transparent encrypted data deduplication protocol in cloud storage. Background technique [0002] Cloud storage has become an important application in our daily life. In the era of data explosion, in order to save their own local storage space, users store data in cloud servers; currently there are many cloud storage providers such as Dropbox, OneDrive and Google Drive. Because of the competition among cloud storage providers, cloud storage providers now adopt more effective storage strategies; when users store duplicate data, cloud storage providers use data deduplication strategies to store the same data only once, so as to Save storage space and reduce storage costs. [0003] Since the cloud server is not completely trusted, users usually encrypt the data in the external storage to protect the privacy of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L29/06G06F21/64G06F21/60
CPCH04L9/0863H04L9/0869H04L9/0643H04L63/123G06F21/602G06F21/64
Inventor 许春香李闪闪白兰华刘大为温昕晟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products