A blockchain-based transparent data integrity audit and transparent encrypted data deduplication method

A technology of data integrity and encrypted data, applied in the field of information security, it can solve the problems of delayed auditing, biased, users cannot keep online all the time, and achieve the effect of preventing exhaustive attacks and saving costs

Active Publication Date: 2022-06-03
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many schemes have been proposed for data integrity auditing. These schemes allow users to hire a third-party auditor to complete the audit. However, hiring a third party will incur a high cost and the third party may conspire with the cloud server to generate biased audit results. For example, only auditing and saving complete data blocks ignores damaged or lost data blocks
If the user is required to complete the audit by himself, the user cannot stay online all the time
If a cloud server audit is required, the cloud server may generate biased audit results or delay the audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based transparent data integrity audit and transparent encrypted data deduplication method
  • A blockchain-based transparent data integrity audit and transparent encrypted data deduplication method
  • A blockchain-based transparent data integrity audit and transparent encrypted data deduplication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

The present invention provides a kind of transparent data integrity audit and transparent encrypted data deduplication method based on block chain

law, which, involving symbols declared in the following table:

[0020]

[0021]

In the present embodiment, concrete process is as follows:

1, initialization:

Initialization parameter set PP={p, P, G, G

T

,e,h,h

1

,H,l,q

E

}, where G is a prime number p of order, generating

Additive group whose element is P, e:G×G→G

T

is a bilinear map, h, h

1

, H are hash functions, l is the system security parameter, q

E

is the department

The system stipulates the number of times that each user requests the key from the key server in each cycle;

[0025] The user randomly selects α∈Z

p

*

As the user's private key sk, and calculate y=αP as the user's public key pk; n keys

server KS

i

, i∈[1,n] share the secret value, Z

p

*

Represents a p-order cyclic group; the specific generation method is as follow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security, and is specifically a blockchain-based transparent data integrity audit and transparent encrypted data deduplication method; the scheme of the invention includes four modules: initialization parameters, acquisition of encryption keys, two-way Usability inspection, transparent integrity audit and transparent deduplication. Compared with the existing scheme, the present invention can resist biased audit and delayed audit of the cloud server, and can avoid the cloud server claiming the wrong deduplication level to charge additional fees; the present invention can prevent single point failure attacks and exhaustive attacks, It can provide a two-way ownership certificate between the user and the cloud server; the present invention implements a safe and effective protocol based on the block chain, and can realize transparent data integrity audit and transparent data deduplication at the same time.

Description

A blockchain-based transparent data integrity audit and transparent encrypted data Deduplication method technical field The invention belongs to the field of information security, and is specifically related to a blockchain-based transparent data storage system in cloud storage. Integrity audit and transparent encryption data deduplication method. Background technique [0002] Cloud storage has become an important application in our daily life. In the era of data explosion, users need to Save your own local storage space and store data on cloud servers; there are many cloud storage providers such as Dropbox, OneDrive and GoogleDrive. Because of the competition among cloud storage providers, the current cloud storage providers All adopt more effective storage strategies; when users store duplicate data, cloud storage providers use data deduplication strategies to The same data is stored only once, thus saving storage space and reducing storage costs. [0003] Since...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/40G06F21/64G06F21/60
CPCH04L9/0863H04L9/0869H04L9/0643H04L63/123G06F21/602G06F21/64
Inventor 许春香李闪闪白兰华刘大为温昕晟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products