Edge computing data auditing system and auditing method based on hash binary tree

An edge computing and data auditing technology, applied in the field of network security, can solve the problem that the audit protocol is not applicable to the MEC environment

Active Publication Date: 2019-11-15
东北大学秦皇岛分校
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional public audit model, only three entities are needed to simulate the audit process, but in the public audit model of the MEC environment, we need to add an additional edge server entity to simulate the audit process, so the traditional audit protocol is not suitable for MEC Environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing data auditing system and auditing method based on hash binary tree
  • Edge computing data auditing system and auditing method based on hash binary tree
  • Edge computing data auditing system and auditing method based on hash binary tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described in detail below with reference to the drawings and specific embodiments.

[0063] A hash binary tree-based edge computing data audit system, including DO, MS, CSP and TPA; the DO divides the data to be sent to the CSP into several data blocks, generates signatures for these data blocks, and then These data blocks and signatures are sent to the MS; after the MS receives the data, it verifies the source of the data, and after verification is legal, saves the tags of all data blocks and the data blocks commonly used by DO, and then sends the data blocks to the cloud server; when the audit cycle When it comes, TPA generates a set of challenge information and sends it to the MS. After receiving the challenge information, the MS generates a part of the evidence based on the data blocks and data tags it caches, and then sends the other part of the challenge information to the CSP, and the CSP sends it after generating the evidence T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an edge computing data auditing system and an auditing method based on a hash binary tree, and belongs to the field of information security. According to the characteristics ofthe MEC, a new public auditing protocol is provided, the protocol not only can resist replay attacks, forgery attacks and substitution attacks which are easily suffered by a traditional auditing protocol, but also can resist intrusion attacks in an MEC environment, and the safety requirement of the MEC is met. The invention further provides a new dynamic data structure, the height of an MHT (Merkle Hash Tree) in a traditional auditing protocol can be reduced, and auditing efficiency is improved.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to an edge computing data audit system and an audit method based on a hash binary tree. Background technique [0002] With the rapid development of cloud computing, many cloud computing-based services have emerged, such as cloud storage services, which can help individual users or organizations store massive amounts of data, and are not restricted by the location and time of access. Cloud users can access Access their data on the cloud. However, more and more applications need to access low-latency data services to provide more advanced real-time applications, such as in-vehicle mobile networks. Smart sensors in the in-vehicle mobile network will generate large amounts of data in real time, and the intelligent control system will dynamically update these data. In addition, the long-distance transmission of users to the cloud also increases the possibility of data being attacke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
CPCH04L9/3271H04L9/3247H04L9/3236H04L9/3073H04L63/1425H04L63/123H04L63/126
Inventor 刘明曦史闻博范宽白撰彦张永欣王庆豪
Owner 东北大学秦皇岛分校
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products