Method for verifying integrity of data in hybrid cloud storage

A technology for integrity verification and data storage, applied in the field of data integrity verification in hybrid cloud storage, can solve the problem of wasting private cloud computing power and storage space, achieve efficient dynamic update operations, improve user experience, and improve user experience Effect

Active Publication Date: 2020-02-11
SHAANXI NORMAL UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the hybrid cloud environment, if the traditional data integrity verification scheme is still used, the computing power and storage space of the private cloud will be wasted to a large extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying integrity of data in hybrid cloud storage
  • Method for verifying integrity of data in hybrid cloud storage
  • Method for verifying integrity of data in hybrid cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] In this embodiment, the respective working processes of the private cloud and the public cloud are described, as follows:

[0043] Assign secret keys to files and generate tags through private cloud as follows:

[0044] The private cloud distributes keys and offline tags in advance, and the offline tags include file block alias information, offline chameleon hash auxiliary variables, and dynamic update general variables in the keys.

[0045] At this time, due to strong privacy, from the perspective of security, the private cloud is used for key distribution, which has high security.

[0046] Further, before the selected file is verified, file segmentation is also included. The file segmentation is specifically that the user divides the file to be uploaded into blocks to obtain a set of file blocks, and performs partition processing for each individual file block , divide a single file block into several sectors, calculate the online chameleon hash auxiliary variable co...

Embodiment 2

[0066] Below in conjunction with embodiment, the present invention is described in detail:

[0067] S1: The key generation stage, which is specifically implemented through the following detailed steps:

[0068] Generate user public and private keys: Initialize G 1 , G 2 , GT is the multiplicative cyclic group of prime order, and defines the bilinear mapping operation e:G 1 ×G 2 →GT; initialize the integer group Zq of prime number order, randomly select any large integer α in the Zq group, as the user's private key, denoted as sk=α, randomly select G 2 The generator of the group is denoted as g; calculate the user public key v=g α ;

[0069] Among them, define the G in the bilinear mapping operation 1 and G 2 It is automatically generated from open source code.

[0070] In this embodiment, any large integer mentioned, that is, a very large integer, may be an integer with a length of several tens of digits.

[0071] Generate the chameleon hash function public key and tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying the integrity of data in hybrid cloud storage. The method is characterized in that based on a PDP algorithm, a secret key is distributed for the file anda label is generated by means of a chameleon signature algorithm and a private cloud and is stored in a public cloud; when the selected file is verified, the private cloud generates verification information and sends the verification information to the public cloud, the public cloud obtains the secret key and the label to form evidence, the private cloud serves as a platform, the evidence collides with the to-be-verified file block, and whether the to-be-verified file block is complete or not is judged. According to the data integrity checking method and device, by means of chameleon hash andpublic cloud and private cloud architecture, splitting of the label generation stage in the data integrity checking scheme is achieved, the online waiting time of a user is shortened, the user experience is improved, redundant calculation in the dynamic updating stage is reduced, and the calculation overhead is reduced.

Description

technical field [0001] The invention belongs to the technical field of cloud resource allocation and security, and in particular relates to a data integrity verification method in hybrid cloud storage. Background technique [0002] Traditional data integrity verification schemes are often aimed at cloud storage services in public cloud environments, and are characterized by reducing the computing and storage costs of users as much as possible. In the hybrid cloud environment, if the traditional data integrity verification scheme is still used, the computing power and storage space of the private cloud will be wasted to a large extent. Therefore, as the hybrid cloud architecture is becoming more and more popular today, a data integrity verification solution that can give full play to the advantages of hybrid cloud technology for the hybrid cloud architecture is extremely important. Contents of the invention [0003] In order to solve the problems in the prior art, the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F16/172G06F16/16G06F16/13G06F16/18
CPCG06F21/64G06F16/172G06F16/16G06F16/13G06F16/1873
Inventor 李蜀瑜李洪星范力搏
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products