An Identity-Based Dynamic Data Integrity Auditing Method
A dynamic data and integrity technology, applied in the field of network security, to achieve the effect of reducing resource consumption and protecting integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0087] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0088] An identity-based dynamic data integrity audit method in the present invention is designed based on the four-party entity of the private key generation organization, the third-party audit center, the client, and the cloud storage server. The specific architecture diagram of the four-party entity is as follows figure 1 as shown,
[0089] Private key generation mechanism: mainly responsible for the generation of the client's private key, which receives the client's user identity information, generates a private key based on the identity information, and transmits it to the client through a trusted channel;
[0090] Client: The client includes one or more users, and each user can challenge the integrity of the data in the cloud storage server, and verify the integrity of the data by sending a challenge request to a third-party audit ce...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


