Unlock instant, AI-driven research and patent intelligence for your innovation.

An Identity-Based Dynamic Data Integrity Auditing Method

A dynamic data and integrity technology, applied in the field of network security, to achieve the effect of reducing resource consumption and protecting integrity

Active Publication Date: 2021-08-03
NORTHEASTERN UNIV LIAONING
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current identity-based data integrity audit schemes only support the problem of static data. How to realize the dynamic update of data while ensuring the identity-based data integrity audit has very broad research significance and application value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Dynamic Data Integrity Auditing Method
  • An Identity-Based Dynamic Data Integrity Auditing Method
  • An Identity-Based Dynamic Data Integrity Auditing Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0088] An identity-based dynamic data integrity audit method in the present invention is designed based on the four-party entity of the private key generation organization, the third-party audit center, the client, and the cloud storage server. The specific architecture diagram of the four-party entity is as follows figure 1 as shown,

[0089] Private key generation mechanism: mainly responsible for the generation of the client's private key, which receives the client's user identity information, generates a private key based on the identity information, and transmits it to the client through a trusted channel;

[0090] Client: The client includes one or more users, and each user can challenge the integrity of the data in the cloud storage server, and verify the integrity of the data by sending a challenge request to a third-party audit ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity-based dynamic data integrity audit method, which is realized based on a private key generation mechanism, a client, a third-party audit center and a cloud storage server. The private key generation agency generates the private key secret and delivers it to the client; the client performs the file preprocessing operation, stores the file in the cloud server, and sends a challenge request to the third-party audit center to verify whether the data is complete; the third-party audit center receives the challenge request, Generate challenge information and send it to the cloud server; after receiving the challenge information, the cloud server generates evidence information and returns it to the third-party audit center; the third-party audit center verifies whether the data is complete and sends the verification result to the client. Compared with the prior art, the present invention can authenticate the identity of the client without deploying PKI, reduces resource consumption, supports dynamic update of cloud storage data, and can protect the integrity of dynamic data.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to an identity-based dynamic data integrity audit method. Background technique [0002] With the popularization of computer technology and the development of cloud computing, cloud storage has been favored by more and more enterprises and users because of its low price, high storage efficiency and rich user personalized customization services. Users only need to upload the data to the cloud server to share data between different devices. Cloud storage greatly releases the user's local space. Users do not need to store data copies, and can decide when to upload and download files stored on the cloud server according to their actual needs, ensuring the flexibility of user data storage. [0003] However, since user data is only stored on the cloud server, and there is no third-party organization to supervise the data storage process, cloud storage faces severe security chal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
CPCH04L9/3033H04L9/3236H04L9/3247H04L9/3271H04L63/123
Inventor 周福才吴淇毓孙楚涵徐剑
Owner NORTHEASTERN UNIV LIAONING