Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Light dynamic data integrity auditing method based on hierarchical Merkel hash tree

A Merkel hash, dynamic data technology, applied in the intersection of computer and cryptography, can solve problems such as inapplicable cloud data dynamic integrity audit

Active Publication Date: 2020-04-03
SHANGHAI UNIVERSITY OF ELECTRIC POWER
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the big data that is currently stored in the cloud with the characteristics of high collection frequency and fast update speed, the existing solutions have deficiencies in data retrieval efficiency and dynamic update, so they are not suitable for dynamic integrity audit of cloud data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Light dynamic data integrity auditing method based on hierarchical Merkel hash tree
  • Light dynamic data integrity auditing method based on hierarchical Merkel hash tree
  • Light dynamic data integrity auditing method based on hierarchical Merkel hash tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0074] The data integrity audit model in this embodiment specifically includes the following three aspects:

[0075] Power supply company (data owner): After the user's electricity consumption data is collected by the smart meter, it is collected in their respective areas, and all regional data is then centralized to the power supply company. Since the smart meter is an intelligent terminal, the smart meter and the user are re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a light dynamic data integrity auditing method based on a hierarchical Merkel hash tree, which comprises the following steps that: 1) a data owner constructs the hierarchical Merkel hash tree for data, stores data information on a node, and introduces a local root node; 2) a cloud database stores the data of the data owner by using a position sensitive hash technology; 3) the cloud database generates challenge evidence according to the challenge information audited by a trusted third party; 4) the trusted third-party audits the integrity of the evidence ; and 5) when dynamic operation is performed on the data, the cloud database generates evidence, and the trusted third-party performs integrity auditing on the dynamic data. Compared with the prior art, the method ishigh in the auditing efficiency, can be effectively reduce the communication and calculation expenditure, and supports efficient data updating.

Description

technical field [0001] The invention belongs to the intersecting field of computer and cryptography, and in particular relates to a light dynamic data integrity auditing method based on hierarchical Merkle hash tree. Background technique [0002] With the increasing scale and integration of network data, cloud databases have gradually become the main storage mode for data in the era of big data. Cloud database is a cloud computing system centered on data storage and management, which can provide dynamically scalable storage services for data, and its biggest feature is storage as a service. Enterprises are increasingly inclined to outsource the maintenance and management of local data to server providers, thereby reducing operating costs in various aspects such as equipment upgrades, updates, and maintenance. [0003] However, cloud databases are not trustworthy. In order to save local storage space, the data owner usually deletes the local data after uploading the data to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L29/06H04L29/08G06F21/64
CPCH04L9/0643H04L63/123H04L67/1097G06F21/64H04L9/50
Inventor 田秀霞刘天顺牛晓宇周傲英
Owner SHANGHAI UNIVERSITY OF ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products