Safe and effective cloud data integrity verification scheme with privacy protection

An integrity verification and privacy protection technology, which is applied in the field of cloud data integrity verification solutions with privacy protection, can solve the problems of security, privacy and low efficiency, reduce communication complexity and calculation complexity, and ensure privacy performance, the effect of ensuring safety

Inactive Publication Date: 2020-11-13
BEIHANG UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the basis of the existing PDP system, digital signatures combined with public key encryption and zero-knowledge proofs are used to solve the problems of security, privacy and efficiency in the current cloud data integrity verification process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and effective cloud data integrity verification scheme with privacy protection
  • Safe and effective cloud data integrity verification scheme with privacy protection
  • Safe and effective cloud data integrity verification scheme with privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, solutions and effects of the embodiments of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0018] The specific implementation steps of the present invention are as follows:

[0019] S1: The data owner C runs the secret key generation algorithm: selects the corresponding security parameter κ according to the needs of the data owner to reach the required security level. In this embodiment, the security parameter κ=80bits is taken, and then a large prime number p=2κ=160bits is taken to form a group Z p , select a group G with Weil pairing (bilinear mapping) of order p. Then we use the hash function SHA256 to construct the hash function H mapped to the group G: {0, 1} * →G. The pseudo-random permutation PRP adopts AES, and the pseudo-random function PRF also adopts AES construction. In group Z p A number x is randomly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe and effective cloud data integrity verification scheme with privacy protection, and aims to solve the problems of integrity, privacy and the like of current cloud storage data by adopting technical means such as digital short signature, bilinear mapping, zero knowledge proof and the like. When a data owner interacts with the cloud server, the data owner C generatesa secret key pair, carries out technical processing on own data and carries out digital signature to generate an identifier identifier. After uploading the data and the identifier to a cloud server S,the data owner C requests a third-party verifier TPA to verify own data. The TPA sends out a challenge to verify whether the data is complete, and S generates a response proof according to the challenge. And finally, the TPA verifies and proves whether the data is correct or not, and the TPA cannot obtain any private information in the data verification process. Therefore, the integrity and the privacy of the method are strongly guaranteed.

Description

technical field [0001] The invention relates to the technical field of cloud storage security and privacy protection, in particular to a practical cloud data integrity verification scheme with privacy protection. Background technique [0002] Due to the characteristics of flexibility, on-demand allocation of storage and the ability to save local space resources and management resources, cloud storage has been widely used. However, the difference in service quality of cloud service providers and network attacks have caused many security risks for users to use cloud storage. For example, some dishonest cloud service providers may maliciously save their storage resources and obtain more Delete or modify the data of the data owner, and then deceive the data owner into believing that their data is still in its original state. Of course, data may be changed or lost due to some technical reasons or human factors, such as data loss due to damage to the storage hard disk during data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3221H04L9/3239H04L9/3249H04L9/3271H04L63/123
Inventor 罗喜伶周泽全柏艺
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products